Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
habHh1BC0L.dll

Overview

General Information

Sample name:habHh1BC0L.dll
renamed because original name is a hash value
Original sample name:a34d8bd7493c5f8c2bf381a0267de463.dll
Analysis ID:1591365
MD5:a34d8bd7493c5f8c2bf381a0267de463
SHA1:19326be1a905a053f95cef69a630d30cb298bd5b
SHA256:133e1d4c87a3728c2888997025565651e654f5af74c5428f822c9c058ec3b35e
Tags:dllexeuser-mentality
Infos:

Detection

Wannacry
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Wannacry ransomware
Connects to many different private IPs (likely to spread or exploit)
Connects to many different private IPs via SMB (likely to spread or exploit)
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
File is packed with WinRar
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loaddll32.exe (PID: 7300 cmdline: loaddll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7352 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7372 cmdline: rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • mssecsvr.exe (PID: 7440 cmdline: C:\WINDOWS\mssecsvr.exe MD5: FF830E078CB269B709C952BDF1F34D24)
          • tasksche.exe (PID: 7700 cmdline: C:\WINDOWS\tasksche.exe /i MD5: CBB4BE2403D2BE4554AA9BE6B49A7B62)
    • rundll32.exe (PID: 7360 cmdline: rundll32.exe C:\Users\user\Desktop\habHh1BC0L.dll,PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7604 cmdline: rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",PlayGame MD5: 889B99C52A60DD49227C5E485A016679)
      • mssecsvr.exe (PID: 7620 cmdline: C:\WINDOWS\mssecsvr.exe MD5: FF830E078CB269B709C952BDF1F34D24)
        • tasksche.exe (PID: 7904 cmdline: C:\WINDOWS\tasksche.exe /i MD5: CBB4BE2403D2BE4554AA9BE6B49A7B62)
  • mssecsvr.exe (PID: 7568 cmdline: C:\WINDOWS\mssecsvr.exe -m security MD5: FF830E078CB269B709C952BDF1F34D24)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
habHh1BC0L.dllJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
    habHh1BC0L.dllWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
    • 0x353d0:$x3: tasksche.exe
    • 0x353a8:$x8: C:\%s\qeriuwjhrf
    • 0x3014:$s1: C:\%s\%s
    • 0x12098:$s1: C:\%s\%s
    • 0x1b39c:$s1: C:\%s\%s
    • 0x353bc:$s1: C:\%s\%s
    • 0x326f0:$s5: \\192.168.56.20\IPC$
    • 0x1fae5:$s6: \\172.16.99.5\IPC$
    • 0xd195:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
    • 0x78da:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
    • 0x5449:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
    SourceRuleDescriptionAuthorStrings
    00000008.00000002.2014633028.000000000042E000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
      00000006.00000002.1373665187.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
        00000006.00000000.1336734524.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
          0000000A.00000002.1389292837.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
            0000000A.00000000.1365918332.000000000040F000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
              Click to see the 6 entries
              SourceRuleDescriptionAuthorStrings
              8.2.mssecsvr.exe.1e4d084.3.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              8.2.mssecsvr.exe.23758c8.9.raw.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
              • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
              • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
              • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
              10.2.mssecsvr.exe.400000.0.unpackJoeSecurity_WannacryYara detected Wannacry ransomwareJoe Security
                10.2.mssecsvr.exe.400000.0.unpackWannaCry_RansomwareDetects WannaCry RansomwareFlorian Roth (with the help of binar.ly)
                • 0x3136c:$x3: tasksche.exe
                • 0x31344:$x8: C:\%s\qeriuwjhrf
                • 0x17338:$s1: C:\%s\%s
                • 0x31358:$s1: C:\%s\%s
                • 0x2e68c:$s5: \\192.168.56.20\IPC$
                • 0x1ba81:$s6: \\172.16.99.5\IPC$
                • 0x9131:$op1: 10 AC 72 0D 3D FF FF 1F AC 77 06 B8 01 00 00 00
                • 0x3876:$op2: 44 24 64 8A C6 44 24 65 0E C6 44 24 66 80 C6 44
                • 0x13e5:$op3: 18 DF 6C 24 14 DC 64 24 2C DC 6C 24 5C DC 15 88
                10.2.mssecsvr.exe.400000.0.unpackWannaCry_Ransomware_GenDetects WannaCry RansomwareFlorian Roth (based on rule by US CERT)
                • 0x1bacc:$s1: __TREEID__PLACEHOLDER__
                • 0x1bb68:$s1: __TREEID__PLACEHOLDER__
                • 0x1c3d4:$s1: __TREEID__PLACEHOLDER__
                • 0x1d439:$s1: __TREEID__PLACEHOLDER__
                • 0x1e4a0:$s1: __TREEID__PLACEHOLDER__
                • 0x1f508:$s1: __TREEID__PLACEHOLDER__
                • 0x20570:$s1: __TREEID__PLACEHOLDER__
                • 0x215d8:$s1: __TREEID__PLACEHOLDER__
                • 0x22640:$s1: __TREEID__PLACEHOLDER__
                • 0x236a8:$s1: __TREEID__PLACEHOLDER__
                • 0x24710:$s1: __TREEID__PLACEHOLDER__
                • 0x25778:$s1: __TREEID__PLACEHOLDER__
                • 0x267e0:$s1: __TREEID__PLACEHOLDER__
                • 0x27848:$s1: __TREEID__PLACEHOLDER__
                • 0x288b0:$s1: __TREEID__PLACEHOLDER__
                • 0x29918:$s1: __TREEID__PLACEHOLDER__
                • 0x2a980:$s1: __TREEID__PLACEHOLDER__
                • 0x2ab94:$s1: __TREEID__PLACEHOLDER__
                • 0x2abf4:$s1: __TREEID__PLACEHOLDER__
                • 0x2e2c4:$s1: __TREEID__PLACEHOLDER__
                • 0x2e340:$s1: __TREEID__PLACEHOLDER__
                Click to see the 35 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T22:43:00.434570+010028033043Unknown Traffic192.168.2.949727103.224.212.21580TCP
                2025-01-14T22:43:02.106468+010028033043Unknown Traffic192.168.2.949740103.224.212.21580TCP
                2025-01-14T22:45:08.618751+010028033043Unknown Traffic192.168.2.952883103.224.212.21580TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-14T22:42:59.628747+010028300181A Network Trojan was detected192.168.2.9640511.1.1.153UDP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: habHh1BC0L.dllAvira: detected
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0023-a483-adfaa7c939Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/XAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0290-ac2b-9956998a5fAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-02ad-b855-1345e63794Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0290-ac2b-9956998a5fe8Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0023-a483-adfaa7c939b2Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=202Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0845-0884-8536-91f430fa231dAvira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-02ad-b855-1345e6379487Avira URL Cloud: Label: malware
                Source: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/AAvira URL Cloud: Label: malware
                Source: C:\Windows\tasksche.exeAvira: detection malicious, Label: TR/Rasftuby.cpsmo
                Source: C:\WINDOWS\qeriuwjhrf (copy)ReversingLabs: Detection: 86%
                Source: C:\Windows\eee.exeReversingLabs: Detection: 12%
                Source: C:\Windows\tasksche.exeReversingLabs: Detection: 86%
                Source: habHh1BC0L.dllVirustotal: Detection: 95%Perma Link
                Source: habHh1BC0L.dllReversingLabs: Detection: 92%
                Source: C:\Windows\eee.exeJoe Sandbox ML: detected
                Source: habHh1BC0L.dllJoe Sandbox ML: detected

                Exploits

                barindex
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.39:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.38:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.42:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.41:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.44:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.43:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.46:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.45:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.48:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.47:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.40:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.28:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.27:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.29:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.31:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.30:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.33:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.32:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.35:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.34:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.37:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.36:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.17:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.16:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.19:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.18:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.20:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.22:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.21:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.24:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.23:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.26:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.25:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.97:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.96:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.11:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.99:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.10:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.98:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.13:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.12:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.15:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.14:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.91:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.90:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.93:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.92:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.95:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.94:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.2:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.1:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.8:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.7:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.9:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.4:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.3:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.6:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.5:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.86:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.104:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.85:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.105:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.88:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.102:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.87:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.103:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.108:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.89:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.109:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.106:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.107:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.80:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.82:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.100:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.81:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.101:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.84:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.83:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.75:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.74:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.77:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.113:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.76:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.79:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.78:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.71:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.111:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.70:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.112:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.73:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.72:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.110:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.64:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.63:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.66:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.65:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.68:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.67:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.69:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.60:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.62:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.61:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.49:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.53:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.52:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.55:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.54:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.57:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.56:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.59:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.58:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.51:445Jump to behavior
                Source: global trafficTCP traffic: 192.168.2.50:445Jump to behavior
                Source: habHh1BC0L.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb source: tasksche.exe, 0000000B.00000000.1373149945.000000000042A000.00000002.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmp, tasksche.exe, 0000000C.00000002.2589033370.000000000042A000.00000002.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000000.1387882069.000000000042A000.00000002.00000001.01000000.00000007.sdmp, habHh1BC0L.dll, tasksche.exe.6.dr
                Source: C:\Windows\tasksche.exeCode function: 11_2_00409476 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,11_2_00409476
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040DE5E SendDlgItemMessageW,DestroyIcon,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SHGetFileInfoW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,11_2_0040DE5E

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2830018 - Severity 1 - ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup) : 192.168.2.9:64051 -> 1.1.1.1:53
                Source: global trafficTCP traffic: 192.168.2.9:52262 -> 1.1.1.1:53
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0843-0023-a483-adfaa7c939b2 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0843-0290-ac2b-9956998a5fe8 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736890980.6404981
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0843-02ad-b855-1345e6379487 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=b07e05a2-6afb-4967-a1ef-8668f7ec5591
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0845-0884-8536-91f430fa231d HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49740 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49727 -> 103.224.212.215:80
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:52883 -> 103.224.212.215:80
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.11
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.227
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.227
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.227
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.227
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 100.186.60.1
                Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.207
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.207
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.207
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.207
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.1
                Source: unknownTCP traffic detected without corresponding DNS query: 99.38.44.1
                Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.209
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.167
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.167
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.167
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.167
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: unknownTCP traffic detected without corresponding DNS query: 77.201.178.1
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0843-0023-a483-adfaa7c939b2 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0843-0290-ac2b-9956998a5fe8 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cacheCookie: __tad=1736890980.6404981
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0843-02ad-b855-1345e6379487 HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-AliveCookie: parking_session=b07e05a2-6afb-4967-a1ef-8668f7ec5591
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comCache-Control: no-cache
                Source: global trafficHTTP traffic detected: GET /?subid1=20250115-0845-0884-8536-91f430fa231d HTTP/1.1Cache-Control: no-cacheHost: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: global trafficDNS traffic detected: DNS query: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 00000008.00000002.2015365691.0000000000B2A000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 00000008.00000002.2015365691.0000000000B4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=202
                Source: mssecsvr.exe, 00000006.00000002.1374237333.0000000000C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0
                Source: mssecsvr.exe, 00000006.00000002.1374237333.0000000000C47000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0023-a483-adfaa7c939
                Source: mssecsvr.exe, 00000008.00000002.2015365691.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2015365691.0000000000B2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0290-ac2b-9956998a5f
                Source: mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-02ad-b855-1345e63794
                Source: mssecsvr.exe, 00000006.00000002.1374237333.0000000000C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/A
                Source: mssecsvr.exe, 00000008.00000002.2015365691.0000000000B2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/X
                Source: habHh1BC0L.dllString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                Source: mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C38000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/
                Source: mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/$
                Source: mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2f
                Source: mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/g
                Source: mssecsvr.exe, 00000006.00000002.1374237333.0000000000C58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/l
                Source: mssecsvr.exe, 00000006.00000002.1374237333.0000000000BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/ll)
                Source: mssecsvr.exe, 00000008.00000002.2014176011.000000000019D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ
                Source: mssecsvr.exe, 00000006.00000002.1374237333.0000000000BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comq
                Source: mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comsf:
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: Yara matchFile source: habHh1BC0L.dll, type: SAMPLE
                Source: Yara matchFile source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1e4d084.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.2384948.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.23758c8.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1e5c104.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1e580a4.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.1e5c104.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.23808e8.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.mssecsvr.exe.2384948.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.2014633028.000000000042E000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.1373665187.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000000.1336734524.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1389292837.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000000.1365918332.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000000.1359729095.000000000040F000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2016361125.0000000002384000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2015998105.0000000001E5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7440, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7568, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: mssecsvr.exe PID: 7620, type: MEMORYSTR

                System Summary

                barindex
                Source: habHh1BC0L.dll, type: SAMPLEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1e4d084.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.23758c8.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.1e4d084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1e4d084.3.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.2384948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.2384948.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.23758c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.23758c8.9.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.1e5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1e5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (based on rule by US CERT)
                Source: 8.2.mssecsvr.exe.1e580a4.5.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.1e5c104.2.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.23808e8.8.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: 8.2.mssecsvr.exe.2384948.7.unpack, type: UNPACKEDPEMatched rule: Detects WannaCry Ransomware Author: Florian Roth (with the help of binar.ly)
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040690A: __EH_prolog,_wcslen,_wcscpy,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,_wcscpy,_wcscpy,_wcscpy,_wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,11_2_0040690A
                Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\tasksche.exeFile created: C:\Windows\__tmp_rar_sfx_access_check_5077250Jump to behavior
                Source: C:\Windows\tasksche.exeFile created: C:\Windows\eee.exeJump to behavior
                Source: C:\Windows\tasksche.exeFile created: C:\Windows\__tmp_rar_sfx_access_check_5078562Jump to behavior
                Source: C:\Windows\tasksche.exeFile created: C:\Windows\eee.exeJump to behavior
                Source: C:\Windows\tasksche.exeFile deleted: C:\Windows\__tmp_rar_sfx_access_check_5077250Jump to behavior
                Source: C:\Windows\tasksche.exeCode function: 11_2_00402F2C11_2_00402F2C
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041B0D911_2_0041B0D9
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041B8B911_2_0041B8B9
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041494611_2_00414946
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041017811_2_00410178
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040498611_2_00404986
                Source: C:\Windows\tasksche.exeCode function: 11_2_0042924111_2_00429241
                Source: C:\Windows\tasksche.exeCode function: 11_2_0042727C11_2_0042727C
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040CB2311_2_0040CB23
                Source: C:\Windows\tasksche.exeCode function: 11_2_004283FC11_2_004283FC
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041AC0411_2_0041AC04
                Source: C:\Windows\tasksche.exeCode function: 11_2_00416C3F11_2_00416C3F
                Source: C:\Windows\tasksche.exeCode function: 11_2_00401CC111_2_00401CC1
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041F4D411_2_0041F4D4
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041BCD911_2_0041BCD9
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040C4FF11_2_0040C4FF
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041B4AD11_2_0041B4AD
                Source: C:\Windows\tasksche.exeCode function: 11_2_00417D7811_2_00417D78
                Source: C:\Windows\tasksche.exeCode function: 11_2_00427D0411_2_00427D04
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041450F11_2_0041450F
                Source: C:\Windows\tasksche.exeCode function: 11_2_00415D9A11_2_00415D9A
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040561011_2_00405610
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041462B11_2_0041462B
                Source: C:\Windows\tasksche.exeCode function: 11_2_00413EE311_2_00413EE3
                Source: C:\Windows\tasksche.exeCode function: 11_2_004106F411_2_004106F4
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040C75611_2_0040C756
                Source: C:\Windows\tasksche.exeCode function: 11_2_004277C011_2_004277C0
                Source: Joe Sandbox ViewDropped File: C:\Windows\eee.exe 92B0BECA439DB25D7098379CEE580FA69F6F5E7271708BDEC03AB8FF526426D8
                Source: C:\Windows\tasksche.exeCode function: String function: 0041AAF0 appears 49 times
                Source: C:\Windows\tasksche.exeCode function: String function: 0041A4DC appears 37 times
                Source: C:\Windows\tasksche.exeCode function: String function: 0041FA9C appears 38 times
                Source: eee.exe.11.drStatic PE information: No import functions for PE file found
                Source: habHh1BC0L.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                Source: habHh1BC0L.dll, type: SAMPLEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1e4d084.3.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.23758c8.9.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.1e4d084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1e4d084.3.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.2384948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.2384948.7.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.23758c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.23758c8.9.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.2.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.1e5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1e5c104.2.raw.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 6.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 10.0.mssecsvr.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware_Gen date = 2017-05-12, hash3 = 4384bf4530fb2e35449a8e01c7e0ad94e3a25811ba94f7847c1e6612bbb45359, hash2 = 8e5b5841a3fe81cade259ce2a678ccb4451725bba71f6662d0cc1f08148da8df, hash1 = 9fe91d542952e145f2244572f314632d93eb1e8657621087b2ca7f7df2b0cb05, author = Florian Roth (based on rule by US CERT), description = Detects WannaCry Ransomware, reference = https://www.us-cert.gov/ncas/alerts/TA17-132A
                Source: 8.2.mssecsvr.exe.1e580a4.5.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.1e5c104.2.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.23808e8.8.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: 8.2.mssecsvr.exe.2384948.7.unpack, type: UNPACKEDPEMatched rule: WannaCry_Ransomware date = 2017-05-12, hash1 = ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa, author = Florian Roth (with the help of binar.ly), description = Detects WannaCry Ransomware, reference = https://goo.gl/HG2j5T
                Source: classification engineClassification label: mal100.rans.expl.evad.winDLL@20/3@2/100
                Source: C:\Windows\tasksche.exeCode function: 11_2_00406553 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,11_2_00406553
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,8_2_00407C40
                Source: C:\Windows\tasksche.exeCode function: 11_2_00419BB0 CoCreateInstance,11_2_00419BB0
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407CE0 InternetCloseHandle,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,FindResourceA,LoadResource,LockResource,SizeofResource,sprintf,sprintf,sprintf,MoveFileExA,CreateFileA,WriteFile,CloseHandle,CreateProcessA,CloseHandle,CloseHandle,6_2_00407CE0
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,6_2_00408090
                Source: C:\Windows\mssecsvr.exeCode function: 8_2_00408090 GetModuleFileNameA,__p___argc,OpenSCManagerA,InternetCloseHandle,OpenServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,StartServiceCtrlDispatcherA,8_2_00408090
                Source: C:\Windows\tasksche.exeFile created: C:\Users\user\New folderJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7308:120:WilError_03
                Source: C:\Windows\tasksche.exeCommand line argument: sfxname11_2_0040FEF0
                Source: C:\Windows\tasksche.exeCommand line argument: sfxstime11_2_0040FEF0
                Source: C:\Windows\tasksche.exeCommand line argument: STARTDLG11_2_0040FEF0
                Source: C:\Windows\tasksche.exeCommand line argument: @CB11_2_00424290
                Source: habHh1BC0L.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\tasksche.exeFile read: C:\Windows\win.iniJump to behavior
                Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\habHh1BC0L.dll,PlayGame
                Source: habHh1BC0L.dllVirustotal: Detection: 95%
                Source: habHh1BC0L.dllReversingLabs: Detection: 92%
                Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll"
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",#1
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\habHh1BC0L.dll,PlayGame
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",#1
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: unknownProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe -m security
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",PlayGame
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exe
                Source: C:\Windows\mssecsvr.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\mssecsvr.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /i
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",#1Jump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\habHh1BC0L.dll,PlayGameJump to behavior
                Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",PlayGameJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",#1Jump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\mssecsvr.exe C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess created: C:\Windows\tasksche.exe C:\WINDOWS\tasksche.exe /iJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: riched32.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: explorerframe.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: thumbcache.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: dataexchange.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: d3d11.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: dcomp.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: dxgi.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: networkexplorer.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: riched32.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: explorerframe.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: thumbcache.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: dataexchange.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: d3d11.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: dcomp.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: dxgi.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: samlib.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: networkexplorer.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\tasksche.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\mssecsvr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeAutomated click: OK
                Source: C:\Windows\tasksche.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: habHh1BC0L.dllStatic file information: File size 5267459 > 1048576
                Source: habHh1BC0L.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x501000
                Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb source: tasksche.exe, 0000000B.00000000.1373149945.000000000042A000.00000002.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmp, tasksche.exe, 0000000C.00000002.2589033370.000000000042A000.00000002.00000001.01000000.00000007.sdmp, tasksche.exe, 0000000C.00000000.1387882069.000000000042A000.00000002.00000001.01000000.00000007.sdmp, habHh1BC0L.dll, tasksche.exe.6.dr
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040CEB6 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,11_2_0040CEB6
                Source: C:\Windows\tasksche.exeFile created: C:\Windows\__tmp_rar_sfx_access_check_5077250Jump to behavior
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041FAE1 push ecx; ret 11_2_0041FAF4
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041A4DC push eax; ret 11_2_0041A4FA

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\mssecsvr.exeExecutable created and started: C:\WINDOWS\tasksche.exeJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeExecutable created and started: C:\WINDOWS\mssecsvr.exeJump to behavior
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\tasksche.exeFile created: C:\Windows\eee.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\WINDOWS\qeriuwjhrf (copy)Jump to dropped file
                Source: C:\Windows\tasksche.exeFile created: C:\Windows\eee.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeFile created: C:\Windows\tasksche.exeJump to dropped file
                Source: C:\Windows\mssecsvr.exeCode function: 6_2_00407C40 sprintf,OpenSCManagerA,InternetCloseHandle,CreateServiceA,CloseServiceHandle,StartServiceA,CloseServiceHandle,CloseServiceHandle,6_2_00407C40
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\tasksche.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\tasksche.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\tasksche.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\tasksche.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: C:\Windows\tasksche.exeDropped PE file which has not been started: C:\Windows\eee.exeJump to dropped file
                Source: C:\Windows\tasksche.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_11-19226
                Source: C:\Windows\tasksche.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_11-19426
                Source: C:\Windows\mssecsvr.exe TID: 7680Thread sleep count: 91 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7680Thread sleep time: -182000s >= -30000sJump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7684Thread sleep count: 127 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7684Thread sleep count: 36 > 30Jump to behavior
                Source: C:\Windows\mssecsvr.exe TID: 7680Thread sleep time: -86400000s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\tasksche.exeCode function: 11_2_00409476 FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,11_2_00409476
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040DE5E SendDlgItemMessageW,DestroyIcon,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SHGetFileInfoW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,11_2_0040DE5E
                Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
                Source: C:\Windows\mssecsvr.exeThread delayed: delay time: 86400000Jump to behavior
                Source: tasksche.exe, 0000000C.00000002.2589335405.000000000077D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
                Source: tasksche.exe, 0000000C.00000002.2590376299.00000000056E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}I
                Source: tasksche.exe, 0000000C.00000003.2439818918.0000000005713000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}N1
                Source: tasksche.exe, 0000000B.00000002.2589312577.000000000070C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\^
                Source: tasksche.exe, 0000000C.00000002.2589335405.000000000077D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y{
                Source: tasksche.exe, 0000000B.00000002.2589312577.000000000070C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: tasksche.exe, 0000000C.00000002.2590376299.0000000005716000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: tasksche.exe, 0000000C.00000003.1976698073.0000000005716000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}77
                Source: tasksche.exe, 0000000C.00000002.2589335405.000000000077D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                Source: tasksche.exe, 0000000B.00000002.2589312577.000000000070C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: tasksche.exe, 0000000C.00000002.2590376299.00000000056E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}B
                Source: mssecsvr.exe, 00000008.00000002.2015365691.0000000000B4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW$7
                Source: tasksche.exe, 0000000C.00000003.1778936718.00000000007FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: G|3c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}77
                Source: tasksche.exe, 0000000C.00000002.2589335405.00000000007DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\UUU
                Source: mssecsvr.exe, 00000006.00000002.1374237333.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000006.00000002.1374237333.0000000000C58000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2015365691.0000000000B08000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2015365691.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C89000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: tasksche.exe, 0000000C.00000003.1777199303.0000000000830000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
                Source: tasksche.exe, 0000000C.00000003.1778350015.0000000000830000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}42??
                Source: tasksche.exe, 0000000C.00000002.2589335405.000000000077D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                Source: tasksche.exe, 0000000C.00000003.1778350015.0000000000830000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{55630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18xn
                Source: tasksche.exe, 0000000C.00000002.2589335405.000000000077D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y,
                Source: tasksche.exe, 0000000B.00000002.2589312577.000000000070C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: tasksche.exe, 0000000C.00000002.2590376299.00000000056E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD0
                Source: C:\Windows\tasksche.exeAPI call chain: ExitProcess graph end nodegraph_11-19228
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041E6DE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0041E6DE
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040CEB6 LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,11_2_0040CEB6
                Source: C:\Windows\tasksche.exeCode function: 11_2_004234CE SetUnhandledExceptionFilter,11_2_004234CE
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041E6DE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0041E6DE
                Source: C:\Windows\tasksche.exeCode function: 11_2_0041FFDB _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_0041FFDB
                Source: C:\Windows\tasksche.exeCode function: 11_2_00423F89 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,11_2_00423F89
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",#1Jump to behavior
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040CA52 cpuid 11_2_0040CA52
                Source: C:\Windows\tasksche.exeCode function: GetLocaleInfoW,GetNumberFormatW,11_2_0040D155
                Source: C:\Windows\tasksche.exeCode function: GetLocaleInfoA,11_2_00425EF0
                Source: C:\Windows\tasksche.exeCode function: 11_2_0040FEF0 OleInitialize,_memset,GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,LoadBitmapW,DialogBoxParamW,DeleteObject,DeleteObject,DeleteObject,CloseHandle,Sleep,OleUninitialize,11_2_0040FEF0
                Source: C:\Windows\tasksche.exeCode function: 11_2_00409C06 GetVersionExW,11_2_00409C06
                Source: C:\Windows\tasksche.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                Source: C:\Windows\tasksche.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                OS Credential Dumping1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                4
                Windows Service
                1
                Access Token Manipulation
                2
                Obfuscated Files or Information
                LSASS Memory12
                File and Directory Discovery
                Remote Desktop Protocol1
                Data from Local System
                12
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts2
                Service Execution
                Logon Script (Windows)4
                Windows Service
                1
                Software Packing
                Security Account Manager23
                System Information Discovery
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
                Process Injection
                1
                DLL Side-Loading
                NTDS1
                Network Share Discovery
                Distributed Component Object ModelInput Capture3
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                File Deletion
                LSA Secrets111
                Security Software Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                Masquerading
                Cached Domain Credentials21
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                Virtualization/Sandbox Evasion
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Access Token Manipulation
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Rundll32
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1591365 Sample: habHh1BC0L.dll Startdate: 14/01/2025 Architecture: WINDOWS Score: 100 46 www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->46 48 ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com 2->48 50 77026.bodis.com 2->50 60 Suricata IDS alerts for network traffic 2->60 62 Malicious sample detected (through community Yara rule) 2->62 64 Antivirus detection for URL or domain 2->64 66 6 other signatures 2->66 10 loaddll32.exe 1 2->10         started        12 mssecsvr.exe 12 2->12         started        signatures3 process4 dnsIp5 16 cmd.exe 1 10->16         started        18 rundll32.exe 10->18         started        21 conhost.exe 10->21         started        23 rundll32.exe 1 10->23         started        52 192.168.2.100 unknown unknown 12->52 54 192.168.2.101 unknown unknown 12->54 56 98 other IPs or domains 12->56 74 Connects to many different private IPs via SMB (likely to spread or exploit) 12->74 76 Connects to many different private IPs (likely to spread or exploit) 12->76 signatures6 process7 signatures8 25 rundll32.exe 16->25         started        58 Drops executables to the windows directory (C:\Windows) and starts them 18->58 27 mssecsvr.exe 13 18->27         started        process9 file10 31 mssecsvr.exe 13 25->31         started        42 C:\WINDOWS\qeriuwjhrf (copy), PE32 27->42 dropped 72 Drops executables to the windows directory (C:\Windows) and starts them 27->72 34 tasksche.exe 8 19 27->34         started        signatures11 process12 file13 44 C:\Windows\tasksche.exe, PE32 31->44 dropped 36 tasksche.exe 3 12 31->36         started        process14 file15 40 C:\Windows\eee.exe, PE32 36->40 dropped 68 Antivirus detection for dropped file 36->68 70 Multi AV Scanner detection for dropped file 36->70 signatures16

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                habHh1BC0L.dll95%VirustotalBrowse
                habHh1BC0L.dll92%ReversingLabsWin32.Ransomware.WannaCry
                habHh1BC0L.dll100%AviraTR/AD.DPulsarShellcode.uvbfu
                habHh1BC0L.dll100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\tasksche.exe100%AviraTR/Rasftuby.cpsmo
                C:\Windows\eee.exe100%Joe Sandbox ML
                C:\WINDOWS\qeriuwjhrf (copy)87%ReversingLabsWin32.Trojan.Rasftuby
                C:\Windows\eee.exe12%ReversingLabs
                C:\Windows\tasksche.exe87%ReversingLabsWin32.Trojan.Rasftuby
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0023-a483-adfaa7c939100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/X100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comsf:0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0290-ac2b-9956998a5f100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-02ad-b855-1345e63794100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comq0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0290-ac2b-9956998a5fe8100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0023-a483-adfaa7c939b2100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=202100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0845-0884-8536-91f430fa231d100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0100%Avira URL Cloudmalware
                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJ0%Avira URL Cloudsafe
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-02ad-b855-1345e6379487100%Avira URL Cloudmalware
                http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/A100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                77026.bodis.com
                199.59.243.228
                truefalse
                  high
                  s-part-0017.t-0009.t-msedge.net
                  13.107.246.45
                  truefalse
                    high
                    www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                    103.224.212.215
                    truefalse
                      high
                      ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                      unknown
                      unknownfalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0290-ac2b-9956998a5fe8false
                        • Avira URL Cloud: malware
                        unknown
                        http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/false
                          high
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0023-a483-adfaa7c939b2false
                          • Avira URL Cloud: malware
                          unknown
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0845-0884-8536-91f430fa231dfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-02ad-b855-1345e6379487false
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/lmssecsvr.exe, 00000006.00000002.1374237333.0000000000C58000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0023-a483-adfaa7c939mssecsvr.exe, 00000006.00000002.1374237333.0000000000C47000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Xmssecsvr.exe, 00000008.00000002.2015365691.0000000000B2A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0290-ac2b-9956998a5fmssecsvr.exe, 00000008.00000002.2015365691.0000000000B4D000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 00000008.00000002.2015365691.0000000000B2A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/ll)mssecsvr.exe, 00000006.00000002.1374237333.0000000000BFE000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comsf:mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C38000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/mssecsvr.exe, 00000008.00000002.2015365691.0000000000B2A000.00000004.00000020.00020000.00000000.sdmp, mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-02ad-b855-1345e63794mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comhabHh1BC0L.dllfalse
                                high
                                http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/gmssecsvr.exe, 0000000A.00000002.1390445468.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/$mssecsvr.exe, 0000000A.00000002.1390445468.0000000000C6E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comqmssecsvr.exe, 00000006.00000002.1374237333.0000000000BFE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=202mssecsvr.exe, 00000008.00000002.2015365691.0000000000B4D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comJmssecsvr.exe, 00000008.00000002.2014176011.000000000019D000.00000004.00000010.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0mssecsvr.exe, 00000006.00000002.1374237333.0000000000C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/2fmssecsvr.exe, 0000000A.00000002.1390445468.0000000000C38000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/Amssecsvr.exe, 00000006.00000002.1374237333.0000000000C58000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      75.17.203.1
                                      unknownUnited States
                                      7018ATT-INTERNET4USfalse
                                      45.247.224.1
                                      unknownEgypt
                                      24863LINKdotNET-ASEGfalse
                                      52.178.54.35
                                      unknownUnited States
                                      8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                      4.3.90.1
                                      unknownUnited States
                                      3356LEVEL3USfalse
                                      64.4.253.22
                                      unknownUnited States
                                      11643EBAYUSfalse
                                      4.3.90.2
                                      unknownUnited States
                                      3356LEVEL3USfalse
                                      102.101.193.1
                                      unknownMorocco
                                      36925ASMediMAfalse
                                      72.237.206.254
                                      unknownUnited States
                                      25930GENESIS-HEALTHCAREUSfalse
                                      169.10.57.65
                                      unknownUnited States
                                      203CENTURYLINK-LEGACY-LVLT-203USfalse
                                      85.167.36.1
                                      unknownNorway
                                      2119TELENOR-NEXTELTelenorNorgeASNOfalse
                                      4.3.90.171
                                      unknownUnited States
                                      3356LEVEL3USfalse
                                      87.157.193.1
                                      unknownGermany
                                      3320DTAGInternetserviceprovideroperationsDEfalse
                                      71.168.64.61
                                      unknownUnited States
                                      13672FAIRPO-3USfalse
                                      143.130.7.200
                                      unknownAustria
                                      1853ACONETACOnetBackboneATfalse
                                      169.10.57.1
                                      unknownUnited States
                                      203CENTURYLINK-LEGACY-LVLT-203USfalse
                                      3.72.157.1
                                      unknownUnited States
                                      16509AMAZON-02USfalse
                                      87.157.193.156
                                      unknownGermany
                                      3320DTAGInternetserviceprovideroperationsDEfalse
                                      IP
                                      192.168.2.148
                                      192.168.2.149
                                      192.168.2.146
                                      192.168.2.147
                                      192.168.2.140
                                      192.168.2.141
                                      192.168.2.144
                                      192.168.2.145
                                      192.168.2.142
                                      192.168.2.143
                                      192.168.2.159
                                      192.168.2.157
                                      192.168.2.158
                                      192.168.2.151
                                      192.168.2.152
                                      192.168.2.150
                                      192.168.2.155
                                      192.168.2.156
                                      192.168.2.153
                                      192.168.2.154
                                      192.168.2.126
                                      192.168.2.247
                                      192.168.2.127
                                      192.168.2.248
                                      192.168.2.124
                                      192.168.2.245
                                      192.168.2.125
                                      192.168.2.246
                                      192.168.2.128
                                      192.168.2.249
                                      192.168.2.129
                                      192.168.2.240
                                      192.168.2.122
                                      192.168.2.243
                                      192.168.2.123
                                      192.168.2.244
                                      192.168.2.120
                                      192.168.2.241
                                      192.168.2.121
                                      192.168.2.242
                                      192.168.2.97
                                      192.168.2.137
                                      192.168.2.96
                                      192.168.2.138
                                      192.168.2.99
                                      192.168.2.135
                                      192.168.2.98
                                      192.168.2.136
                                      192.168.2.139
                                      192.168.2.250
                                      192.168.2.130
                                      192.168.2.251
                                      192.168.2.91
                                      192.168.2.90
                                      192.168.2.93
                                      192.168.2.133
                                      192.168.2.254
                                      192.168.2.92
                                      192.168.2.134
                                      192.168.2.95
                                      192.168.2.131
                                      192.168.2.252
                                      192.168.2.94
                                      192.168.2.132
                                      192.168.2.253
                                      192.168.2.104
                                      192.168.2.225
                                      192.168.2.105
                                      192.168.2.226
                                      192.168.2.102
                                      192.168.2.223
                                      192.168.2.103
                                      192.168.2.224
                                      192.168.2.108
                                      192.168.2.229
                                      192.168.2.109
                                      192.168.2.106
                                      192.168.2.227
                                      192.168.2.107
                                      192.168.2.228
                                      192.168.2.100
                                      192.168.2.221
                                      192.168.2.101
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1591365
                                      Start date and time:2025-01-14 22:42:07 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 6m 14s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:17
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:habHh1BC0L.dll
                                      renamed because original name is a hash value
                                      Original Sample Name:a34d8bd7493c5f8c2bf381a0267de463.dll
                                      Detection:MAL
                                      Classification:mal100.rans.expl.evad.winDLL@20/3@2/100
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 76%
                                      • Number of executed functions: 64
                                      • Number of non-executed functions: 93
                                      Cookbook Comments:
                                      • Found application associated with file extension: .dll
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtEnumerateKey calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      16:43:01API Interceptor1x Sleep call for process: loaddll32.exe modified
                                      16:43:36API Interceptor112x Sleep call for process: mssecsvr.exe modified
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      s-part-0017.t-0009.t-msedge.nethttps://securityalert-corporate.com/click/f288bff9-842d-4e34-8d2d-41ad20e48e9dGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      hzQNazOx3Z.dllGet hashmaliciousWannacryBrowse
                                      • 13.107.246.45
                                      eIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                      • 13.107.246.45
                                      Yx3rRuVx3c.dllGet hashmaliciousWannacryBrowse
                                      • 13.107.246.45
                                      sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                      • 13.107.246.45
                                      logitix.pdfGet hashmaliciousHTMLPhisherBrowse
                                      • 13.107.246.45
                                      DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      EFT_Payment_Notification_Gheenirrigation.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 13.107.246.45
                                      Document_31055.pdfGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      77026.bodis.comeIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                      • 199.59.243.228
                                      8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                                      • 199.59.243.227
                                      7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                                      • 199.59.243.227
                                      UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                                      • 199.59.243.227
                                      1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                                      • 199.59.243.227
                                      www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comeIZi481eP6.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      m9oUIFauYl.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      sUlHfYQxNw.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      6qqWn6eIGG.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      jgd5ZGl1vA.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      LisectAVT_2403002A_327.dllGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      yrBA01LVo2.exeGet hashmaliciousWannacryBrowse
                                      • 103.224.212.215
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      ATT-INTERNET4UShttp://monitor.linkwhat.com/tl4tl4726Qz107cK770xR10599lj360px17lb07468gl70015oV95328Kn41253VG39381FP5605427918==aru2826664Get hashmaliciousPhisherBrowse
                                      • 13.32.23.8
                                      hsmSW6Eifl.dllGet hashmaliciousWannacryBrowse
                                      • 172.142.199.1
                                      MK9UBUl8t7.dllGet hashmaliciousWannacryBrowse
                                      • 75.63.94.202
                                      k6fBkyS1R6.dllGet hashmaliciousWannacryBrowse
                                      • 12.213.51.1
                                      Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                      • 12.85.167.44
                                      http://www.affordablehousing.com/MaineCWLGet hashmaliciousUnknownBrowse
                                      • 13.32.27.22
                                      meth3.elfGet hashmaliciousMiraiBrowse
                                      • 13.183.171.175
                                      meth1.elfGet hashmaliciousMiraiBrowse
                                      • 99.160.219.59
                                      https://www.xrmtoolbox.com/Get hashmaliciousUnknownBrowse
                                      • 99.158.47.182
                                      https://mercedesinsua.com.ar/?infox=Ymxha2Uuc2lyZ29AY290ZXJyYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                      • 13.32.27.44
                                      LINKdotNET-ASEGmeth10.elfGet hashmaliciousMiraiBrowse
                                      • 197.161.205.9
                                      meth8.elfGet hashmaliciousMiraiBrowse
                                      • 41.196.116.152
                                      meth1.elfGet hashmaliciousMiraiBrowse
                                      • 197.167.208.203
                                      x86.elfGet hashmaliciousUnknownBrowse
                                      • 41.131.9.180
                                      meth14.elfGet hashmaliciousMiraiBrowse
                                      • 197.163.51.123
                                      meth9.elfGet hashmaliciousMiraiBrowse
                                      • 41.196.116.132
                                      meth15.elfGet hashmaliciousMiraiBrowse
                                      • 197.165.32.53
                                      elitebotnet.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 197.163.92.69
                                      4.elfGet hashmaliciousUnknownBrowse
                                      • 197.166.117.68
                                      3.elfGet hashmaliciousUnknownBrowse
                                      • 45.243.134.201
                                      MICROSOFT-CORP-MSN-AS-BLOCKUShttps://securityalert-corporate.com/click/f288bff9-842d-4e34-8d2d-41ad20e48e9dGet hashmaliciousUnknownBrowse
                                      • 20.49.104.18
                                      FjSrGs0AE2.dllGet hashmaliciousWannacryBrowse
                                      • 22.184.197.1
                                      mlfk8sYaiy.dllGet hashmaliciousWannacryBrowse
                                      • 13.103.137.252
                                      mCgW5qofxC.dllGet hashmaliciousWannacryBrowse
                                      • 52.252.59.4
                                      6KJ3FjgeLv.dllGet hashmaliciousWannacryBrowse
                                      • 21.20.144.1
                                      XML-702.msiGet hashmaliciousAteraAgentBrowse
                                      • 20.60.197.1
                                      Fantazy.arm4.elfGet hashmaliciousUnknownBrowse
                                      • 20.207.221.18
                                      DHL AWB CUSTOM CLEARANCE.xlsGet hashmaliciousUnknownBrowse
                                      • 13.107.253.45
                                      EFT_Payment_Notification_Gheenirrigation.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 20.190.159.75
                                      MissedCall_Record_3295935663.htmlGet hashmaliciousUnknownBrowse
                                      • 13.69.116.109
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Windows\eee.exeIU28r0EZFA.dllGet hashmaliciousWannacryBrowse
                                        znV6O953KT.dllGet hashmaliciousWannacryBrowse
                                          goN6vVlV2F.dllGet hashmaliciousWannacryBrowse
                                            QbNF1cvpa0.dllGet hashmaliciousWannacryBrowse
                                              vGJZ7R5D9P.dllGet hashmaliciousWannacryBrowse
                                                vEbriCJic0.dllGet hashmaliciousWannacryBrowse
                                                  48O5lgRp91.dllGet hashmaliciousWannacryBrowse
                                                    PDAZE3eQB1.dllGet hashmaliciousWannacryBrowse
                                                      rBsGH746YC.dllGet hashmaliciousWannacryBrowse
                                                        dKkvbrzdUL.dllGet hashmaliciousWannacryBrowse
                                                          Process:C:\Windows\mssecsvr.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive
                                                          Category:dropped
                                                          Size (bytes):2061938
                                                          Entropy (8bit):7.943301985754563
                                                          Encrypted:false
                                                          SSDEEP:49152:XEKUacBVQej/1INRx+TSqTdX1HkQo6SAARdhOvm:XyfBhz1aRxcSUDk36SAEdhGm
                                                          MD5:CBB4BE2403D2BE4554AA9BE6B49A7B62
                                                          SHA1:112D00C9FC32873F6186CCA9484CE67B7D9004EC
                                                          SHA-256:5677D02E02429ED7EEF009420C5CDE3B246F37E2489D73FED257D79BF11AA35A
                                                          SHA-512:9A55B3968BB1996B251B8BCE239ADAFE00D9F8B8D2E5CACC068A9638448CAC4A7F952481CB9944A1F8EE68373927EA35CCE6F8DFEEEB9F8CD4D8A90FE3B18112
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 87%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\tasksche.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):1981503
                                                          Entropy (8bit):1.1514036614623402
                                                          Encrypted:false
                                                          SSDEEP:3072:Pm7CQNtZU+mWdyVsJM5MelfvtNdQU/2DRIYUoNv+byel0QWq:PsCwu+mWhJifvtNP/7YXYlW
                                                          MD5:03880BEAD20960FEF3D46ADE3C83E1BD
                                                          SHA1:62EECEF13F3125CF8E4212D4AD85AB45E091830D
                                                          SHA-256:92B0BECA439DB25D7098379CEE580FA69F6F5E7271708BDEC03AB8FF526426D8
                                                          SHA-512:8534E48D702AFB70A4537096AEC7EBB1E4C1A4CF14A44F7C1F7D8DF972742A5E0A49738124891843CF10E390379ECEEFC7882A0BE6AEA206A6583BC4B1194F9D
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 12%
                                                          Joe Sandbox View:
                                                          • Filename: IU28r0EZFA.dll, Detection: malicious, Browse
                                                          • Filename: znV6O953KT.dll, Detection: malicious, Browse
                                                          • Filename: goN6vVlV2F.dll, Detection: malicious, Browse
                                                          • Filename: QbNF1cvpa0.dll, Detection: malicious, Browse
                                                          • Filename: vGJZ7R5D9P.dll, Detection: malicious, Browse
                                                          • Filename: vEbriCJic0.dll, Detection: malicious, Browse
                                                          • Filename: 48O5lgRp91.dll, Detection: malicious, Browse
                                                          • Filename: PDAZE3eQB1.dll, Detection: malicious, Browse
                                                          • Filename: rBsGH746YC.dll, Detection: malicious, Browse
                                                          • Filename: dKkvbrzdUL.dll, Detection: malicious, Browse
                                                          Reputation:moderate, very likely benign file
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........1..`_Z.`_Z.`_Z...Z.`_Z...Z1`_Z...Z.`_Z.>\[.`_Z.>[[.`_Z.>Z[.`_Z...Z.`_Z...Z.`_Z.`^Z@`_Z->Z[.`_Z->_[.`_Z(>.Z.`_Z->][.`_ZRich.`_Z........PE..L......Y..........................................@.......................... ............@.........................@...4...t...(........:......................X...Pn..T...............................@...................... ....................text............................... ..`.rdata..............................@..@.data...............................@....gfids..............................@..@.rsrc....F.......H..................@..@.reloc..X........ ..................@..B........................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\mssecsvr.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive
                                                          Category:dropped
                                                          Size (bytes):2061938
                                                          Entropy (8bit):7.943301985754563
                                                          Encrypted:false
                                                          SSDEEP:49152:XEKUacBVQej/1INRx+TSqTdX1HkQo6SAARdhOvm:XyfBhz1aRxcSUDk36SAEdhGm
                                                          MD5:CBB4BE2403D2BE4554AA9BE6B49A7B62
                                                          SHA1:112D00C9FC32873F6186CCA9484CE67B7D9004EC
                                                          SHA-256:5677D02E02429ED7EEF009420C5CDE3B246F37E2489D73FED257D79BF11AA35A
                                                          SHA-512:9A55B3968BB1996B251B8BCE239ADAFE00D9F8B8D2E5CACC068A9638448CAC4A7F952481CB9944A1F8EE68373927EA35CCE6F8DFEEEB9F8CD4D8A90FE3B18112
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 87%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.WG%.WG%.WG%.^?..LG%.^?...G%.^?..BG%.WG$.G%.^?..0G%.^?..VG%.^?..VG%.^?..VG%.RichWG%.................PE..L......U..........................................@..........................`......................................p...3............ ..(9..............................................................@............................................text.............................. ..`.rdata...P.......R..................@..@.data...(...........................@....rsrc...(9... ...:..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):4.263463032588948
                                                          TrID:
                                                          • Win32 Dynamic Link Library (generic) (1002004/3) 98.32%
                                                          • Windows Screen Saver (13104/52) 1.29%
                                                          • Generic Win/DOS Executable (2004/3) 0.20%
                                                          • DOS Executable Generic (2002/1) 0.20%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:habHh1BC0L.dll
                                                          File size:5'267'459 bytes
                                                          MD5:a34d8bd7493c5f8c2bf381a0267de463
                                                          SHA1:19326be1a905a053f95cef69a630d30cb298bd5b
                                                          SHA256:133e1d4c87a3728c2888997025565651e654f5af74c5428f822c9c058ec3b35e
                                                          SHA512:647452c6bb769e1a928aba3af6140a63f210f14c3208b68ef05b94580c368f5fb865885ee8ce37bf3ae508687f1b2ec5c99e3364d9416a80eb15c11739dcd789
                                                          SSDEEP:49152:RnpEKUacBVQej/1INRx+TSqTdX1HkQo6SAARdhOv:1pyfBhz1aRxcSUDk36SAEdhG
                                                          TLSH:0136236530A8C074D103157044ABCB62F6B67C3A17BA694FBF904E7E2E63B66E714B42
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}.r_9...9...9.......=...9...6.....A.:.......8.......8.......:...Rich9...........................PE..L...QW.Y...........!.......
                                                          Icon Hash:7ae282899bbab082
                                                          Entrypoint:0x100011e9
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x10000000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
                                                          DLL Characteristics:
                                                          Time Stamp:0x59145751 [Thu May 11 12:21:37 2017 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:2e5708ae5fed0403e8117c645fb23e5b
                                                          Instruction
                                                          push ebp
                                                          mov ebp, esp
                                                          push ebx
                                                          mov ebx, dword ptr [ebp+08h]
                                                          push esi
                                                          mov esi, dword ptr [ebp+0Ch]
                                                          push edi
                                                          mov edi, dword ptr [ebp+10h]
                                                          test esi, esi
                                                          jne 00007F69B0BD6D5Bh
                                                          cmp dword ptr [10003140h], 00000000h
                                                          jmp 00007F69B0BD6D78h
                                                          cmp esi, 01h
                                                          je 00007F69B0BD6D57h
                                                          cmp esi, 02h
                                                          jne 00007F69B0BD6D74h
                                                          mov eax, dword ptr [10003150h]
                                                          test eax, eax
                                                          je 00007F69B0BD6D5Bh
                                                          push edi
                                                          push esi
                                                          push ebx
                                                          call eax
                                                          test eax, eax
                                                          je 00007F69B0BD6D5Eh
                                                          push edi
                                                          push esi
                                                          push ebx
                                                          call 00007F69B0BD6C6Ah
                                                          test eax, eax
                                                          jne 00007F69B0BD6D56h
                                                          xor eax, eax
                                                          jmp 00007F69B0BD6DA0h
                                                          push edi
                                                          push esi
                                                          push ebx
                                                          call 00007F69B0BD6B1Ch
                                                          cmp esi, 01h
                                                          mov dword ptr [ebp+0Ch], eax
                                                          jne 00007F69B0BD6D5Eh
                                                          test eax, eax
                                                          jne 00007F69B0BD6D89h
                                                          push edi
                                                          push eax
                                                          push ebx
                                                          call 00007F69B0BD6C46h
                                                          test esi, esi
                                                          je 00007F69B0BD6D57h
                                                          cmp esi, 03h
                                                          jne 00007F69B0BD6D78h
                                                          push edi
                                                          push esi
                                                          push ebx
                                                          call 00007F69B0BD6C35h
                                                          test eax, eax
                                                          jne 00007F69B0BD6D55h
                                                          and dword ptr [ebp+0Ch], eax
                                                          cmp dword ptr [ebp+0Ch], 00000000h
                                                          je 00007F69B0BD6D63h
                                                          mov eax, dword ptr [10003150h]
                                                          test eax, eax
                                                          je 00007F69B0BD6D5Ah
                                                          push edi
                                                          push esi
                                                          push ebx
                                                          call eax
                                                          mov dword ptr [ebp+0Ch], eax
                                                          mov eax, dword ptr [ebp+0Ch]
                                                          pop edi
                                                          pop esi
                                                          pop ebx
                                                          pop ebp
                                                          retn 000Ch
                                                          jmp dword ptr [10002028h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          Programming Language:
                                                          • [ C ] VS98 (6.0) build 8168
                                                          • [C++] VS98 (6.0) build 8168
                                                          • [RES] VS98 (6.0) cvtres build 1720
                                                          • [LNK] VS98 (6.0) imp/exp build 8168
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x21900x48.rdata
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x203c0x3c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x500060.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x5050000x5c.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x3c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x28c0x10008de9a2cb31e4c74bd008b871d14bfafcFalse0.13037109375data1.4429971244731552IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x20000x1d80x10003dd394f95ab218593f2bc8eb65184db4False0.072509765625data0.7346018133622799IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x30000x1540x10009b27c3f254416f775f5a51102ef8fb84False0.016845703125Matlab v4 mat-file (little endian) C:\%s\%s, numeric, rows 0, columns 00.085726967663312IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x40000x5000600x501000857139210d3a62a8a1989f7d867b7782unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x5050000x2ac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          W0x40600x500000dataEnglishUnited States0.8180646896362305
                                                          DLLImport
                                                          KERNEL32.dllCloseHandle, WriteFile, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, CreateProcessA
                                                          MSVCRT.dllfree, _initterm, malloc, _adjust_fdiv, sprintf
                                                          NameOrdinalAddress
                                                          PlayGame10x10001114
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-01-14T22:42:59.628747+01002830018ETPRO MALWARE Observed WannaCry Domain (iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff .com in DNS Lookup)1192.168.2.9640511.1.1.153UDP
                                                          2025-01-14T22:43:00.434570+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.949727103.224.212.21580TCP
                                                          2025-01-14T22:43:02.106468+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.949740103.224.212.21580TCP
                                                          2025-01-14T22:45:08.618751+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.952883103.224.212.21580TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 14, 2025 22:42:52.641781092 CET49677443192.168.2.920.189.173.11
                                                          Jan 14, 2025 22:42:53.251257896 CET49677443192.168.2.920.189.173.11
                                                          Jan 14, 2025 22:42:53.360632896 CET49673443192.168.2.9204.79.197.203
                                                          Jan 14, 2025 22:42:54.079406023 CET49676443192.168.2.923.206.229.209
                                                          Jan 14, 2025 22:42:54.079607010 CET49675443192.168.2.923.206.229.209
                                                          Jan 14, 2025 22:42:54.282613039 CET49674443192.168.2.923.206.229.209
                                                          Jan 14, 2025 22:42:54.454288960 CET49677443192.168.2.920.189.173.11
                                                          Jan 14, 2025 22:42:56.860528946 CET49677443192.168.2.920.189.173.11
                                                          Jan 14, 2025 22:42:59.817001104 CET4972780192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:42:59.821856022 CET8049727103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:42:59.821923971 CET4972780192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:42:59.826843023 CET4972780192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:42:59.831608057 CET8049727103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:00.434376001 CET8049727103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:00.434524059 CET8049727103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:00.434570074 CET4972780192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:00.439075947 CET4972780192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:00.477268934 CET4972780192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:00.482059002 CET8049727103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:00.856102943 CET4973880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:00.860913038 CET8049738199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:00.860980988 CET4973880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:00.861591101 CET4973880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:00.866339922 CET8049738199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:01.324824095 CET8049738199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:01.324837923 CET8049738199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:01.324899912 CET4973880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:01.331487894 CET4973880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:01.331520081 CET4973880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:01.478303909 CET4974080192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:01.483114958 CET8049740103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:01.483176947 CET4974080192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:01.483303070 CET4974080192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:01.488024950 CET8049740103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:01.666387081 CET49677443192.168.2.920.189.173.11
                                                          Jan 14, 2025 22:43:02.106354952 CET8049740103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:02.106467962 CET4974080192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:02.106508017 CET8049740103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:02.106558084 CET4974080192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:02.126575947 CET4974080192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:02.131720066 CET8049740103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:02.139364004 CET4974580192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:02.144207954 CET8049745199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:02.144332886 CET4974580192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:02.144985914 CET4974580192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:02.150867939 CET8049745199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:02.171926975 CET4974680192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:02.176731110 CET8049746103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:02.176798105 CET4974680192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:02.176923990 CET4974680192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:02.181663990 CET8049746103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:02.628145933 CET8049745199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:02.628165007 CET8049745199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:02.628218889 CET4974580192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:02.633975029 CET4974580192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:02.633986950 CET4974580192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:02.666172981 CET49752445192.168.2.9100.186.60.227
                                                          Jan 14, 2025 22:43:02.671065092 CET44549752100.186.60.227192.168.2.9
                                                          Jan 14, 2025 22:43:02.672039032 CET49752445192.168.2.9100.186.60.227
                                                          Jan 14, 2025 22:43:02.672070980 CET49752445192.168.2.9100.186.60.227
                                                          Jan 14, 2025 22:43:02.672458887 CET49753445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:02.677000999 CET44549752100.186.60.227192.168.2.9
                                                          Jan 14, 2025 22:43:02.677248955 CET44549753100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:02.677316904 CET49752445192.168.2.9100.186.60.227
                                                          Jan 14, 2025 22:43:02.677417040 CET49753445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:02.678474903 CET49753445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:02.681837082 CET49754445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:02.683352947 CET44549753100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:02.683598995 CET49753445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:02.686674118 CET44549754100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:02.686769962 CET49754445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:02.686825991 CET49754445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:02.691584110 CET44549754100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:02.782998085 CET8049746103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:02.783235073 CET8049746103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:02.783308983 CET4974680192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:02.787194967 CET4974680192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:43:02.788650990 CET4975880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:02.791944027 CET8049746103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:43:02.793440104 CET8049758199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:02.793541908 CET4975880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:02.793771029 CET4975880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:02.798494101 CET8049758199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:02.969923973 CET49673443192.168.2.9204.79.197.203
                                                          Jan 14, 2025 22:43:03.270257950 CET8049758199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:03.270272970 CET8049758199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:43:03.270344019 CET4975880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:03.270344019 CET4975880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:03.688637018 CET49676443192.168.2.923.206.229.209
                                                          Jan 14, 2025 22:43:03.688663006 CET49675443192.168.2.923.206.229.209
                                                          Jan 14, 2025 22:43:03.857814074 CET4975880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:03.857851028 CET4975880192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:43:03.891789913 CET49674443192.168.2.923.206.229.209
                                                          Jan 14, 2025 22:43:04.674668074 CET49787445192.168.2.999.38.44.207
                                                          Jan 14, 2025 22:43:04.679474115 CET4454978799.38.44.207192.168.2.9
                                                          Jan 14, 2025 22:43:04.679546118 CET49787445192.168.2.999.38.44.207
                                                          Jan 14, 2025 22:43:04.679661036 CET49787445192.168.2.999.38.44.207
                                                          Jan 14, 2025 22:43:04.679917097 CET49788445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:04.684473991 CET4454978799.38.44.207192.168.2.9
                                                          Jan 14, 2025 22:43:04.684530020 CET49787445192.168.2.999.38.44.207
                                                          Jan 14, 2025 22:43:04.684822083 CET4454978899.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:04.684887886 CET49788445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:04.684927940 CET49788445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:04.686151028 CET49789445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:04.690067053 CET4454978899.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:04.690129042 CET49788445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:04.690912962 CET4454978999.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:04.690972090 CET49789445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:04.691026926 CET49789445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:04.695827007 CET4454978999.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:05.506189108 CET4434970423.206.229.209192.168.2.9
                                                          Jan 14, 2025 22:43:05.506416082 CET49704443192.168.2.923.206.229.209
                                                          Jan 14, 2025 22:43:06.783495903 CET49819445192.168.2.977.201.178.167
                                                          Jan 14, 2025 22:43:06.788352013 CET4454981977.201.178.167192.168.2.9
                                                          Jan 14, 2025 22:43:06.788492918 CET49819445192.168.2.977.201.178.167
                                                          Jan 14, 2025 22:43:06.788655043 CET49819445192.168.2.977.201.178.167
                                                          Jan 14, 2025 22:43:06.788856983 CET49822445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:06.793487072 CET4454981977.201.178.167192.168.2.9
                                                          Jan 14, 2025 22:43:06.793637037 CET4454982277.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:06.793711901 CET49819445192.168.2.977.201.178.167
                                                          Jan 14, 2025 22:43:06.793791056 CET49822445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:06.798433065 CET49822445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:06.803255081 CET4454982277.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:06.804539919 CET49822445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:06.881956100 CET49825445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:06.886831999 CET4454982577.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:06.888557911 CET49825445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:06.888617039 CET49825445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:06.893405914 CET4454982577.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:08.568846941 CET4454982577.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:08.572571993 CET49825445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:08.572674990 CET49825445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:08.572761059 CET49825445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:08.578599930 CET4454982577.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:08.578638077 CET4454982577.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:08.721543074 CET49857445192.168.2.94.3.90.171
                                                          Jan 14, 2025 22:43:08.726600885 CET445498574.3.90.171192.168.2.9
                                                          Jan 14, 2025 22:43:08.726757050 CET49857445192.168.2.94.3.90.171
                                                          Jan 14, 2025 22:43:08.726799011 CET49857445192.168.2.94.3.90.171
                                                          Jan 14, 2025 22:43:08.726988077 CET49858445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:08.731838942 CET445498574.3.90.171192.168.2.9
                                                          Jan 14, 2025 22:43:08.731863976 CET445498584.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:08.731918097 CET49857445192.168.2.94.3.90.171
                                                          Jan 14, 2025 22:43:08.731982946 CET49858445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:08.732060909 CET49858445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:08.733367920 CET49859445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:08.737088919 CET445498584.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:08.738188028 CET445498594.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:08.738276005 CET49858445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:08.738333941 CET49859445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:08.738415956 CET49859445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:08.743192911 CET445498594.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:10.737222910 CET49894445192.168.2.964.4.253.22
                                                          Jan 14, 2025 22:43:10.742340088 CET4454989464.4.253.22192.168.2.9
                                                          Jan 14, 2025 22:43:10.742558002 CET49894445192.168.2.964.4.253.22
                                                          Jan 14, 2025 22:43:10.742631912 CET49894445192.168.2.964.4.253.22
                                                          Jan 14, 2025 22:43:10.743571997 CET49895445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:10.747670889 CET4454989464.4.253.22192.168.2.9
                                                          Jan 14, 2025 22:43:10.747827053 CET49894445192.168.2.964.4.253.22
                                                          Jan 14, 2025 22:43:10.748456955 CET4454989564.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:10.749021053 CET49895445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:10.749021053 CET49895445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:10.749989986 CET49896445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:10.754025936 CET4454989564.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:10.754112959 CET49895445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:10.754834890 CET4454989664.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:10.754903078 CET49896445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:10.754951000 CET49896445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:10.759804010 CET4454989664.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:11.266896009 CET49677443192.168.2.920.189.173.11
                                                          Jan 14, 2025 22:43:11.579943895 CET49910445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:11.584861994 CET4454991077.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:11.584968090 CET49910445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:11.585027933 CET49910445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:11.589842081 CET4454991077.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:12.787688971 CET49930445192.168.2.9190.197.148.161
                                                          Jan 14, 2025 22:43:12.792495966 CET44549930190.197.148.161192.168.2.9
                                                          Jan 14, 2025 22:43:12.792619944 CET49930445192.168.2.9190.197.148.161
                                                          Jan 14, 2025 22:43:12.792619944 CET49930445192.168.2.9190.197.148.161
                                                          Jan 14, 2025 22:43:12.792860031 CET49931445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:12.797533035 CET44549930190.197.148.161192.168.2.9
                                                          Jan 14, 2025 22:43:12.797620058 CET49930445192.168.2.9190.197.148.161
                                                          Jan 14, 2025 22:43:12.797625065 CET44549931190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:12.797710896 CET49931445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:12.797710896 CET49931445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:12.799066067 CET49932445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:12.802974939 CET44549931190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:12.803076982 CET49931445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:12.803940058 CET44549932190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:12.804011106 CET49932445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:12.804064035 CET49932445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:12.808854103 CET44549932190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:13.240267038 CET4454991077.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:13.240348101 CET49910445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:13.240401983 CET49910445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:13.240469933 CET49910445192.168.2.977.201.178.1
                                                          Jan 14, 2025 22:43:13.245166063 CET4454991077.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:13.245234013 CET4454991077.201.178.1192.168.2.9
                                                          Jan 14, 2025 22:43:13.305433035 CET49944445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:13.310343027 CET4454994477.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:13.310437918 CET49944445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:13.310517073 CET49944445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:13.311645031 CET49946445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:13.315768003 CET4454994477.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:13.315821886 CET49944445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:13.316412926 CET4454994677.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:13.316477060 CET49946445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:13.316526890 CET49946445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:13.505593061 CET4454994677.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:14.784012079 CET49971445192.168.2.9136.196.81.224
                                                          Jan 14, 2025 22:43:14.790194035 CET44549971136.196.81.224192.168.2.9
                                                          Jan 14, 2025 22:43:14.790275097 CET49971445192.168.2.9136.196.81.224
                                                          Jan 14, 2025 22:43:14.790326118 CET49971445192.168.2.9136.196.81.224
                                                          Jan 14, 2025 22:43:14.790570974 CET49972445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:14.795334101 CET44549971136.196.81.224192.168.2.9
                                                          Jan 14, 2025 22:43:14.795345068 CET44549972136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:43:14.795406103 CET49971445192.168.2.9136.196.81.224
                                                          Jan 14, 2025 22:43:14.795414925 CET49972445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:14.795478106 CET49972445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:14.795768976 CET49973445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:14.800477028 CET44549972136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:43:14.800535917 CET49972445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:14.800708055 CET44549973136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:43:14.800762892 CET49973445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:14.800818920 CET49973445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:14.805569887 CET44549973136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:43:16.799298048 CET50003445192.168.2.9143.113.52.182
                                                          Jan 14, 2025 22:43:16.804202080 CET44550003143.113.52.182192.168.2.9
                                                          Jan 14, 2025 22:43:16.804267883 CET50003445192.168.2.9143.113.52.182
                                                          Jan 14, 2025 22:43:16.804356098 CET50003445192.168.2.9143.113.52.182
                                                          Jan 14, 2025 22:43:16.804558039 CET50004445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:16.809341908 CET44550003143.113.52.182192.168.2.9
                                                          Jan 14, 2025 22:43:16.809353113 CET44550004143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:16.809391975 CET50003445192.168.2.9143.113.52.182
                                                          Jan 14, 2025 22:43:16.809426069 CET50004445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:16.809519053 CET50004445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:16.809887886 CET50005445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:16.814332962 CET44550004143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:16.814526081 CET44550004143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:16.814562082 CET50004445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:16.814647913 CET44550005143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:16.814693928 CET50005445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:16.814727068 CET50005445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:16.819438934 CET44550005143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:17.359000921 CET5226253192.168.2.91.1.1.1
                                                          Jan 14, 2025 22:43:17.364404917 CET53522621.1.1.1192.168.2.9
                                                          Jan 14, 2025 22:43:17.364476919 CET5226253192.168.2.91.1.1.1
                                                          Jan 14, 2025 22:43:17.369286060 CET53522621.1.1.1192.168.2.9
                                                          Jan 14, 2025 22:43:17.838731050 CET5226253192.168.2.91.1.1.1
                                                          Jan 14, 2025 22:43:17.843687057 CET53522621.1.1.1192.168.2.9
                                                          Jan 14, 2025 22:43:17.843765020 CET5226253192.168.2.91.1.1.1
                                                          Jan 14, 2025 22:43:18.833586931 CET52290445192.168.2.9181.221.235.219
                                                          Jan 14, 2025 22:43:18.838532925 CET44552290181.221.235.219192.168.2.9
                                                          Jan 14, 2025 22:43:18.840543985 CET52290445192.168.2.9181.221.235.219
                                                          Jan 14, 2025 22:43:18.842094898 CET52290445192.168.2.9181.221.235.219
                                                          Jan 14, 2025 22:43:18.842328072 CET52291445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:18.846853971 CET44552290181.221.235.219192.168.2.9
                                                          Jan 14, 2025 22:43:18.846926928 CET52290445192.168.2.9181.221.235.219
                                                          Jan 14, 2025 22:43:18.847103119 CET44552291181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:43:18.847176075 CET52291445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:18.850756884 CET52291445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:18.855309963 CET52292445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:18.855557919 CET44552291181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:43:18.855628014 CET52291445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:18.860069036 CET44552292181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:43:18.862993002 CET52292445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:18.873769999 CET52292445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:18.878634930 CET44552292181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:43:20.830002069 CET52324445192.168.2.952.178.54.35
                                                          Jan 14, 2025 22:43:20.834882021 CET4455232452.178.54.35192.168.2.9
                                                          Jan 14, 2025 22:43:20.835047960 CET52324445192.168.2.952.178.54.35
                                                          Jan 14, 2025 22:43:20.835109949 CET52324445192.168.2.952.178.54.35
                                                          Jan 14, 2025 22:43:20.835479021 CET52325445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:20.840028048 CET4455232452.178.54.35192.168.2.9
                                                          Jan 14, 2025 22:43:20.840097904 CET52324445192.168.2.952.178.54.35
                                                          Jan 14, 2025 22:43:20.840248108 CET4455232552.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:43:20.840367079 CET52325445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:20.840367079 CET52325445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:20.840848923 CET52326445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:20.845602036 CET4455232552.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:43:20.845649004 CET4455232652.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:43:20.845671892 CET52325445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:20.845740080 CET52326445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:20.845798016 CET52326445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:20.850595951 CET4455232652.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:43:22.845999002 CET52361445192.168.2.9181.105.239.130
                                                          Jan 14, 2025 22:43:22.850980043 CET44552361181.105.239.130192.168.2.9
                                                          Jan 14, 2025 22:43:22.851155043 CET52361445192.168.2.9181.105.239.130
                                                          Jan 14, 2025 22:43:22.851155043 CET52361445192.168.2.9181.105.239.130
                                                          Jan 14, 2025 22:43:22.851285934 CET52362445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:22.856158972 CET44552361181.105.239.130192.168.2.9
                                                          Jan 14, 2025 22:43:22.856184006 CET44552362181.105.239.1192.168.2.9
                                                          Jan 14, 2025 22:43:22.856297970 CET52362445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:22.856301069 CET52361445192.168.2.9181.105.239.130
                                                          Jan 14, 2025 22:43:22.856398106 CET52362445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:22.856755018 CET52363445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:22.861428022 CET44552362181.105.239.1192.168.2.9
                                                          Jan 14, 2025 22:43:22.861567974 CET44552363181.105.239.1192.168.2.9
                                                          Jan 14, 2025 22:43:22.861618042 CET52362445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:22.861787081 CET52363445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:22.861787081 CET52363445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:22.866652012 CET44552363181.105.239.1192.168.2.9
                                                          Jan 14, 2025 22:43:24.073685884 CET44549754100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:24.073769093 CET49754445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:24.073821068 CET49754445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:24.073895931 CET49754445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:24.078532934 CET44549754100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:24.078640938 CET44549754100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:24.882813931 CET52396445192.168.2.9201.15.39.106
                                                          Jan 14, 2025 22:43:24.887626886 CET44552396201.15.39.106192.168.2.9
                                                          Jan 14, 2025 22:43:24.887686014 CET52396445192.168.2.9201.15.39.106
                                                          Jan 14, 2025 22:43:24.887844086 CET52396445192.168.2.9201.15.39.106
                                                          Jan 14, 2025 22:43:24.887979984 CET52398445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:24.892626047 CET44552396201.15.39.106192.168.2.9
                                                          Jan 14, 2025 22:43:24.892683029 CET52396445192.168.2.9201.15.39.106
                                                          Jan 14, 2025 22:43:24.892726898 CET44552398201.15.39.1192.168.2.9
                                                          Jan 14, 2025 22:43:24.892784119 CET52398445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:24.892851114 CET52398445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:24.893086910 CET52399445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:24.897656918 CET44552398201.15.39.1192.168.2.9
                                                          Jan 14, 2025 22:43:24.897725105 CET52398445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:24.897876024 CET44552399201.15.39.1192.168.2.9
                                                          Jan 14, 2025 22:43:24.897965908 CET52399445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:24.897998095 CET52399445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:24.902753115 CET44552399201.15.39.1192.168.2.9
                                                          Jan 14, 2025 22:43:26.055751085 CET4454978999.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:26.055861950 CET49789445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:26.055911064 CET49789445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:26.055980921 CET49789445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:26.060810089 CET4454978999.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:26.060843945 CET4454978999.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:26.892510891 CET52431445192.168.2.985.167.36.211
                                                          Jan 14, 2025 22:43:26.897470951 CET4455243185.167.36.211192.168.2.9
                                                          Jan 14, 2025 22:43:26.897574902 CET52431445192.168.2.985.167.36.211
                                                          Jan 14, 2025 22:43:26.897623062 CET52431445192.168.2.985.167.36.211
                                                          Jan 14, 2025 22:43:26.899336100 CET52432445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:26.902689934 CET4455243185.167.36.211192.168.2.9
                                                          Jan 14, 2025 22:43:26.902785063 CET52431445192.168.2.985.167.36.211
                                                          Jan 14, 2025 22:43:26.904165983 CET4455243285.167.36.1192.168.2.9
                                                          Jan 14, 2025 22:43:26.904299021 CET52432445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:26.904386044 CET52432445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:26.904827118 CET52433445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:26.909311056 CET4455243285.167.36.1192.168.2.9
                                                          Jan 14, 2025 22:43:26.909447908 CET52432445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:26.909674883 CET4455243385.167.36.1192.168.2.9
                                                          Jan 14, 2025 22:43:26.909746885 CET52433445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:26.909770012 CET52433445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:26.914721012 CET4455243385.167.36.1192.168.2.9
                                                          Jan 14, 2025 22:43:27.080183983 CET52437445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:27.084918022 CET44552437100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:27.084983110 CET52437445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:27.085031986 CET52437445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:27.089914083 CET44552437100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:28.909504890 CET52459445192.168.2.945.247.224.71
                                                          Jan 14, 2025 22:43:28.915468931 CET4455245945.247.224.71192.168.2.9
                                                          Jan 14, 2025 22:43:28.915803909 CET52459445192.168.2.945.247.224.71
                                                          Jan 14, 2025 22:43:28.915803909 CET52459445192.168.2.945.247.224.71
                                                          Jan 14, 2025 22:43:28.915930033 CET52460445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:28.921888113 CET4455246045.247.224.1192.168.2.9
                                                          Jan 14, 2025 22:43:28.921998024 CET52460445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:28.922044992 CET52460445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:28.922362089 CET4455245945.247.224.71192.168.2.9
                                                          Jan 14, 2025 22:43:28.922508955 CET52461445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:28.922529936 CET52459445192.168.2.945.247.224.71
                                                          Jan 14, 2025 22:43:28.928205013 CET4455246045.247.224.1192.168.2.9
                                                          Jan 14, 2025 22:43:28.928323984 CET52460445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:28.928359032 CET4455246145.247.224.1192.168.2.9
                                                          Jan 14, 2025 22:43:28.928451061 CET52461445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:28.928524971 CET52461445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:28.934360981 CET4455246145.247.224.1192.168.2.9
                                                          Jan 14, 2025 22:43:29.064230919 CET52463445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:29.069432974 CET4455246399.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:29.069514036 CET52463445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:29.069559097 CET52463445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:29.075615883 CET4455246399.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:30.118551016 CET445498594.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:30.118676901 CET49859445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:30.118752003 CET49859445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:30.118837118 CET49859445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:30.123569012 CET445498594.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:30.123583078 CET445498594.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:30.967205048 CET52474445192.168.2.9102.101.193.11
                                                          Jan 14, 2025 22:43:30.972016096 CET44552474102.101.193.11192.168.2.9
                                                          Jan 14, 2025 22:43:30.972110987 CET52474445192.168.2.9102.101.193.11
                                                          Jan 14, 2025 22:43:30.975611925 CET52474445192.168.2.9102.101.193.11
                                                          Jan 14, 2025 22:43:30.980417967 CET44552474102.101.193.11192.168.2.9
                                                          Jan 14, 2025 22:43:30.980488062 CET52474445192.168.2.9102.101.193.11
                                                          Jan 14, 2025 22:43:30.987210035 CET52475445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:30.992014885 CET44552475102.101.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:30.992085934 CET52475445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:30.993222952 CET52475445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:30.997999907 CET44552475102.101.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:30.998043060 CET52476445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:30.998049021 CET52475445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:31.002787113 CET44552476102.101.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:31.003077984 CET52476445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:31.004101992 CET52476445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:31.008833885 CET44552476102.101.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:32.132339954 CET4454989664.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:32.132405996 CET49896445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:32.132448912 CET49896445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:32.132519007 CET49896445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:32.137252092 CET4454989664.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:32.137280941 CET4454989664.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:33.126657963 CET52487445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:33.131632090 CET445524874.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:33.131712914 CET52487445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:33.131786108 CET52487445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:33.136548996 CET445524874.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:34.124233961 CET52494445192.168.2.9144.109.189.166
                                                          Jan 14, 2025 22:43:34.129908085 CET44552494144.109.189.166192.168.2.9
                                                          Jan 14, 2025 22:43:34.129992008 CET52494445192.168.2.9144.109.189.166
                                                          Jan 14, 2025 22:43:34.133701086 CET52494445192.168.2.9144.109.189.166
                                                          Jan 14, 2025 22:43:34.133917093 CET52495445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:34.138752937 CET44552495144.109.189.1192.168.2.9
                                                          Jan 14, 2025 22:43:34.138814926 CET52495445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:34.138930082 CET52495445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:34.139071941 CET44552494144.109.189.166192.168.2.9
                                                          Jan 14, 2025 22:43:34.139123917 CET52494445192.168.2.9144.109.189.166
                                                          Jan 14, 2025 22:43:34.139904022 CET52496445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:34.144403934 CET44552495144.109.189.1192.168.2.9
                                                          Jan 14, 2025 22:43:34.144460917 CET52495445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:34.145126104 CET44552496144.109.189.1192.168.2.9
                                                          Jan 14, 2025 22:43:34.145191908 CET52496445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:34.150074959 CET52496445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:34.155520916 CET44552496144.109.189.1192.168.2.9
                                                          Jan 14, 2025 22:43:34.196585894 CET44549932190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:34.196661949 CET49932445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:34.248883009 CET49932445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:34.249041080 CET49932445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:34.253650904 CET44549932190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:34.253762007 CET44549932190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:34.883068085 CET4454994677.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:34.883348942 CET49946445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:34.883415937 CET49946445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:34.883758068 CET49946445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:34.889261007 CET4454994677.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:34.889271021 CET4454994677.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:34.986485958 CET52502445192.168.2.976.118.156.168
                                                          Jan 14, 2025 22:43:34.991846085 CET4455250276.118.156.168192.168.2.9
                                                          Jan 14, 2025 22:43:34.992017984 CET52502445192.168.2.976.118.156.168
                                                          Jan 14, 2025 22:43:34.992043018 CET52502445192.168.2.976.118.156.168
                                                          Jan 14, 2025 22:43:34.992280960 CET52503445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:34.998214960 CET4455250376.118.156.1192.168.2.9
                                                          Jan 14, 2025 22:43:34.998322964 CET52503445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:34.998356104 CET52503445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:34.998857975 CET4455250276.118.156.168192.168.2.9
                                                          Jan 14, 2025 22:43:34.998923063 CET52502445192.168.2.976.118.156.168
                                                          Jan 14, 2025 22:43:34.998992920 CET52504445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:35.004951954 CET4455250376.118.156.1192.168.2.9
                                                          Jan 14, 2025 22:43:35.004981995 CET4455250476.118.156.1192.168.2.9
                                                          Jan 14, 2025 22:43:35.005021095 CET52503445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:35.005110025 CET52504445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:35.005186081 CET52504445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:35.010277987 CET4455250476.118.156.1192.168.2.9
                                                          Jan 14, 2025 22:43:35.142091990 CET52507445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:35.147152901 CET4455250764.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:35.147253990 CET52507445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:35.147344112 CET52507445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:35.152187109 CET4455250764.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:36.163599968 CET44549973136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:43:36.163721085 CET49973445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:36.163789988 CET49973445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:36.163867950 CET49973445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:36.168612957 CET44549973136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:43:36.168654919 CET44549973136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:43:37.023247004 CET52517445192.168.2.948.189.89.156
                                                          Jan 14, 2025 22:43:37.028053045 CET4455251748.189.89.156192.168.2.9
                                                          Jan 14, 2025 22:43:37.028119087 CET52517445192.168.2.948.189.89.156
                                                          Jan 14, 2025 22:43:37.028222084 CET52517445192.168.2.948.189.89.156
                                                          Jan 14, 2025 22:43:37.028382063 CET52520445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:37.033092976 CET4455251748.189.89.156192.168.2.9
                                                          Jan 14, 2025 22:43:37.033150911 CET52517445192.168.2.948.189.89.156
                                                          Jan 14, 2025 22:43:37.033229113 CET4455252048.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:43:37.033284903 CET52520445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:37.033382893 CET52520445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:37.033715963 CET52521445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:37.038314104 CET4455252048.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:43:37.038535118 CET4455252148.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:43:37.038599968 CET52521445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:37.038609028 CET4455252048.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:43:37.038635015 CET52521445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:37.038657904 CET52520445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:37.043411016 CET4455252148.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:43:37.254297972 CET52523445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:37.259537935 CET44552523190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:37.259630919 CET52523445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:37.260961056 CET52523445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:37.265948057 CET44552523190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:37.892751932 CET52527445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:37.897571087 CET4455252777.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:37.897650957 CET52527445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:37.897720098 CET52527445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:37.902512074 CET4455252777.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:38.163578033 CET44550005143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:38.163676023 CET50005445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:38.163727045 CET50005445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:38.163774014 CET50005445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:38.168601990 CET44550005143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:38.168612003 CET44550005143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:38.892664909 CET52533445192.168.2.9150.120.191.64
                                                          Jan 14, 2025 22:43:38.897630930 CET44552533150.120.191.64192.168.2.9
                                                          Jan 14, 2025 22:43:38.897824049 CET52533445192.168.2.9150.120.191.64
                                                          Jan 14, 2025 22:43:38.897824049 CET52533445192.168.2.9150.120.191.64
                                                          Jan 14, 2025 22:43:38.897886038 CET52534445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:43:38.902698994 CET44552534150.120.191.1192.168.2.9
                                                          Jan 14, 2025 22:43:38.902766943 CET52534445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:43:38.902870893 CET44552533150.120.191.64192.168.2.9
                                                          Jan 14, 2025 22:43:38.902913094 CET52534445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:43:38.902916908 CET52533445192.168.2.9150.120.191.64
                                                          Jan 14, 2025 22:43:38.903121948 CET52535445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:43:38.907738924 CET44552534150.120.191.1192.168.2.9
                                                          Jan 14, 2025 22:43:38.907814026 CET52534445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:43:38.907964945 CET44552535150.120.191.1192.168.2.9
                                                          Jan 14, 2025 22:43:38.908027887 CET52535445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:43:38.908068895 CET52535445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:43:38.912923098 CET44552535150.120.191.1192.168.2.9
                                                          Jan 14, 2025 22:43:39.173230886 CET52537445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:39.178107977 CET44552537136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:43:39.178184032 CET52537445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:39.178224087 CET52537445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:43:39.182988882 CET44552537136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:43:40.243031979 CET44552292181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:43:40.243093967 CET52292445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:40.243151903 CET52292445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:40.243191957 CET52292445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:40.249392033 CET44552292181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:43:40.249407053 CET44552292181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:43:40.642556906 CET52547445192.168.2.969.246.167.241
                                                          Jan 14, 2025 22:43:40.647512913 CET4455254769.246.167.241192.168.2.9
                                                          Jan 14, 2025 22:43:40.647636890 CET52547445192.168.2.969.246.167.241
                                                          Jan 14, 2025 22:43:40.647680044 CET52547445192.168.2.969.246.167.241
                                                          Jan 14, 2025 22:43:40.647932053 CET52548445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:43:40.652746916 CET4455254769.246.167.241192.168.2.9
                                                          Jan 14, 2025 22:43:40.652777910 CET4455254869.246.167.1192.168.2.9
                                                          Jan 14, 2025 22:43:40.652812004 CET52547445192.168.2.969.246.167.241
                                                          Jan 14, 2025 22:43:40.652846098 CET52548445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:43:40.652895927 CET52548445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:43:40.653328896 CET52549445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:43:40.657830954 CET4455254869.246.167.1192.168.2.9
                                                          Jan 14, 2025 22:43:40.657881975 CET52548445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:43:40.658121109 CET4455254969.246.167.1192.168.2.9
                                                          Jan 14, 2025 22:43:40.658171892 CET52549445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:43:40.658212900 CET52549445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:43:40.663008928 CET4455254969.246.167.1192.168.2.9
                                                          Jan 14, 2025 22:43:41.173300028 CET52554445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:41.178181887 CET44552554143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:41.178292990 CET52554445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:41.178338051 CET52554445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:43:41.184104919 CET44552554143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:43:42.228141069 CET4455232652.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:43:42.228239059 CET52326445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:42.228293896 CET52326445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:42.228346109 CET52326445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:42.233058929 CET4455232652.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:43:42.233088017 CET4455232652.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:43:42.283512115 CET52557445192.168.2.9169.10.57.65
                                                          Jan 14, 2025 22:43:42.288444042 CET44552557169.10.57.65192.168.2.9
                                                          Jan 14, 2025 22:43:42.288558006 CET52557445192.168.2.9169.10.57.65
                                                          Jan 14, 2025 22:43:42.288639069 CET52557445192.168.2.9169.10.57.65
                                                          Jan 14, 2025 22:43:42.288774014 CET52558445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:43:42.293570995 CET44552558169.10.57.1192.168.2.9
                                                          Jan 14, 2025 22:43:42.293606043 CET44552557169.10.57.65192.168.2.9
                                                          Jan 14, 2025 22:43:42.293665886 CET52558445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:43:42.293708086 CET52557445192.168.2.9169.10.57.65
                                                          Jan 14, 2025 22:43:42.293787956 CET52558445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:43:42.294095039 CET52559445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:43:42.300282955 CET44552558169.10.57.1192.168.2.9
                                                          Jan 14, 2025 22:43:42.300299883 CET44552559169.10.57.1192.168.2.9
                                                          Jan 14, 2025 22:43:42.300347090 CET52558445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:43:42.300405979 CET52559445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:43:42.300463915 CET52559445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:43:42.305250883 CET44552559169.10.57.1192.168.2.9
                                                          Jan 14, 2025 22:43:43.253669977 CET52560445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:43.258539915 CET44552560181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:43:43.258619070 CET52560445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:43.258668900 CET52560445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:43:43.263446093 CET44552560181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:43:43.814836979 CET52561445192.168.2.9143.130.7.200
                                                          Jan 14, 2025 22:43:43.819911003 CET44552561143.130.7.200192.168.2.9
                                                          Jan 14, 2025 22:43:43.820044994 CET52561445192.168.2.9143.130.7.200
                                                          Jan 14, 2025 22:43:43.820096970 CET52561445192.168.2.9143.130.7.200
                                                          Jan 14, 2025 22:43:43.820326090 CET52562445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:43:43.825377941 CET44552562143.130.7.1192.168.2.9
                                                          Jan 14, 2025 22:43:43.825392962 CET44552561143.130.7.200192.168.2.9
                                                          Jan 14, 2025 22:43:43.825472116 CET52561445192.168.2.9143.130.7.200
                                                          Jan 14, 2025 22:43:43.825660944 CET52562445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:43:43.825660944 CET52562445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:43:43.826164007 CET52563445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:43:43.830727100 CET44552562143.130.7.1192.168.2.9
                                                          Jan 14, 2025 22:43:43.830790997 CET52562445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:43:43.830984116 CET44552563143.130.7.1192.168.2.9
                                                          Jan 14, 2025 22:43:43.831052065 CET52563445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:43:43.831084967 CET52563445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:43:43.835882902 CET44552563143.130.7.1192.168.2.9
                                                          Jan 14, 2025 22:43:44.210700035 CET44552363181.105.239.1192.168.2.9
                                                          Jan 14, 2025 22:43:44.210819006 CET52363445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:44.211066008 CET52363445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:44.211066008 CET52363445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:44.215859890 CET44552363181.105.239.1192.168.2.9
                                                          Jan 14, 2025 22:43:44.215924978 CET44552363181.105.239.1192.168.2.9
                                                          Jan 14, 2025 22:43:45.236666918 CET52564445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:45.239442110 CET52565445192.168.2.9194.135.85.58
                                                          Jan 14, 2025 22:43:45.251837015 CET4455256452.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:43:45.251852036 CET44552565194.135.85.58192.168.2.9
                                                          Jan 14, 2025 22:43:45.251935005 CET52564445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:45.252232075 CET52564445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:43:45.252235889 CET52565445192.168.2.9194.135.85.58
                                                          Jan 14, 2025 22:43:45.252350092 CET52565445192.168.2.9194.135.85.58
                                                          Jan 14, 2025 22:43:45.252562046 CET52566445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:43:45.256963968 CET4455256452.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:43:45.257379055 CET44552566194.135.85.1192.168.2.9
                                                          Jan 14, 2025 22:43:45.257464886 CET52566445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:43:45.257620096 CET52566445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:43:45.258250952 CET52567445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:43:45.258306026 CET44552565194.135.85.58192.168.2.9
                                                          Jan 14, 2025 22:43:45.259479046 CET44552565194.135.85.58192.168.2.9
                                                          Jan 14, 2025 22:43:45.259552002 CET52565445192.168.2.9194.135.85.58
                                                          Jan 14, 2025 22:43:45.262583017 CET44552566194.135.85.1192.168.2.9
                                                          Jan 14, 2025 22:43:45.262660027 CET52566445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:43:45.263144970 CET44552567194.135.85.1192.168.2.9
                                                          Jan 14, 2025 22:43:45.263236046 CET52567445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:43:45.263308048 CET52567445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:43:45.268119097 CET44552567194.135.85.1192.168.2.9
                                                          Jan 14, 2025 22:43:46.276873112 CET44552399201.15.39.1192.168.2.9
                                                          Jan 14, 2025 22:43:46.277142048 CET52399445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:46.277324915 CET52399445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:46.277503967 CET52399445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:46.282071114 CET44552399201.15.39.1192.168.2.9
                                                          Jan 14, 2025 22:43:46.282222033 CET44552399201.15.39.1192.168.2.9
                                                          Jan 14, 2025 22:43:46.565010071 CET52568445192.168.2.987.157.193.156
                                                          Jan 14, 2025 22:43:46.569904089 CET4455256887.157.193.156192.168.2.9
                                                          Jan 14, 2025 22:43:46.570121050 CET52568445192.168.2.987.157.193.156
                                                          Jan 14, 2025 22:43:46.570121050 CET52568445192.168.2.987.157.193.156
                                                          Jan 14, 2025 22:43:46.570275068 CET52569445192.168.2.987.157.193.1
                                                          Jan 14, 2025 22:43:46.575077057 CET4455256987.157.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:46.575145960 CET52569445192.168.2.987.157.193.1
                                                          Jan 14, 2025 22:43:46.575181007 CET52569445192.168.2.987.157.193.1
                                                          Jan 14, 2025 22:43:46.575349092 CET4455256887.157.193.156192.168.2.9
                                                          Jan 14, 2025 22:43:46.575407028 CET52568445192.168.2.987.157.193.156
                                                          Jan 14, 2025 22:43:46.575520039 CET52570445192.168.2.987.157.193.1
                                                          Jan 14, 2025 22:43:46.580066919 CET4455256987.157.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:46.580126047 CET52569445192.168.2.987.157.193.1
                                                          Jan 14, 2025 22:43:46.580321074 CET4455257087.157.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:46.580383062 CET52570445192.168.2.987.157.193.1
                                                          Jan 14, 2025 22:43:46.580429077 CET52570445192.168.2.987.157.193.1
                                                          Jan 14, 2025 22:43:46.585150957 CET4455257087.157.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:47.220336914 CET52571445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:47.225167990 CET44552571181.105.239.1192.168.2.9
                                                          Jan 14, 2025 22:43:47.225364923 CET52571445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:47.225364923 CET52571445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:43:47.230195045 CET44552571181.105.239.1192.168.2.9
                                                          Jan 14, 2025 22:43:47.814244032 CET52572445192.168.2.9115.211.37.229
                                                          Jan 14, 2025 22:43:47.819144964 CET44552572115.211.37.229192.168.2.9
                                                          Jan 14, 2025 22:43:47.819236040 CET52572445192.168.2.9115.211.37.229
                                                          Jan 14, 2025 22:43:47.819375992 CET52572445192.168.2.9115.211.37.229
                                                          Jan 14, 2025 22:43:47.819761992 CET52573445192.168.2.9115.211.37.1
                                                          Jan 14, 2025 22:43:47.824305058 CET44552572115.211.37.229192.168.2.9
                                                          Jan 14, 2025 22:43:47.824381113 CET52572445192.168.2.9115.211.37.229
                                                          Jan 14, 2025 22:43:47.824655056 CET44552573115.211.37.1192.168.2.9
                                                          Jan 14, 2025 22:43:47.824835062 CET52573445192.168.2.9115.211.37.1
                                                          Jan 14, 2025 22:43:47.824879885 CET52573445192.168.2.9115.211.37.1
                                                          Jan 14, 2025 22:43:47.825401068 CET52574445192.168.2.9115.211.37.1
                                                          Jan 14, 2025 22:43:47.829794884 CET44552573115.211.37.1192.168.2.9
                                                          Jan 14, 2025 22:43:47.829860926 CET52573445192.168.2.9115.211.37.1
                                                          Jan 14, 2025 22:43:47.830286026 CET44552574115.211.37.1192.168.2.9
                                                          Jan 14, 2025 22:43:47.830354929 CET52574445192.168.2.9115.211.37.1
                                                          Jan 14, 2025 22:43:47.830388069 CET52574445192.168.2.9115.211.37.1
                                                          Jan 14, 2025 22:43:47.835140944 CET44552574115.211.37.1192.168.2.9
                                                          Jan 14, 2025 22:43:48.292926073 CET4455243385.167.36.1192.168.2.9
                                                          Jan 14, 2025 22:43:48.293005943 CET52433445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:48.293308020 CET52433445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:48.293359995 CET52433445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:48.298372984 CET4455243385.167.36.1192.168.2.9
                                                          Jan 14, 2025 22:43:48.298412085 CET4455243385.167.36.1192.168.2.9
                                                          Jan 14, 2025 22:43:48.450774908 CET44552437100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:48.450845003 CET52437445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:48.450881958 CET52437445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:48.450947046 CET52437445192.168.2.9100.186.60.1
                                                          Jan 14, 2025 22:43:48.455785990 CET44552437100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:48.455817938 CET44552437100.186.60.1192.168.2.9
                                                          Jan 14, 2025 22:43:48.884540081 CET52575445192.168.2.9100.186.60.2
                                                          Jan 14, 2025 22:43:48.889487982 CET44552575100.186.60.2192.168.2.9
                                                          Jan 14, 2025 22:43:48.889580011 CET52575445192.168.2.9100.186.60.2
                                                          Jan 14, 2025 22:43:48.889673948 CET52575445192.168.2.9100.186.60.2
                                                          Jan 14, 2025 22:43:48.895085096 CET44552575100.186.60.2192.168.2.9
                                                          Jan 14, 2025 22:43:48.895138979 CET52575445192.168.2.9100.186.60.2
                                                          Jan 14, 2025 22:43:49.210393906 CET52576445192.168.2.9100.186.60.2
                                                          Jan 14, 2025 22:43:49.215205908 CET44552576100.186.60.2192.168.2.9
                                                          Jan 14, 2025 22:43:49.215275049 CET52576445192.168.2.9100.186.60.2
                                                          Jan 14, 2025 22:43:49.215358019 CET52576445192.168.2.9100.186.60.2
                                                          Jan 14, 2025 22:43:49.220134974 CET44552576100.186.60.2192.168.2.9
                                                          Jan 14, 2025 22:43:49.282638073 CET52577445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:49.287647963 CET44552577201.15.39.1192.168.2.9
                                                          Jan 14, 2025 22:43:49.287734032 CET52577445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:49.287775993 CET52577445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:43:49.292588949 CET44552577201.15.39.1192.168.2.9
                                                          Jan 14, 2025 22:43:49.337863922 CET52578445192.168.2.93.72.157.164
                                                          Jan 14, 2025 22:43:49.342833996 CET445525783.72.157.164192.168.2.9
                                                          Jan 14, 2025 22:43:49.342966080 CET52578445192.168.2.93.72.157.164
                                                          Jan 14, 2025 22:43:49.343142033 CET52578445192.168.2.93.72.157.164
                                                          Jan 14, 2025 22:43:49.343143940 CET52579445192.168.2.93.72.157.1
                                                          Jan 14, 2025 22:43:49.348108053 CET445525783.72.157.164192.168.2.9
                                                          Jan 14, 2025 22:43:49.348140955 CET445525793.72.157.1192.168.2.9
                                                          Jan 14, 2025 22:43:49.348181009 CET52578445192.168.2.93.72.157.164
                                                          Jan 14, 2025 22:43:49.348221064 CET52579445192.168.2.93.72.157.1
                                                          Jan 14, 2025 22:43:49.348287106 CET52579445192.168.2.93.72.157.1
                                                          Jan 14, 2025 22:43:49.353214979 CET445525793.72.157.1192.168.2.9
                                                          Jan 14, 2025 22:43:49.353348970 CET52579445192.168.2.93.72.157.1
                                                          Jan 14, 2025 22:43:49.369457006 CET52580445192.168.2.93.72.157.1
                                                          Jan 14, 2025 22:43:49.374414921 CET445525803.72.157.1192.168.2.9
                                                          Jan 14, 2025 22:43:49.374514103 CET52580445192.168.2.93.72.157.1
                                                          Jan 14, 2025 22:43:49.374567032 CET52580445192.168.2.93.72.157.1
                                                          Jan 14, 2025 22:43:49.379369974 CET445525803.72.157.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.300312042 CET52581445192.168.2.9169.191.254.175
                                                          Jan 14, 2025 22:43:50.305227041 CET44552581169.191.254.175192.168.2.9
                                                          Jan 14, 2025 22:43:50.305388927 CET52581445192.168.2.9169.191.254.175
                                                          Jan 14, 2025 22:43:50.305452108 CET52581445192.168.2.9169.191.254.175
                                                          Jan 14, 2025 22:43:50.305756092 CET52582445192.168.2.9169.191.254.1
                                                          Jan 14, 2025 22:43:50.310298920 CET44552581169.191.254.175192.168.2.9
                                                          Jan 14, 2025 22:43:50.310373068 CET44552581169.191.254.175192.168.2.9
                                                          Jan 14, 2025 22:43:50.310461998 CET52581445192.168.2.9169.191.254.175
                                                          Jan 14, 2025 22:43:50.310592890 CET44552582169.191.254.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.310806036 CET52582445192.168.2.9169.191.254.1
                                                          Jan 14, 2025 22:43:50.310892105 CET52582445192.168.2.9169.191.254.1
                                                          Jan 14, 2025 22:43:50.311991930 CET52583445192.168.2.9169.191.254.1
                                                          Jan 14, 2025 22:43:50.315923929 CET44552582169.191.254.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.316046953 CET52582445192.168.2.9169.191.254.1
                                                          Jan 14, 2025 22:43:50.316859961 CET44552583169.191.254.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.316983938 CET52583445192.168.2.9169.191.254.1
                                                          Jan 14, 2025 22:43:50.317059994 CET52583445192.168.2.9169.191.254.1
                                                          Jan 14, 2025 22:43:50.321914911 CET44552583169.191.254.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.323862076 CET4455246145.247.224.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.323981047 CET52461445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:50.324058056 CET52461445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:50.324166059 CET52461445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:50.328946114 CET4455246145.247.224.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.328974962 CET4455246145.247.224.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.429554939 CET4455246399.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.429680109 CET52463445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:50.432742119 CET52463445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:50.432742119 CET52463445192.168.2.999.38.44.1
                                                          Jan 14, 2025 22:43:50.437660933 CET4455246399.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.437693119 CET4455246399.38.44.1192.168.2.9
                                                          Jan 14, 2025 22:43:50.485888958 CET52584445192.168.2.999.38.44.2
                                                          Jan 14, 2025 22:43:50.491394043 CET4455258499.38.44.2192.168.2.9
                                                          Jan 14, 2025 22:43:50.491544008 CET52584445192.168.2.999.38.44.2
                                                          Jan 14, 2025 22:43:50.491637945 CET52584445192.168.2.999.38.44.2
                                                          Jan 14, 2025 22:43:50.492393017 CET52585445192.168.2.999.38.44.2
                                                          Jan 14, 2025 22:43:50.497699022 CET4455258499.38.44.2192.168.2.9
                                                          Jan 14, 2025 22:43:50.497796059 CET52584445192.168.2.999.38.44.2
                                                          Jan 14, 2025 22:43:50.498209953 CET4455258599.38.44.2192.168.2.9
                                                          Jan 14, 2025 22:43:50.498334885 CET52585445192.168.2.999.38.44.2
                                                          Jan 14, 2025 22:43:50.498402119 CET52585445192.168.2.999.38.44.2
                                                          Jan 14, 2025 22:43:50.504321098 CET4455258599.38.44.2192.168.2.9
                                                          Jan 14, 2025 22:43:51.142044067 CET4970580192.168.2.9199.232.214.172
                                                          Jan 14, 2025 22:43:51.147182941 CET8049705199.232.214.172192.168.2.9
                                                          Jan 14, 2025 22:43:51.147427082 CET4970580192.168.2.9199.232.214.172
                                                          Jan 14, 2025 22:43:51.298324108 CET52586445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:51.303299904 CET4455258685.167.36.1192.168.2.9
                                                          Jan 14, 2025 22:43:51.303426981 CET52586445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:51.303570986 CET52586445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:43:51.308386087 CET4455258685.167.36.1192.168.2.9
                                                          Jan 14, 2025 22:43:51.314816952 CET52587445192.168.2.9210.166.219.171
                                                          Jan 14, 2025 22:43:51.319669008 CET44552587210.166.219.171192.168.2.9
                                                          Jan 14, 2025 22:43:51.319756031 CET52587445192.168.2.9210.166.219.171
                                                          Jan 14, 2025 22:43:51.319848061 CET52587445192.168.2.9210.166.219.171
                                                          Jan 14, 2025 22:43:51.319947958 CET52588445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:51.324882030 CET44552588210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:51.324913979 CET44552587210.166.219.171192.168.2.9
                                                          Jan 14, 2025 22:43:51.324990034 CET52588445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:51.325022936 CET52587445192.168.2.9210.166.219.171
                                                          Jan 14, 2025 22:43:51.325133085 CET52588445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:51.325748920 CET52589445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:51.330084085 CET44552588210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:51.330156088 CET52588445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:51.330657959 CET44552589210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:51.330784082 CET52589445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:51.330821991 CET52589445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:51.335608006 CET44552589210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:52.252266884 CET52590445192.168.2.975.17.203.131
                                                          Jan 14, 2025 22:43:52.257199049 CET4455259075.17.203.131192.168.2.9
                                                          Jan 14, 2025 22:43:52.257280111 CET52590445192.168.2.975.17.203.131
                                                          Jan 14, 2025 22:43:52.257455111 CET52590445192.168.2.975.17.203.131
                                                          Jan 14, 2025 22:43:52.257813931 CET52591445192.168.2.975.17.203.1
                                                          Jan 14, 2025 22:43:52.262300014 CET4455259075.17.203.131192.168.2.9
                                                          Jan 14, 2025 22:43:52.262691975 CET4455259175.17.203.1192.168.2.9
                                                          Jan 14, 2025 22:43:52.262702942 CET4455259075.17.203.131192.168.2.9
                                                          Jan 14, 2025 22:43:52.262761116 CET52590445192.168.2.975.17.203.131
                                                          Jan 14, 2025 22:43:52.262828112 CET52591445192.168.2.975.17.203.1
                                                          Jan 14, 2025 22:43:52.263077021 CET52591445192.168.2.975.17.203.1
                                                          Jan 14, 2025 22:43:52.263709068 CET52592445192.168.2.975.17.203.1
                                                          Jan 14, 2025 22:43:52.268304110 CET4455259175.17.203.1192.168.2.9
                                                          Jan 14, 2025 22:43:52.268359900 CET52591445192.168.2.975.17.203.1
                                                          Jan 14, 2025 22:43:52.268522978 CET4455259275.17.203.1192.168.2.9
                                                          Jan 14, 2025 22:43:52.268580914 CET52592445192.168.2.975.17.203.1
                                                          Jan 14, 2025 22:43:52.268769026 CET52592445192.168.2.975.17.203.1
                                                          Jan 14, 2025 22:43:52.273525953 CET4455259275.17.203.1192.168.2.9
                                                          Jan 14, 2025 22:43:52.353806973 CET44552476102.101.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:52.353878975 CET52476445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:52.353920937 CET52476445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:52.353986979 CET52476445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:52.358647108 CET44552476102.101.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:52.358735085 CET44552476102.101.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.128015041 CET52593445192.168.2.971.168.64.61
                                                          Jan 14, 2025 22:43:53.132901907 CET4455259371.168.64.61192.168.2.9
                                                          Jan 14, 2025 22:43:53.133053064 CET52593445192.168.2.971.168.64.61
                                                          Jan 14, 2025 22:43:53.133095026 CET52593445192.168.2.971.168.64.61
                                                          Jan 14, 2025 22:43:53.133291006 CET52594445192.168.2.971.168.64.1
                                                          Jan 14, 2025 22:43:53.138109922 CET4455259471.168.64.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.138143063 CET4455259371.168.64.61192.168.2.9
                                                          Jan 14, 2025 22:43:53.138216972 CET52594445192.168.2.971.168.64.1
                                                          Jan 14, 2025 22:43:53.138257027 CET52593445192.168.2.971.168.64.61
                                                          Jan 14, 2025 22:43:53.138417959 CET52594445192.168.2.971.168.64.1
                                                          Jan 14, 2025 22:43:53.138880968 CET52595445192.168.2.971.168.64.1
                                                          Jan 14, 2025 22:43:53.143373966 CET4455259471.168.64.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.143580914 CET52594445192.168.2.971.168.64.1
                                                          Jan 14, 2025 22:43:53.143676043 CET4455259571.168.64.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.143754005 CET52595445192.168.2.971.168.64.1
                                                          Jan 14, 2025 22:43:53.143848896 CET52595445192.168.2.971.168.64.1
                                                          Jan 14, 2025 22:43:53.148668051 CET4455259571.168.64.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.165725946 CET44552589210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.165854931 CET52589445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:53.166053057 CET52589445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:53.166085005 CET52589445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:53.170938015 CET44552589210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.170969009 CET44552589210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.329902887 CET52596445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:53.334785938 CET4455259645.247.224.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.334908962 CET52596445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:53.334938049 CET52596445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:43:53.339801073 CET4455259645.247.224.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.955077887 CET52597445192.168.2.972.237.206.254
                                                          Jan 14, 2025 22:43:53.959991932 CET4455259772.237.206.254192.168.2.9
                                                          Jan 14, 2025 22:43:53.960095882 CET52597445192.168.2.972.237.206.254
                                                          Jan 14, 2025 22:43:53.960150003 CET52597445192.168.2.972.237.206.254
                                                          Jan 14, 2025 22:43:53.960253000 CET52598445192.168.2.972.237.206.1
                                                          Jan 14, 2025 22:43:53.965029955 CET4455259872.237.206.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.965125084 CET52598445192.168.2.972.237.206.1
                                                          Jan 14, 2025 22:43:53.965156078 CET52598445192.168.2.972.237.206.1
                                                          Jan 14, 2025 22:43:53.965157986 CET4455259772.237.206.254192.168.2.9
                                                          Jan 14, 2025 22:43:53.965210915 CET52597445192.168.2.972.237.206.254
                                                          Jan 14, 2025 22:43:53.965615034 CET52599445192.168.2.972.237.206.1
                                                          Jan 14, 2025 22:43:53.970127106 CET4455259872.237.206.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.970222950 CET52598445192.168.2.972.237.206.1
                                                          Jan 14, 2025 22:43:53.970478058 CET4455259972.237.206.1192.168.2.9
                                                          Jan 14, 2025 22:43:53.970545053 CET52599445192.168.2.972.237.206.1
                                                          Jan 14, 2025 22:43:53.972300053 CET52599445192.168.2.972.237.206.1
                                                          Jan 14, 2025 22:43:53.977081060 CET4455259972.237.206.1192.168.2.9
                                                          Jan 14, 2025 22:43:54.476409912 CET445524874.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:54.476481915 CET52487445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:54.476547956 CET52487445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:54.476624012 CET52487445192.168.2.94.3.90.1
                                                          Jan 14, 2025 22:43:54.481355906 CET445524874.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:54.481506109 CET445524874.3.90.1192.168.2.9
                                                          Jan 14, 2025 22:43:54.533118010 CET52601445192.168.2.94.3.90.2
                                                          Jan 14, 2025 22:43:54.537941933 CET445526014.3.90.2192.168.2.9
                                                          Jan 14, 2025 22:43:54.538022041 CET52601445192.168.2.94.3.90.2
                                                          Jan 14, 2025 22:43:54.538119078 CET52601445192.168.2.94.3.90.2
                                                          Jan 14, 2025 22:43:54.539120913 CET52602445192.168.2.94.3.90.2
                                                          Jan 14, 2025 22:43:54.542959929 CET445526014.3.90.2192.168.2.9
                                                          Jan 14, 2025 22:43:54.543018103 CET52601445192.168.2.94.3.90.2
                                                          Jan 14, 2025 22:43:54.543915033 CET445526024.3.90.2192.168.2.9
                                                          Jan 14, 2025 22:43:54.543981075 CET52602445192.168.2.94.3.90.2
                                                          Jan 14, 2025 22:43:54.544076920 CET52602445192.168.2.94.3.90.2
                                                          Jan 14, 2025 22:43:54.548823118 CET445526024.3.90.2192.168.2.9
                                                          Jan 14, 2025 22:43:54.735987902 CET52603445192.168.2.987.181.237.59
                                                          Jan 14, 2025 22:43:54.740782022 CET4455260387.181.237.59192.168.2.9
                                                          Jan 14, 2025 22:43:54.740868092 CET52603445192.168.2.987.181.237.59
                                                          Jan 14, 2025 22:43:54.743557930 CET52603445192.168.2.987.181.237.59
                                                          Jan 14, 2025 22:43:54.743727922 CET52604445192.168.2.987.181.237.1
                                                          Jan 14, 2025 22:43:54.748513937 CET4455260487.181.237.1192.168.2.9
                                                          Jan 14, 2025 22:43:54.748523951 CET4455260387.181.237.59192.168.2.9
                                                          Jan 14, 2025 22:43:54.748594046 CET52603445192.168.2.987.181.237.59
                                                          Jan 14, 2025 22:43:54.748605013 CET52604445192.168.2.987.181.237.1
                                                          Jan 14, 2025 22:43:54.751247883 CET52604445192.168.2.987.181.237.1
                                                          Jan 14, 2025 22:43:54.755225897 CET52605445192.168.2.987.181.237.1
                                                          Jan 14, 2025 22:43:54.756042004 CET4455260487.181.237.1192.168.2.9
                                                          Jan 14, 2025 22:43:54.756092072 CET52604445192.168.2.987.181.237.1
                                                          Jan 14, 2025 22:43:54.760143042 CET4455260587.181.237.1192.168.2.9
                                                          Jan 14, 2025 22:43:54.760209084 CET52605445192.168.2.987.181.237.1
                                                          Jan 14, 2025 22:43:54.763062000 CET52605445192.168.2.987.181.237.1
                                                          Jan 14, 2025 22:43:54.767947912 CET4455260587.181.237.1192.168.2.9
                                                          Jan 14, 2025 22:43:55.361208916 CET52606445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:55.366168976 CET44552606102.101.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:55.366235018 CET52606445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:55.366264105 CET52606445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:43:55.371027946 CET44552606102.101.193.1192.168.2.9
                                                          Jan 14, 2025 22:43:55.523232937 CET44552496144.109.189.1192.168.2.9
                                                          Jan 14, 2025 22:43:55.523300886 CET52496445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:55.523365974 CET52496445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:55.523411989 CET52496445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:55.528192043 CET44552496144.109.189.1192.168.2.9
                                                          Jan 14, 2025 22:43:55.528203011 CET44552496144.109.189.1192.168.2.9
                                                          Jan 14, 2025 22:43:56.173479080 CET52609445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:56.178304911 CET44552609210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:56.178400993 CET52609445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:56.178453922 CET52609445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:56.183284998 CET44552609210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:56.382596970 CET4455250476.118.156.1192.168.2.9
                                                          Jan 14, 2025 22:43:56.382715940 CET52504445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:56.386631012 CET52504445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:56.386678934 CET52504445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:56.391428947 CET4455250476.118.156.1192.168.2.9
                                                          Jan 14, 2025 22:43:56.391441107 CET4455250476.118.156.1192.168.2.9
                                                          Jan 14, 2025 22:43:56.491964102 CET4455250764.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:56.492053986 CET52507445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:56.492108107 CET52507445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:56.492177010 CET52507445192.168.2.964.4.253.1
                                                          Jan 14, 2025 22:43:56.496886015 CET4455250764.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:56.496906042 CET4455250764.4.253.1192.168.2.9
                                                          Jan 14, 2025 22:43:56.548572063 CET52610445192.168.2.964.4.253.2
                                                          Jan 14, 2025 22:43:56.553416014 CET4455261064.4.253.2192.168.2.9
                                                          Jan 14, 2025 22:43:56.553504944 CET52610445192.168.2.964.4.253.2
                                                          Jan 14, 2025 22:43:56.553533077 CET52610445192.168.2.964.4.253.2
                                                          Jan 14, 2025 22:43:56.553844929 CET52611445192.168.2.964.4.253.2
                                                          Jan 14, 2025 22:43:56.558604002 CET4455261164.4.253.2192.168.2.9
                                                          Jan 14, 2025 22:43:56.558665037 CET52611445192.168.2.964.4.253.2
                                                          Jan 14, 2025 22:43:56.558725119 CET52611445192.168.2.964.4.253.2
                                                          Jan 14, 2025 22:43:56.562757969 CET4455261064.4.253.2192.168.2.9
                                                          Jan 14, 2025 22:43:56.563575983 CET4455261164.4.253.2192.168.2.9
                                                          Jan 14, 2025 22:43:56.568336010 CET4455261064.4.253.2192.168.2.9
                                                          Jan 14, 2025 22:43:56.568387985 CET52610445192.168.2.964.4.253.2
                                                          Jan 14, 2025 22:43:58.023732901 CET44552609210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.023789883 CET52609445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:58.026324987 CET52609445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:58.026393890 CET52609445192.168.2.9210.166.219.1
                                                          Jan 14, 2025 22:43:58.031161070 CET44552609210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.031172991 CET44552609210.166.219.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.079529047 CET52619445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:58.084393024 CET44552619210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:43:58.084460020 CET52619445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:58.084700108 CET52619445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:58.085220098 CET52620445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:58.089509964 CET44552619210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:43:58.089559078 CET52619445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:58.090059996 CET44552620210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:43:58.090120077 CET52620445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:58.090240955 CET52620445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:58.094954967 CET44552620210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:43:58.400018930 CET4455252148.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.400082111 CET52521445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:58.400122881 CET52521445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:58.400167942 CET52521445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:43:58.404922009 CET4455252148.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.404933929 CET4455252148.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.532815933 CET52624445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:58.622720003 CET44552624144.109.189.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.622833967 CET52624445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:58.622879028 CET52624445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:43:58.627710104 CET44552624144.109.189.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.638216019 CET44552523190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.638305902 CET52523445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:58.638339996 CET52523445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:58.638390064 CET52523445192.168.2.9190.197.148.1
                                                          Jan 14, 2025 22:43:58.643081903 CET44552523190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.643102884 CET44552523190.197.148.1192.168.2.9
                                                          Jan 14, 2025 22:43:58.705394030 CET52625445192.168.2.9190.197.148.2
                                                          Jan 14, 2025 22:43:58.710391045 CET44552625190.197.148.2192.168.2.9
                                                          Jan 14, 2025 22:43:58.710515022 CET52625445192.168.2.9190.197.148.2
                                                          Jan 14, 2025 22:43:58.710647106 CET52625445192.168.2.9190.197.148.2
                                                          Jan 14, 2025 22:43:58.711064100 CET52626445192.168.2.9190.197.148.2
                                                          Jan 14, 2025 22:43:58.715555906 CET44552625190.197.148.2192.168.2.9
                                                          Jan 14, 2025 22:43:58.715645075 CET52625445192.168.2.9190.197.148.2
                                                          Jan 14, 2025 22:43:58.715945005 CET44552626190.197.148.2192.168.2.9
                                                          Jan 14, 2025 22:43:58.716016054 CET52626445192.168.2.9190.197.148.2
                                                          Jan 14, 2025 22:43:58.716052055 CET52626445192.168.2.9190.197.148.2
                                                          Jan 14, 2025 22:43:58.720910072 CET44552626190.197.148.2192.168.2.9
                                                          Jan 14, 2025 22:43:59.273335934 CET4455252777.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:59.273499966 CET52527445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:59.273602009 CET52527445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:59.273677111 CET52527445192.168.2.977.201.178.2
                                                          Jan 14, 2025 22:43:59.278383970 CET4455252777.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:59.278574944 CET4455252777.201.178.2192.168.2.9
                                                          Jan 14, 2025 22:43:59.330255985 CET52632445192.168.2.977.201.178.3
                                                          Jan 14, 2025 22:43:59.335117102 CET4455263277.201.178.3192.168.2.9
                                                          Jan 14, 2025 22:43:59.335247040 CET52632445192.168.2.977.201.178.3
                                                          Jan 14, 2025 22:43:59.335366964 CET52632445192.168.2.977.201.178.3
                                                          Jan 14, 2025 22:43:59.335769892 CET52633445192.168.2.977.201.178.3
                                                          Jan 14, 2025 22:43:59.340198040 CET4455263277.201.178.3192.168.2.9
                                                          Jan 14, 2025 22:43:59.340379953 CET52632445192.168.2.977.201.178.3
                                                          Jan 14, 2025 22:43:59.340537071 CET4455263377.201.178.3192.168.2.9
                                                          Jan 14, 2025 22:43:59.340615988 CET52633445192.168.2.977.201.178.3
                                                          Jan 14, 2025 22:43:59.340670109 CET52633445192.168.2.977.201.178.3
                                                          Jan 14, 2025 22:43:59.345438957 CET4455263377.201.178.3192.168.2.9
                                                          Jan 14, 2025 22:43:59.392276049 CET52634445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:59.397279978 CET4455263476.118.156.1192.168.2.9
                                                          Jan 14, 2025 22:43:59.397389889 CET52634445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:59.397428989 CET52634445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:43:59.402271032 CET4455263476.118.156.1192.168.2.9
                                                          Jan 14, 2025 22:43:59.950809002 CET44552620210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:43:59.950973988 CET52620445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:59.951028109 CET52620445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:59.951122046 CET52620445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:43:59.955815077 CET44552620210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:43:59.955939054 CET44552620210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:44:00.275096893 CET44552535150.120.191.1192.168.2.9
                                                          Jan 14, 2025 22:44:00.275206089 CET52535445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:44:00.275259972 CET52535445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:44:00.275342941 CET52535445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:44:00.280019999 CET44552535150.120.191.1192.168.2.9
                                                          Jan 14, 2025 22:44:00.280072927 CET44552535150.120.191.1192.168.2.9
                                                          Jan 14, 2025 22:44:00.539113045 CET44552537136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:44:00.539232016 CET52537445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:44:00.541871071 CET52537445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:44:00.541996956 CET52537445192.168.2.9136.196.81.1
                                                          Jan 14, 2025 22:44:00.546657085 CET44552537136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:44:00.546793938 CET44552537136.196.81.1192.168.2.9
                                                          Jan 14, 2025 22:44:00.629302025 CET52648445192.168.2.9136.196.81.2
                                                          Jan 14, 2025 22:44:00.634335995 CET44552648136.196.81.2192.168.2.9
                                                          Jan 14, 2025 22:44:00.634403944 CET52648445192.168.2.9136.196.81.2
                                                          Jan 14, 2025 22:44:00.634599924 CET52648445192.168.2.9136.196.81.2
                                                          Jan 14, 2025 22:44:00.635251999 CET52649445192.168.2.9136.196.81.2
                                                          Jan 14, 2025 22:44:00.639599085 CET44552648136.196.81.2192.168.2.9
                                                          Jan 14, 2025 22:44:00.639658928 CET52648445192.168.2.9136.196.81.2
                                                          Jan 14, 2025 22:44:00.640069008 CET44552649136.196.81.2192.168.2.9
                                                          Jan 14, 2025 22:44:00.640141010 CET52649445192.168.2.9136.196.81.2
                                                          Jan 14, 2025 22:44:00.640258074 CET52649445192.168.2.9136.196.81.2
                                                          Jan 14, 2025 22:44:00.645026922 CET44552649136.196.81.2192.168.2.9
                                                          Jan 14, 2025 22:44:01.408984900 CET52659445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:44:01.545039892 CET4455265948.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:44:01.545214891 CET52659445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:44:01.547324896 CET52659445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:44:01.553756952 CET4455265948.189.89.1192.168.2.9
                                                          Jan 14, 2025 22:44:02.044668913 CET4455254969.246.167.1192.168.2.9
                                                          Jan 14, 2025 22:44:02.044785976 CET52549445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:44:02.044831038 CET52549445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:44:02.044934988 CET52549445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:44:02.049810886 CET4455254969.246.167.1192.168.2.9
                                                          Jan 14, 2025 22:44:02.049827099 CET4455254969.246.167.1192.168.2.9
                                                          Jan 14, 2025 22:44:02.565462112 CET44552554143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:44:02.565587997 CET52554445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:44:02.565715075 CET52554445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:44:02.565836906 CET52554445192.168.2.9143.113.52.1
                                                          Jan 14, 2025 22:44:02.570938110 CET44552554143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:44:02.571041107 CET44552554143.113.52.1192.168.2.9
                                                          Jan 14, 2025 22:44:02.628408909 CET52678445192.168.2.9143.113.52.2
                                                          Jan 14, 2025 22:44:02.633284092 CET44552678143.113.52.2192.168.2.9
                                                          Jan 14, 2025 22:44:02.633460999 CET52678445192.168.2.9143.113.52.2
                                                          Jan 14, 2025 22:44:02.633972883 CET52679445192.168.2.9143.113.52.2
                                                          Jan 14, 2025 22:44:02.634054899 CET52678445192.168.2.9143.113.52.2
                                                          Jan 14, 2025 22:44:02.638803005 CET44552679143.113.52.2192.168.2.9
                                                          Jan 14, 2025 22:44:02.638875961 CET44552678143.113.52.2192.168.2.9
                                                          Jan 14, 2025 22:44:02.638902903 CET52679445192.168.2.9143.113.52.2
                                                          Jan 14, 2025 22:44:02.638941050 CET52678445192.168.2.9143.113.52.2
                                                          Jan 14, 2025 22:44:02.638977051 CET52679445192.168.2.9143.113.52.2
                                                          Jan 14, 2025 22:44:02.643732071 CET44552679143.113.52.2192.168.2.9
                                                          Jan 14, 2025 22:44:02.954480886 CET52688445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:44:02.959944963 CET44552688210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:44:02.960026026 CET52688445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:44:02.960098028 CET52688445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:44:02.964903116 CET44552688210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:44:03.287168980 CET52694445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:44:03.292037964 CET44552694150.120.191.1192.168.2.9
                                                          Jan 14, 2025 22:44:03.292145014 CET52694445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:44:03.293049097 CET52694445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:44:03.297899961 CET44552694150.120.191.1192.168.2.9
                                                          Jan 14, 2025 22:44:03.669691086 CET44552559169.10.57.1192.168.2.9
                                                          Jan 14, 2025 22:44:03.669769049 CET52559445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:44:03.672979116 CET52559445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:44:03.673063993 CET52559445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:44:03.677748919 CET44552559169.10.57.1192.168.2.9
                                                          Jan 14, 2025 22:44:03.677793980 CET44552559169.10.57.1192.168.2.9
                                                          Jan 14, 2025 22:44:04.654304028 CET44552560181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:44:04.654416084 CET52560445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:44:04.654448032 CET52560445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:44:04.654469967 CET52560445192.168.2.9181.221.235.1
                                                          Jan 14, 2025 22:44:04.659446001 CET44552560181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:44:04.659462929 CET44552560181.221.235.1192.168.2.9
                                                          Jan 14, 2025 22:44:04.720820904 CET52736445192.168.2.9181.221.235.2
                                                          Jan 14, 2025 22:44:04.725860119 CET44552736181.221.235.2192.168.2.9
                                                          Jan 14, 2025 22:44:04.726059914 CET52736445192.168.2.9181.221.235.2
                                                          Jan 14, 2025 22:44:04.726092100 CET52736445192.168.2.9181.221.235.2
                                                          Jan 14, 2025 22:44:04.726885080 CET52737445192.168.2.9181.221.235.2
                                                          Jan 14, 2025 22:44:04.731105089 CET44552736181.221.235.2192.168.2.9
                                                          Jan 14, 2025 22:44:04.731282949 CET52736445192.168.2.9181.221.235.2
                                                          Jan 14, 2025 22:44:04.731682062 CET44552737181.221.235.2192.168.2.9
                                                          Jan 14, 2025 22:44:04.731808901 CET52737445192.168.2.9181.221.235.2
                                                          Jan 14, 2025 22:44:04.731853008 CET52737445192.168.2.9181.221.235.2
                                                          Jan 14, 2025 22:44:04.736614943 CET44552737181.221.235.2192.168.2.9
                                                          Jan 14, 2025 22:44:04.788320065 CET44552688210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:44:04.788448095 CET52688445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:44:04.788541079 CET52688445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:44:04.788558960 CET52688445192.168.2.9210.166.219.2
                                                          Jan 14, 2025 22:44:04.793339014 CET44552688210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:44:04.793350935 CET44552688210.166.219.2192.168.2.9
                                                          Jan 14, 2025 22:44:04.845210075 CET52742445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:04.850111961 CET44552742210.166.219.3192.168.2.9
                                                          Jan 14, 2025 22:44:04.850188971 CET52742445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:04.850223064 CET52742445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:04.850465059 CET52743445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:04.855331898 CET44552742210.166.219.3192.168.2.9
                                                          Jan 14, 2025 22:44:04.855360985 CET44552743210.166.219.3192.168.2.9
                                                          Jan 14, 2025 22:44:04.855443954 CET52742445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:04.855489016 CET52743445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:04.855535984 CET52743445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:04.860244036 CET44552743210.166.219.3192.168.2.9
                                                          Jan 14, 2025 22:44:05.048885107 CET52750445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:44:05.053704023 CET4455275069.246.167.1192.168.2.9
                                                          Jan 14, 2025 22:44:05.053833008 CET52750445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:44:05.060359001 CET52750445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:44:05.065310955 CET4455275069.246.167.1192.168.2.9
                                                          Jan 14, 2025 22:44:05.230242968 CET44552563143.130.7.1192.168.2.9
                                                          Jan 14, 2025 22:44:05.230448008 CET52563445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:44:05.230482101 CET52563445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:44:05.230727911 CET52563445192.168.2.9143.130.7.1
                                                          Jan 14, 2025 22:44:05.235223055 CET44552563143.130.7.1192.168.2.9
                                                          Jan 14, 2025 22:44:05.235471010 CET44552563143.130.7.1192.168.2.9
                                                          Jan 14, 2025 22:44:06.601886034 CET44552567194.135.85.1192.168.2.9
                                                          Jan 14, 2025 22:44:06.601960897 CET52567445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:44:06.605809927 CET52567445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:44:06.605846882 CET52567445192.168.2.9194.135.85.1
                                                          Jan 14, 2025 22:44:06.610686064 CET44552567194.135.85.1192.168.2.9
                                                          Jan 14, 2025 22:44:06.610702038 CET44552567194.135.85.1192.168.2.9
                                                          Jan 14, 2025 22:44:06.636945963 CET4455256452.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:44:06.637008905 CET52564445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:44:06.638807058 CET52564445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:44:06.638842106 CET52564445192.168.2.952.178.54.1
                                                          Jan 14, 2025 22:44:06.643722057 CET4455256452.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:44:06.643733025 CET4455256452.178.54.1192.168.2.9
                                                          Jan 14, 2025 22:44:06.691827059 CET52874445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:44:06.696752071 CET44552874169.10.57.1192.168.2.9
                                                          Jan 14, 2025 22:44:06.696870089 CET52874445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:44:06.698072910 CET52874445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:44:06.702855110 CET44552874169.10.57.1192.168.2.9
                                                          Jan 14, 2025 22:44:06.704930067 CET52876445192.168.2.952.178.54.2
                                                          Jan 14, 2025 22:44:06.709784985 CET4455287652.178.54.2192.168.2.9
                                                          Jan 14, 2025 22:44:06.709882021 CET52876445192.168.2.952.178.54.2
                                                          Jan 14, 2025 22:44:06.717272997 CET44552743210.166.219.3192.168.2.9
                                                          Jan 14, 2025 22:44:06.717345953 CET52743445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:06.734329939 CET52876445192.168.2.952.178.54.2
                                                          Jan 14, 2025 22:44:06.739505053 CET4455287652.178.54.2192.168.2.9
                                                          Jan 14, 2025 22:44:06.739587069 CET52876445192.168.2.952.178.54.2
                                                          Jan 14, 2025 22:44:06.741985083 CET52743445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:06.741985083 CET52743445192.168.2.9210.166.219.3
                                                          Jan 14, 2025 22:44:06.746889114 CET44552743210.166.219.3192.168.2.9
                                                          Jan 14, 2025 22:44:06.746906042 CET44552743210.166.219.3192.168.2.9
                                                          Jan 14, 2025 22:44:06.781694889 CET52881445192.168.2.952.178.54.2
                                                          Jan 14, 2025 22:44:06.786570072 CET4455288152.178.54.2192.168.2.9
                                                          Jan 14, 2025 22:44:06.786636114 CET52881445192.168.2.952.178.54.2
                                                          Jan 14, 2025 22:44:07.949258089 CET4455257087.157.193.1192.168.2.9
                                                          Jan 14, 2025 22:44:07.950145006 CET52570445192.168.2.987.157.193.1
                                                          Jan 14, 2025 22:44:07.951020002 CET52580445192.168.2.93.72.157.1
                                                          Jan 14, 2025 22:44:07.951071978 CET52626445192.168.2.9190.197.148.2
                                                          Jan 14, 2025 22:44:07.951128006 CET52611445192.168.2.964.4.253.2
                                                          Jan 14, 2025 22:44:07.951159000 CET52585445192.168.2.999.38.44.2
                                                          Jan 14, 2025 22:44:07.951211929 CET52602445192.168.2.94.3.90.2
                                                          Jan 14, 2025 22:44:07.951272964 CET52881445192.168.2.952.178.54.2
                                                          Jan 14, 2025 22:44:07.951431990 CET52574445192.168.2.9115.211.37.1
                                                          Jan 14, 2025 22:44:07.951456070 CET52576445192.168.2.9100.186.60.2
                                                          Jan 14, 2025 22:44:07.951486111 CET52577445192.168.2.9201.15.39.1
                                                          Jan 14, 2025 22:44:07.951517105 CET52570445192.168.2.987.157.193.1
                                                          Jan 14, 2025 22:44:07.951518059 CET52571445192.168.2.9181.105.239.1
                                                          Jan 14, 2025 22:44:07.951518059 CET52583445192.168.2.9169.191.254.1
                                                          Jan 14, 2025 22:44:07.951545000 CET52586445192.168.2.985.167.36.1
                                                          Jan 14, 2025 22:44:07.951569080 CET52596445192.168.2.945.247.224.1
                                                          Jan 14, 2025 22:44:07.951613903 CET52592445192.168.2.975.17.203.1
                                                          Jan 14, 2025 22:44:07.951632023 CET52595445192.168.2.971.168.64.1
                                                          Jan 14, 2025 22:44:07.951668024 CET52599445192.168.2.972.237.206.1
                                                          Jan 14, 2025 22:44:07.951687098 CET52605445192.168.2.987.181.237.1
                                                          Jan 14, 2025 22:44:07.951828957 CET52624445192.168.2.9144.109.189.1
                                                          Jan 14, 2025 22:44:07.951857090 CET52634445192.168.2.976.118.156.1
                                                          Jan 14, 2025 22:44:07.951900005 CET52633445192.168.2.977.201.178.3
                                                          Jan 14, 2025 22:44:07.951931000 CET52649445192.168.2.9136.196.81.2
                                                          Jan 14, 2025 22:44:07.952053070 CET52694445192.168.2.9150.120.191.1
                                                          Jan 14, 2025 22:44:07.952059984 CET52659445192.168.2.948.189.89.1
                                                          Jan 14, 2025 22:44:07.952112913 CET52750445192.168.2.969.246.167.1
                                                          Jan 14, 2025 22:44:07.952121973 CET52606445192.168.2.9102.101.193.1
                                                          Jan 14, 2025 22:44:07.952121973 CET52679445192.168.2.9143.113.52.2
                                                          Jan 14, 2025 22:44:07.952225924 CET52737445192.168.2.9181.221.235.2
                                                          Jan 14, 2025 22:44:07.952419996 CET52874445192.168.2.9169.10.57.1
                                                          Jan 14, 2025 22:45:07.996119022 CET5288380192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:45:08.000977039 CET8052883103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:45:08.001111031 CET5288380192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:45:08.001308918 CET5288380192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:45:08.006052017 CET8052883103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:45:08.618552923 CET8052883103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:45:08.618585110 CET8052883103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:45:08.618751049 CET5288380192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:45:08.618751049 CET5288380192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:45:08.620822906 CET5288380192.168.2.9103.224.212.215
                                                          Jan 14, 2025 22:45:08.621642113 CET5288480192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:45:08.625593901 CET8052883103.224.212.215192.168.2.9
                                                          Jan 14, 2025 22:45:08.626429081 CET8052884199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:45:08.626487017 CET5288480192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:45:08.627170086 CET5288480192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:45:08.631896019 CET8052884199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:45:09.081530094 CET8052884199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:45:09.081548929 CET8052884199.59.243.228192.168.2.9
                                                          Jan 14, 2025 22:45:09.081590891 CET5288480192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:45:09.081629038 CET5288480192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:45:09.084799051 CET5288480192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:45:09.084820032 CET5288480192.168.2.9199.59.243.228
                                                          Jan 14, 2025 22:45:09.089262009 CET52885445192.168.2.9134.138.16.55
                                                          Jan 14, 2025 22:45:09.094063044 CET44552885134.138.16.55192.168.2.9
                                                          Jan 14, 2025 22:45:09.094140053 CET52885445192.168.2.9134.138.16.55
                                                          Jan 14, 2025 22:45:09.094182968 CET52885445192.168.2.9134.138.16.55
                                                          Jan 14, 2025 22:45:09.094321012 CET52886445192.168.2.9134.138.16.1
                                                          Jan 14, 2025 22:45:09.099234104 CET44552886134.138.16.1192.168.2.9
                                                          Jan 14, 2025 22:45:09.099246025 CET44552885134.138.16.55192.168.2.9
                                                          Jan 14, 2025 22:45:09.099293947 CET52885445192.168.2.9134.138.16.55
                                                          Jan 14, 2025 22:45:09.099320889 CET52886445192.168.2.9134.138.16.1
                                                          Jan 14, 2025 22:45:09.099358082 CET52886445192.168.2.9134.138.16.1
                                                          Jan 14, 2025 22:45:09.099582911 CET52889445192.168.2.9134.138.16.1
                                                          Jan 14, 2025 22:45:09.104428053 CET44552886134.138.16.1192.168.2.9
                                                          Jan 14, 2025 22:45:09.104440928 CET44552889134.138.16.1192.168.2.9
                                                          Jan 14, 2025 22:45:09.104485989 CET52886445192.168.2.9134.138.16.1
                                                          Jan 14, 2025 22:45:09.104502916 CET52889445192.168.2.9134.138.16.1
                                                          Jan 14, 2025 22:45:09.104526043 CET52889445192.168.2.9134.138.16.1
                                                          Jan 14, 2025 22:45:09.109603882 CET44552889134.138.16.1192.168.2.9
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 14, 2025 22:42:59.628746986 CET6405153192.168.2.91.1.1.1
                                                          Jan 14, 2025 22:42:59.782392979 CET53640511.1.1.1192.168.2.9
                                                          Jan 14, 2025 22:43:00.484339952 CET6075753192.168.2.91.1.1.1
                                                          Jan 14, 2025 22:43:00.815172911 CET53607571.1.1.1192.168.2.9
                                                          Jan 14, 2025 22:43:13.268645048 CET137137192.168.2.9192.168.2.255
                                                          Jan 14, 2025 22:43:14.032547951 CET137137192.168.2.9192.168.2.255
                                                          Jan 14, 2025 22:43:14.798147917 CET137137192.168.2.9192.168.2.255
                                                          Jan 14, 2025 22:43:17.358597040 CET53516251.1.1.1192.168.2.9
                                                          Jan 14, 2025 22:43:21.219237089 CET137137192.168.2.9192.168.2.255
                                                          Jan 14, 2025 22:43:21.954827070 CET137137192.168.2.9192.168.2.255
                                                          Jan 14, 2025 22:43:22.704338074 CET137137192.168.2.9192.168.2.255
                                                          Jan 14, 2025 22:43:52.029742002 CET138138192.168.2.9192.168.2.255
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 14, 2025 22:42:59.628746986 CET192.168.2.91.1.1.10x8f61Standard query (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 22:43:00.484339952 CET192.168.2.91.1.1.10xf5ebStandard query (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 14, 2025 22:42:55.661546946 CET1.1.1.1192.168.2.90xdecdNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                          Jan 14, 2025 22:42:55.661546946 CET1.1.1.1192.168.2.90xdecdNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                          Jan 14, 2025 22:42:59.782392979 CET1.1.1.1192.168.2.90x8f61No error (0)www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com103.224.212.215A (IP address)IN (0x0001)false
                                                          Jan 14, 2025 22:43:00.815172911 CET1.1.1.1192.168.2.90xf5ebNo error (0)ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com77026.bodis.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 14, 2025 22:43:00.815172911 CET1.1.1.1192.168.2.90xf5ebNo error (0)77026.bodis.com199.59.243.228A (IP address)IN (0x0001)false
                                                          • www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          • ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.949727103.224.212.215807440C:\Windows\mssecsvr.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 14, 2025 22:42:59.826843023 CET100OUTGET / HTTP/1.1
                                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          Cache-Control: no-cache
                                                          Jan 14, 2025 22:43:00.434376001 CET365INHTTP/1.1 302 Found
                                                          date: Tue, 14 Jan 2025 21:43:00 GMT
                                                          server: Apache
                                                          set-cookie: __tad=1736890980.6404981; expires=Fri, 12-Jan-2035 21:43:00 GMT; Max-Age=315360000
                                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0023-a483-adfaa7c939b2
                                                          content-length: 2
                                                          content-type: text/html; charset=UTF-8
                                                          connection: close
                                                          Data Raw: 0a 0a
                                                          Data Ascii:


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.949738199.59.243.228807440C:\Windows\mssecsvr.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 14, 2025 22:43:00.861591101 CET169OUTGET /?subid1=20250115-0843-0023-a483-adfaa7c939b2 HTTP/1.1
                                                          Cache-Control: no-cache
                                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          Connection: Keep-Alive
                                                          Jan 14, 2025 22:43:01.324824095 CET1236INHTTP/1.1 200 OK
                                                          date: Tue, 14 Jan 2025 21:43:00 GMT
                                                          content-type: text/html; charset=utf-8
                                                          content-length: 1262
                                                          x-request-id: b07e05a2-6afb-4967-a1ef-8668f7ec5591
                                                          cache-control: no-store, max-age=0
                                                          accept-ch: sec-ch-prefers-color-scheme
                                                          critical-ch: sec-ch-prefers-color-scheme
                                                          vary: sec-ch-prefers-color-scheme
                                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Ky9FCjhsz0l1jlOUH378SpLYR3fNCvRMk/PllRehm7TJhZpGTsElM7BAELm2xNdQ5CSfqpgA0XHskhWlxAdrQw==
                                                          set-cookie: parking_session=b07e05a2-6afb-4967-a1ef-8668f7ec5591; expires=Tue, 14 Jan 2025 21:58:01 GMT; path=/
                                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 4b 79 39 46 43 6a 68 73 7a 30 6c 31 6a 6c 4f 55 48 33 37 38 53 70 4c 59 52 33 66 4e 43 76 52 4d 6b 2f 50 6c 6c 52 65 68 6d 37 54 4a 68 5a 70 47 54 73 45 6c 4d 37 42 41 45 4c 6d 32 78 4e 64 51 35 43 53 66 71 70 67 41 30 58 48 73 6b 68 57 6c 78 41 64 72 51 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Ky9FCjhsz0l1jlOUH378SpLYR3fNCvRMk/PllRehm7TJhZpGTsElM7BAELm2xNdQ5CSfqpgA0XHskhWlxAdrQw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                                          Jan 14, 2025 22:43:01.324837923 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                                          Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYjA3ZTA1YTItNmFmYi00OTY3LWExZWYtODY2OGY3ZWM1NTkxIiwicGFnZV90aW1lIjoxNzM2ODkwOTgxLCJwYWdlX3VybCI6I


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.949740103.224.212.215807568C:\Windows\mssecsvr.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 14, 2025 22:43:01.483303070 CET100OUTGET / HTTP/1.1
                                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          Cache-Control: no-cache
                                                          Jan 14, 2025 22:43:02.106354952 CET365INHTTP/1.1 302 Found
                                                          date: Tue, 14 Jan 2025 21:43:02 GMT
                                                          server: Apache
                                                          set-cookie: __tad=1736890982.6646778; expires=Fri, 12-Jan-2035 21:43:02 GMT; Max-Age=315360000
                                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-0290-ac2b-9956998a5fe8
                                                          content-length: 2
                                                          content-type: text/html; charset=UTF-8
                                                          connection: close
                                                          Data Raw: 0a 0a
                                                          Data Ascii:


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.949745199.59.243.228807568C:\Windows\mssecsvr.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 14, 2025 22:43:02.144985914 CET169OUTGET /?subid1=20250115-0843-0290-ac2b-9956998a5fe8 HTTP/1.1
                                                          Cache-Control: no-cache
                                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          Connection: Keep-Alive
                                                          Jan 14, 2025 22:43:02.628145933 CET1236INHTTP/1.1 200 OK
                                                          date: Tue, 14 Jan 2025 21:43:02 GMT
                                                          content-type: text/html; charset=utf-8
                                                          content-length: 1262
                                                          x-request-id: 2cbec7df-7a4e-4fc1-b8dc-49a84fddeb8c
                                                          cache-control: no-store, max-age=0
                                                          accept-ch: sec-ch-prefers-color-scheme
                                                          critical-ch: sec-ch-prefers-color-scheme
                                                          vary: sec-ch-prefers-color-scheme
                                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_vwhqSgQvYWbGFcm3Y1N2e6SCvvs601J8tw3PkljR4Am9brMf8RXRz4ghbZ3EiCP1bBmr2rt5+7/WiszYNnExHw==
                                                          set-cookie: parking_session=2cbec7df-7a4e-4fc1-b8dc-49a84fddeb8c; expires=Tue, 14 Jan 2025 21:58:02 GMT; path=/
                                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 76 77 68 71 53 67 51 76 59 57 62 47 46 63 6d 33 59 31 4e 32 65 36 53 43 76 76 73 36 30 31 4a 38 74 77 33 50 6b 6c 6a 52 34 41 6d 39 62 72 4d 66 38 52 58 52 7a 34 67 68 62 5a 33 45 69 43 50 31 62 42 6d 72 32 72 74 35 2b 37 2f 57 69 73 7a 59 4e 6e 45 78 48 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_vwhqSgQvYWbGFcm3Y1N2e6SCvvs601J8tw3PkljR4Am9brMf8RXRz4ghbZ3EiCP1bBmr2rt5+7/WiszYNnExHw==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                                          Jan 14, 2025 22:43:02.628165007 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                                          Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiMmNiZWM3ZGYtN2E0ZS00ZmMxLWI4ZGMtNDlhODRmZGRlYjhjIiwicGFnZV90aW1lIjoxNzM2ODkwOTgyLCJwYWdlX3VybCI6I


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.949746103.224.212.215807620C:\Windows\mssecsvr.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 14, 2025 22:43:02.176923990 CET134OUTGET / HTTP/1.1
                                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          Cache-Control: no-cache
                                                          Cookie: __tad=1736890980.6404981
                                                          Jan 14, 2025 22:43:02.782998085 CET269INHTTP/1.1 302 Found
                                                          date: Tue, 14 Jan 2025 21:43:02 GMT
                                                          server: Apache
                                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0843-02ad-b855-1345e6379487
                                                          content-length: 2
                                                          content-type: text/html; charset=UTF-8
                                                          connection: close
                                                          Data Raw: 0a 0a
                                                          Data Ascii:


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.949758199.59.243.228807620C:\Windows\mssecsvr.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 14, 2025 22:43:02.793771029 CET231OUTGET /?subid1=20250115-0843-02ad-b855-1345e6379487 HTTP/1.1
                                                          Cache-Control: no-cache
                                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          Connection: Keep-Alive
                                                          Cookie: parking_session=b07e05a2-6afb-4967-a1ef-8668f7ec5591
                                                          Jan 14, 2025 22:43:03.270257950 CET1236INHTTP/1.1 200 OK
                                                          date: Tue, 14 Jan 2025 21:43:02 GMT
                                                          content-type: text/html; charset=utf-8
                                                          content-length: 1262
                                                          x-request-id: 758310cf-22d9-4389-bbfe-286bbf401fa1
                                                          cache-control: no-store, max-age=0
                                                          accept-ch: sec-ch-prefers-color-scheme
                                                          critical-ch: sec-ch-prefers-color-scheme
                                                          vary: sec-ch-prefers-color-scheme
                                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_VinMiU/YKW8qI53LjabMmeR2nBIo4K3Kbo6mA5TKsq3OL011wxkpB7uy+z6wBrn4U6Qfc21MdRoR1Nyfw0x88w==
                                                          set-cookie: parking_session=b07e05a2-6afb-4967-a1ef-8668f7ec5591; expires=Tue, 14 Jan 2025 21:58:03 GMT
                                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 56 69 6e 4d 69 55 2f 59 4b 57 38 71 49 35 33 4c 6a 61 62 4d 6d 65 52 32 6e 42 49 6f 34 4b 33 4b 62 6f 36 6d 41 35 54 4b 73 71 33 4f 4c 30 31 31 77 78 6b 70 42 37 75 79 2b 7a 36 77 42 72 6e 34 55 36 51 66 63 32 31 4d 64 52 6f 52 31 4e 79 66 77 30 78 38 38 77 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_VinMiU/YKW8qI53LjabMmeR2nBIo4K3Kbo6mA5TKsq3OL011wxkpB7uy+z6wBrn4U6Qfc21MdRoR1Nyfw0x88w==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="preconnect
                                                          Jan 14, 2025 22:43:03.270272970 CET688INData Raw: 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65 74 22 20 73 74 79 6c 65
                                                          Data Ascii: " href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiYjA3ZTA1YTItNmFmYi00OTY3LWExZWYtODY2OGY3ZWM1NTkxIiwicGFnZV90aW1lIjoxNzM2ODkwOTgzLCJwYWdlX3VybCI6Imh0dHA6L


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          6192.168.2.952883103.224.212.21580
                                                          TimestampBytes transferredDirectionData
                                                          Jan 14, 2025 22:45:08.001308918 CET100OUTGET / HTTP/1.1
                                                          Host: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          Cache-Control: no-cache
                                                          Jan 14, 2025 22:45:08.618552923 CET365INHTTP/1.1 302 Found
                                                          date: Tue, 14 Jan 2025 21:45:08 GMT
                                                          server: Apache
                                                          set-cookie: __tad=1736891108.2384685; expires=Fri, 12-Jan-2035 21:45:08 GMT; Max-Age=315360000
                                                          location: http://ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com/?subid1=20250115-0845-0884-8536-91f430fa231d
                                                          content-length: 2
                                                          content-type: text/html; charset=UTF-8
                                                          connection: close
                                                          Data Raw: 0a 0a
                                                          Data Ascii:


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          7192.168.2.952884199.59.243.22880
                                                          TimestampBytes transferredDirectionData
                                                          Jan 14, 2025 22:45:08.627170086 CET169OUTGET /?subid1=20250115-0845-0884-8536-91f430fa231d HTTP/1.1
                                                          Cache-Control: no-cache
                                                          Host: ww25.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                          Connection: Keep-Alive
                                                          Jan 14, 2025 22:45:09.081530094 CET1236INHTTP/1.1 200 OK
                                                          date: Tue, 14 Jan 2025 21:45:08 GMT
                                                          content-type: text/html; charset=utf-8
                                                          content-length: 1262
                                                          x-request-id: ce8da246-ee4b-4729-b5a6-f57171401c6c
                                                          cache-control: no-store, max-age=0
                                                          accept-ch: sec-ch-prefers-color-scheme
                                                          critical-ch: sec-ch-prefers-color-scheme
                                                          vary: sec-ch-prefers-color-scheme
                                                          x-adblock-key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_dYEgLdWT1JsQ+gXldiFOGcYd8/iFWgrJjParVcGRfpWgsBcbNKLYiOWDED8ijfFDL1sCVhdtEK6VlQXQCV17hA==
                                                          set-cookie: parking_session=ce8da246-ee4b-4729-b5a6-f57171401c6c; expires=Tue, 14 Jan 2025 22:00:09 GMT; path=/
                                                          Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4e 44 72 70 32 6c 7a 37 41 4f 6d 41 44 61 4e 38 74 41 35 30 4c 73 57 63 6a 4c 46 79 51 46 63 62 2f 50 32 54 78 63 35 38 6f 59 4f 65 49 4c 62 33 76 42 77 37 4a 36 66 34 70 61 6d 6b 41 51 56 53 51 75 71 59 73 4b 78 33 59 7a 64 55 48 43 76 62 56 5a 76 46 55 73 43 41 77 45 41 41 51 3d 3d 5f 64 59 45 67 4c 64 57 54 31 4a 73 51 2b 67 58 6c 64 69 46 4f 47 63 59 64 38 2f 69 46 57 67 72 4a 6a 50 61 72 56 63 47 52 66 70 57 67 73 42 63 62 4e 4b 4c 59 69 4f 57 44 45 44 38 69 6a 66 46 44 4c 31 73 43 56 68 64 74 45 4b 36 56 6c 51 58 51 43 56 31 37 68 41 3d 3d 22 20 6c 61 6e 67 3d 22 65 6e 22 20 73 74 79 6c 65 3d 22 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 32 42 32 42 32 42 3b 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d [TRUNCATED]
                                                          Data Ascii: <!doctype html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_dYEgLdWT1JsQ+gXldiFOGcYd8/iFWgrJjParVcGRfpWgsBcbNKLYiOWDED8ijfFDL1sCVhdtEK6VlQXQCV17hA==" lang="en" style="background: #2B2B2B;"><head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="icon" href="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAIAAACQd1PeAAAADElEQVQI12P4//8/AAX+Av7czFnnAAAAAElFTkSuQmCC"> <link rel="pr
                                                          Jan 14, 2025 22:45:09.081548929 CET696INData Raw: 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 64 69 76 20 69 64 3d 22 74 61 72 67 65
                                                          Data Ascii: econnect" href="https://www.google.com" crossorigin></head><body><div id="target" style="opacity: 0"></div><script>window.park = "eyJ1dWlkIjoiY2U4ZGEyNDYtZWU0Yi00NzI5LWI1YTYtZjU3MTcxNDAxYzZjIiwicGFnZV90aW1lIjoxNzM2ODkxMTA5LCJwYWdlX3VybCI6I


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:16:42:58
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\System32\loaddll32.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:loaddll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll"
                                                          Imagebase:0x560000
                                                          File size:126'464 bytes
                                                          MD5 hash:51E6071F9CBA48E79F10C84515AAE618
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:16:42:58
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:16:42:58
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",#1
                                                          Imagebase:0xc50000
                                                          File size:236'544 bytes
                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:16:42:58
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:rundll32.exe C:\Users\user\Desktop\habHh1BC0L.dll,PlayGame
                                                          Imagebase:0x8b0000
                                                          File size:61'440 bytes
                                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:16:42:58
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",#1
                                                          Imagebase:0x8b0000
                                                          File size:61'440 bytes
                                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:16:42:58
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\mssecsvr.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\WINDOWS\mssecsvr.exe
                                                          Imagebase:0x400000
                                                          File size:2'281'472 bytes
                                                          MD5 hash:FF830E078CB269B709C952BDF1F34D24
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000002.1373665187.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000006.00000000.1336734524.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:16:43:00
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\mssecsvr.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\WINDOWS\mssecsvr.exe -m security
                                                          Imagebase:0x400000
                                                          File size:2'281'472 bytes
                                                          MD5 hash:FF830E078CB269B709C952BDF1F34D24
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2014633028.000000000042E000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000000.1359729095.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2016361125.0000000002384000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 00000008.00000002.2015998105.0000000001E5C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:16:43:01
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\SysWOW64\rundll32.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:rundll32.exe "C:\Users\user\Desktop\habHh1BC0L.dll",PlayGame
                                                          Imagebase:0x8b0000
                                                          File size:61'440 bytes
                                                          MD5 hash:889B99C52A60DD49227C5E485A016679
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:16:43:01
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\mssecsvr.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\WINDOWS\mssecsvr.exe
                                                          Imagebase:0x400000
                                                          File size:2'281'472 bytes
                                                          MD5 hash:FF830E078CB269B709C952BDF1F34D24
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000002.1389292837.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Wannacry, Description: Yara detected Wannacry ransomware, Source: 0000000A.00000000.1365918332.000000000040F000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:11
                                                          Start time:16:43:01
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\tasksche.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\WINDOWS\tasksche.exe /i
                                                          Imagebase:0x400000
                                                          File size:2'061'938 bytes
                                                          MD5 hash:CBB4BE2403D2BE4554AA9BE6B49A7B62
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 87%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:12
                                                          Start time:16:43:03
                                                          Start date:14/01/2025
                                                          Path:C:\Windows\tasksche.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\WINDOWS\tasksche.exe /i
                                                          Imagebase:0x400000
                                                          File size:2'061'938 bytes
                                                          MD5 hash:CBB4BE2403D2BE4554AA9BE6B49A7B62
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:71.7%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:63.2%
                                                            Total number of Nodes:38
                                                            Total number of Limit Nodes:9
                                                            execution_graph 63 409a16 __set_app_type __p__fmode __p__commode 64 409a85 63->64 65 409a99 64->65 66 409a8d __setusermatherr 64->66 75 409b8c _controlfp 65->75 66->65 68 409a9e _initterm __getmainargs _initterm 69 409af2 GetStartupInfoA 68->69 71 409b26 GetModuleHandleA 69->71 76 408140 InternetOpenA InternetOpenUrlA 71->76 75->68 77 4081a7 InternetCloseHandle InternetCloseHandle 76->77 80 408090 GetModuleFileNameA __p___argc 77->80 79 4081b2 exit _XcptFilter 81 4080b0 80->81 82 4080b9 OpenSCManagerA 80->82 91 407f20 81->91 83 408101 StartServiceCtrlDispatcherA 82->83 84 4080cf OpenServiceA 82->84 83->79 86 4080fc CloseServiceHandle 84->86 87 4080ee 84->87 86->83 96 407fa0 ChangeServiceConfig2A 87->96 90 4080f6 CloseServiceHandle 90->86 108 407c40 sprintf OpenSCManagerA 91->108 93 407f25 97 407ce0 GetModuleHandleW 93->97 96->90 98 407d01 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 97->98 99 407f08 97->99 98->99 100 407d49 98->100 99->79 100->99 101 407d69 FindResourceA 100->101 101->99 102 407d84 LoadResource 101->102 102->99 103 407d94 LockResource 102->103 103->99 104 407da7 SizeofResource 103->104 104->99 105 407db9 sprintf sprintf MoveFileExA CreateFileA 104->105 105->99 106 407e54 WriteFile CloseHandle CreateProcessA 105->106 106->99 107 407ef2 CloseHandle CloseHandle 106->107 107->99 109 407c74 CreateServiceA 108->109 110 407cca 108->110 111 407cbb CloseServiceHandle 109->111 112 407cad StartServiceA CloseServiceHandle 109->112 110->93 111->93 112->111

                                                            Callgraph

                                                            Control-flow Graph

                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F9B0EF0,?,00000000), ref: 00407CEF
                                                            • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                            • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                            • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                            • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                            • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                            • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                            • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                            • sprintf.MSVCRT ref: 00407E01
                                                            • sprintf.MSVCRT ref: 00407E18
                                                            • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                            • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000004,00000000), ref: 00407E43
                                                            • WriteFile.KERNELBASE(00000000,?,00000000,?,00000000), ref: 00407E61
                                                            • CloseHandle.KERNELBASE(00000000), ref: 00407E68
                                                            • CreateProcessA.KERNELBASE ref: 00407EE8
                                                            • CloseHandle.KERNEL32(00000000), ref: 00407EF7
                                                            • CloseHandle.KERNEL32(08000000), ref: 00407F02
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.1373607042.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000006.00000002.1373582879.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373628885.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373718222.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleProcResource$CloseFile$Createsprintf$FindLoadLockModuleMoveProcessSizeofWrite
                                                            • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                            • API String ID: 4281112323-1507730452
                                                            • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                            • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                            • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                            • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                            Control-flow Graph

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.1373607042.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000006.00000002.1373582879.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373628885.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373718222.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                            • String ID:
                                                            • API String ID: 801014965-0
                                                            • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                            • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                            • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                            • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                                            Control-flow Graph

                                                            APIs
                                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                            • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                            • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                              • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                              • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                            Strings
                                                            • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.1373607042.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000006.00000002.1373582879.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373628885.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373718222.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                            • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                            • API String ID: 774561529-2614457033
                                                            • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                            • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                            • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                            • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                            Control-flow Graph

                                                            APIs
                                                            • sprintf.MSVCRT ref: 00407C56
                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                            • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F9B0EF0,00000000), ref: 00407C9B
                                                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.1373607042.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000006.00000002.1373582879.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373628885.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373718222.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                            • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                                            • API String ID: 3340711343-2450984573
                                                            • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                            • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                            • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                            • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                            Control-flow Graph

                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                            • __p___argc.MSVCRT ref: 004080A5
                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                            • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F9B0EF0,00000000,?,004081B2), ref: 004080DC
                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                            • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                            • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000006.00000002.1373607042.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000006.00000002.1373582879.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373628885.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373665187.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373718222.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000006.00000002.1373831429.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_6_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                            • String ID: mssecsvc2.1
                                                            • API String ID: 4274534310-2839763450
                                                            • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                            • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                            • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                            • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                            Execution Graph

                                                            Execution Coverage:34.8%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:36
                                                            Total number of Limit Nodes:2

                                                            Callgraph

                                                            Control-flow Graph

                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                            • __p___argc.MSVCRT ref: 004080A5
                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00000000,?,004081B2), ref: 004080C3
                                                            • OpenServiceA.ADVAPI32(00000000,mssecsvc2.1,000F01FF,6F9B0EF0,00000000,?,004081B2), ref: 004080DC
                                                            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,004081B2), ref: 004080FA
                                                            • CloseServiceHandle.ADVAPI32(00000000,?,004081B2), ref: 004080FD
                                                            • StartServiceCtrlDispatcherA.ADVAPI32(?,?,?), ref: 00408126
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2014314267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000008.00000002.2014276126.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014337204.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014633028.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014663758.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014764544.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandleOpen$CtrlDispatcherFileManagerModuleNameStart__p___argc
                                                            • String ID: mssecsvc2.1
                                                            • API String ID: 4274534310-2839763450
                                                            • Opcode ID: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                            • Instruction ID: 0eddf8d8cc97b5ba853ece0b0f9ce4fe0dc31dc3004373c78c05f92e851b2f94
                                                            • Opcode Fuzzy Hash: 14f2d0f9cf239aa653f070f930b60ae04978eb0b591616557438e437b3700a6a
                                                            • Instruction Fuzzy Hash: 4A014775640315BBE3117F149E4AF6F3AA4EF80B19F404429F544762D2DFB888188AAF

                                                            Control-flow Graph

                                                            APIs
                                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0040817B
                                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,84000000,00000000), ref: 00408194
                                                            • InternetCloseHandle.WININET(00000000), ref: 004081A7
                                                            • InternetCloseHandle.WININET(00000000), ref: 004081AB
                                                              • Part of subcall function 00408090: GetModuleFileNameA.KERNEL32(00000000,0070F760,00000104,?,004081B2), ref: 0040809F
                                                              • Part of subcall function 00408090: __p___argc.MSVCRT ref: 004080A5
                                                            Strings
                                                            • http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com, xrefs: 0040814A
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2014314267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000008.00000002.2014276126.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014337204.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014633028.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014663758.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014764544.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet$CloseHandleOpen$FileModuleName__p___argc
                                                            • String ID: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwff.com
                                                            • API String ID: 774561529-2614457033
                                                            • Opcode ID: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                            • Instruction ID: 3b8a91e0baa4f3639afdb349cfc438007093f0a6557163af6b5eb03d237fc32a
                                                            • Opcode Fuzzy Hash: 0bbc0dabe610ff42f1f9ad6e85cc21407dd9b1b68127969cd029bea3a518856a
                                                            • Instruction Fuzzy Hash: B3018671548310AEE310DF748D01B6B7BE9EF85710F01082EF984F72C0EAB59804876B

                                                            Control-flow Graph

                                                            APIs
                                                            • sprintf.MSVCRT ref: 00407C56
                                                            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00407C68
                                                            • CreateServiceA.ADVAPI32(00000000,mssecsvc2.1,Microsoft Security Center (2.1) Service,000F01FF,00000010,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000,6F9B0EF0,00000000), ref: 00407C9B
                                                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 00407CB2
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CB9
                                                            • CloseServiceHandle.ADVAPI32(00000000), ref: 00407CBC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2014314267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000008.00000002.2014276126.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014337204.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014633028.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014663758.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014764544.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Service$CloseHandle$CreateManagerOpenStartsprintf
                                                            • String ID: %s -m security$Microsoft Security Center (2.1) Service$mssecsvc2.1
                                                            • API String ID: 3340711343-2450984573
                                                            • Opcode ID: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                            • Instruction ID: 2288e5cc66680fabefb91112cf05624c6df81315eb9d87428618c258e2ee617f
                                                            • Opcode Fuzzy Hash: c3592d809756ac94f014d34e1e4fa0c14de5620095203194e3f9233ad68c92ee
                                                            • Instruction Fuzzy Hash: AD01D1717C43043BF2305B149D8BFEB3658AB84F01F500025FB44B92D0DAF9A81491AF

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 15 407ce0-407cfb GetModuleHandleW 16 407d01-407d43 GetProcAddress * 4 15->16 17 407f08-407f14 15->17 16->17 18 407d49-407d4f 16->18 18->17 19 407d55-407d5b 18->19 19->17 20 407d61-407d63 19->20 20->17 21 407d69-407d7e FindResourceA 20->21 21->17 22 407d84-407d8e LoadResource 21->22 22->17 23 407d94-407da1 LockResource 22->23 23->17 24 407da7-407db3 SizeofResource 23->24 24->17 25 407db9-407e4e sprintf * 2 MoveFileExA 24->25 25->17 27 407e54-407ef0 25->27 27->17 31 407ef2-407f01 27->31 31->17
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,6F9B0EF0,?,00000000), ref: 00407CEF
                                                            • GetProcAddress.KERNEL32(00000000,CreateProcessA), ref: 00407D0D
                                                            • GetProcAddress.KERNEL32(00000000,CreateFileA), ref: 00407D1A
                                                            • GetProcAddress.KERNEL32(00000000,WriteFile), ref: 00407D27
                                                            • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00407D34
                                                            • FindResourceA.KERNEL32(00000000,00000727,0043137C), ref: 00407D74
                                                            • LoadResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407D86
                                                            • LockResource.KERNEL32(00000000,?,00000000), ref: 00407D95
                                                            • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 00407DA9
                                                            • sprintf.MSVCRT ref: 00407E01
                                                            • sprintf.MSVCRT ref: 00407E18
                                                            • MoveFileExA.KERNEL32(?,?,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 00407E2C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2014314267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000008.00000002.2014276126.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014337204.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014633028.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014663758.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014764544.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProcResource$sprintf$FileFindHandleLoadLockModuleMoveSizeof
                                                            • String ID: /i$C:\%s\%s$C:\%s\qeriuwjhrf$CloseHandle$CreateFileA$CreateProcessA$D$WINDOWS$WriteFile$kernel32.dll$tasksche.exe
                                                            • API String ID: 4072214828-1507730452
                                                            • Opcode ID: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                            • Instruction ID: 13a48b3e7e70fc1f7524b3ea2ca00aec236584d0bbebcf852995d03268f4a9c8
                                                            • Opcode Fuzzy Hash: fb819ea0bbfac7cba45177718834bfaea6ecb5a57a4692884010a03d6946efb9
                                                            • Instruction Fuzzy Hash: B15197715043496FE7109F74DC84AAB7B98EB88354F14493EF651A32E0DA7898088BAA

                                                            Control-flow Graph

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.2014314267.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000008.00000002.2014276126.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014337204.000000000040A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040B000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014451935.000000000040F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014633028.000000000042E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014663758.000000000042F000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2014764544.0000000000431000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.0000000000710000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            • Associated: 00000008.00000002.2015069962.00000000008EA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_400000_mssecsvr.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                            • String ID:
                                                            • API String ID: 801014965-0
                                                            • Opcode ID: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                            • Instruction ID: f220c78e044b43db95b39954543cb8470338bddc8e57b6bf74c51ec52977e19a
                                                            • Opcode Fuzzy Hash: e3007c8091b935f0f6e9b16d849c1c27a397ab206965397834d54df9927598b6
                                                            • Instruction Fuzzy Hash: AF415E71800348EFDB24DFA4ED45AAA7BB8FB09720F20413BE451A72D2D7786841CB59

                                                            Execution Graph

                                                            Execution Coverage:10%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:3.2%
                                                            Total number of Nodes:2000
                                                            Total number of Limit Nodes:33
                                                            execution_graph 23822 41e9ce 23824 41e9da ___BuildCatchObjectHelper 23822->23824 23823 41e9f2 23827 41ea00 23823->23827 23828 41a506 __freebuf 67 API calls 23823->23828 23824->23823 23825 41eadc ___BuildCatchObjectHelper 23824->23825 23826 41a506 __freebuf 67 API calls 23824->23826 23826->23823 23829 41ea0e 23827->23829 23831 41a506 __freebuf 67 API calls 23827->23831 23828->23827 23830 41ea1c 23829->23830 23832 41a506 __freebuf 67 API calls 23829->23832 23833 41ea2a 23830->23833 23834 41a506 __freebuf 67 API calls 23830->23834 23831->23829 23832->23830 23835 41a506 __freebuf 67 API calls 23833->23835 23836 41ea38 23833->23836 23834->23833 23835->23836 23837 41a506 __freebuf 67 API calls 23836->23837 23840 41ea46 23836->23840 23837->23840 23838 41a506 __freebuf 67 API calls 23841 41ea57 23838->23841 23839 41efa3 __lock 67 API calls 23842 41ea5f 23839->23842 23840->23838 23840->23841 23841->23839 23843 41ea84 23842->23843 23844 41ea6b InterlockedDecrement 23842->23844 23858 41eae8 23843->23858 23844->23843 23845 41ea76 23844->23845 23845->23843 23848 41a506 __freebuf 67 API calls 23845->23848 23848->23843 23849 41efa3 __lock 67 API calls 23850 41ea98 23849->23850 23851 41eac9 23850->23851 23852 42223c ___removelocaleref 8 API calls 23850->23852 23861 41eaf4 23851->23861 23856 41eaad 23852->23856 23855 41a506 __freebuf 67 API calls 23855->23825 23856->23851 23857 422064 ___freetlocinfo 67 API calls 23856->23857 23857->23851 23864 41eec9 LeaveCriticalSection 23858->23864 23860 41ea91 23860->23849 23865 41eec9 LeaveCriticalSection 23861->23865 23863 41ead6 23863->23855 23864->23860 23865->23863 23870 41c7db 23873 41c7cb 23870->23873 23872 41c7e8 ctype 23876 420ed3 23873->23876 23875 41c7d9 23875->23872 23877 420edf ___BuildCatchObjectHelper 23876->23877 23878 41efa3 __lock 67 API calls 23877->23878 23882 420ee6 23878->23882 23879 420f1f 23886 420f3a 23879->23886 23881 420f30 ___BuildCatchObjectHelper 23881->23875 23882->23879 23883 420f16 23882->23883 23885 41a506 __freebuf 67 API calls 23882->23885 23884 41a506 __freebuf 67 API calls 23883->23884 23884->23879 23885->23883 23889 41eec9 LeaveCriticalSection 23886->23889 23888 420f41 23888->23881 23889->23888 22419 40ddff 22420 40de0c __write_nolock 22419->22420 22421 40c3bf ctype 104 API calls 22420->22421 22422 40de20 22421->22422 22423 40bc16 _swprintf 101 API calls 22422->22423 22424 40de32 SetDlgItemTextW 22423->22424 22427 40d116 PeekMessageW 22424->22427 22428 40d131 GetMessageW TranslateMessage DispatchMessageW 22427->22428 22429 40d152 22427->22429 22428->22429 20337 40f58d 20338 40f597 __EH_prolog __write_nolock 20337->20338 20506 4060ee 20338->20506 20341 40f5d9 20347 40f5e3 20341->20347 20348 40f648 20341->20348 20369 40f5c2 20341->20369 20342 40fc0e 20343 40fc32 20342->20343 20344 40fc23 SendMessageW 20342->20344 20345 40fc4b 20343->20345 20346 40fc3b SendDlgItemMessageW 20343->20346 20344->20343 20591 40dbc1 20345->20591 20346->20345 20352 40f624 20347->20352 20353 40f5e6 20347->20353 20349 40f650 20348->20349 20350 40f6ce GetDlgItemTextW 20348->20350 20356 40c3bf ctype 104 API calls 20349->20356 20350->20352 20355 40f702 20350->20355 20359 40faa5 EndDialog 20352->20359 20352->20369 20358 40c3bf ctype 104 API calls 20353->20358 20353->20369 20360 40f719 GetDlgItem 20355->20360 20504 40f70a 20355->20504 20361 40f671 SetDlgItemTextW 20356->20361 20363 40f600 20358->20363 20359->20369 20364 40f753 SetFocus 20360->20364 20365 40f72d SendMessageW SendMessageW 20360->20365 20366 40f67d 20361->20366 20362 40fc82 GetDlgItem 20367 40fc98 20362->20367 20368 40fc9e SetWindowTextW 20362->20368 20512 4050e8 SHGetMalloc 20363->20512 20371 40f764 20364->20371 20385 40f770 20364->20385 20365->20364 20366->20369 20377 40f689 GetMessageW 20366->20377 20367->20368 20611 419cb2 GetClassNameW 20368->20611 20376 40c3bf ctype 104 API calls 20371->20376 20372 40fda7 EndDialog 20372->20369 20373 40fbb1 20379 40c3bf ctype 104 API calls 20373->20379 20382 40f76e 20376->20382 20377->20369 20378 40f69e IsDialogMessageW 20377->20378 20378->20366 20383 40f6ad TranslateMessage DispatchMessageW 20378->20383 20384 40fbc2 SetDlgItemTextW 20379->20384 20381 40f60f SetDlgItemTextW 20381->20369 20516 40d298 GetDlgItem 20382->20516 20383->20366 20387 40fbd5 20384->20387 20390 40c3bf ctype 104 API calls 20385->20390 20393 40c3bf ctype 104 API calls 20387->20393 20394 40f7a2 20390->20394 20391 40fce1 20396 40fd15 20391->20396 20400 40c3bf ctype 104 API calls 20391->20400 20392 40f7c4 20397 40f7d8 20392->20397 20525 40da8c 20392->20525 20398 40fbfa 20393->20398 20399 40bc16 _swprintf 101 API calls 20394->20399 20395 40e857 154 API calls 20395->20391 20408 40e857 154 API calls 20396->20408 20459 40fdc1 _wcscat 20396->20459 20531 40935f 20397->20531 20404 40c3bf ctype 104 API calls 20398->20404 20399->20382 20405 40fcf3 SetDlgItemTextW 20400->20405 20410 40fc01 MessageBoxW 20404->20410 20411 40c3bf ctype 104 API calls 20405->20411 20406 40f7f7 20537 419c88 SetCurrentDirectoryW 20406->20537 20407 40f7ec GetLastError 20407->20406 20414 40fd31 20408->20414 20409 40fe6a 20415 40fe73 EnableWindow 20409->20415 20416 40fe7d 20409->20416 20410->20369 20412 40fd07 SetDlgItemTextW 20411->20412 20412->20396 20418 40fd65 20414->20418 20422 40fd42 20414->20422 20415->20416 20419 40fe97 20416->20419 20655 4060ab GetDlgItem EnableWindow 20416->20655 20417 40f80c 20420 40f81e 20417->20420 20421 40f813 GetLastError 20417->20421 20424 40fdb4 20418->20424 20425 40fd6d SetForegroundWindow 20418->20425 20426 40fec2 20419->20426 20431 40feb4 SendMessageW 20419->20431 20432 40febc PostMessageW 20419->20432 20435 40f89b 20420->20435 20437 40f82f GetTickCount 20420->20437 20475 40f87f ctype 20420->20475 20421->20420 20640 419a9d ShowWindow 20422->20640 20427 40e857 154 API calls 20424->20427 20425->20424 20430 40fd7c 20425->20430 20426->20369 20433 40c3bf ctype 104 API calls 20426->20433 20427->20459 20429 40fe8e 20656 4060ab GetDlgItem EnableWindow 20429->20656 20430->20424 20439 40fd84 DialogBoxParamW 20430->20439 20431->20426 20432->20426 20445 40fed4 SetDlgItemTextW 20433->20445 20434 40fab4 20546 4060c9 GetDlgItem ShowWindow 20434->20546 20446 40f8b6 GetModuleFileNameW 20435->20446 20447 40fa4c 20435->20447 20443 40bc16 _swprintf 101 API calls 20437->20443 20439->20424 20444 40fda0 20439->20444 20440 40fe4a 20448 419a9d 89 API calls 20440->20448 20442 41a506 __freebuf 67 API calls 20451 40fd64 20442->20451 20453 40f848 20443->20453 20444->20372 20445->20369 20633 40cffa 20446->20633 20450 40c3bf ctype 104 API calls 20447->20450 20454 40fe67 20448->20454 20449 40fac6 20547 4060c9 GetDlgItem ShowWindow 20449->20547 20456 40fa56 20450->20456 20451->20418 20538 408923 20453->20538 20454->20409 20461 40bc16 _swprintf 101 API calls 20456->20461 20458 40c3bf ctype 104 API calls 20458->20459 20459->20409 20459->20440 20459->20458 20460 40facf 20463 40c3bf ctype 104 API calls 20460->20463 20465 40fa74 20461->20465 20462 40bc16 _swprintf 101 API calls 20466 40f908 CreateFileMappingW 20462->20466 20468 40fad9 SetDlgItemTextW 20463->20468 20477 40c3bf ctype 104 API calls 20465->20477 20469 40f967 GetCommandLineW 20466->20469 20470 40f9cb ShellExecuteExW 20466->20470 20467 40f86d 20473 40f874 GetLastError 20467->20473 20467->20475 20548 4060c9 GetDlgItem ShowWindow 20468->20548 20471 40f977 20469->20471 20484 40f9e8 ctype 20470->20484 20637 40d212 SHGetMalloc SHGetSpecialFolderLocation SHGetPathFromIDListW 20471->20637 20473->20475 20475->20434 20475->20435 20476 40faeb SetDlgItemTextW GetDlgItem 20480 40fb23 20476->20480 20481 40fb09 GetWindowLongW SetWindowLongW 20476->20481 20478 40fa8f MessageBoxW 20477->20478 20478->20352 20549 40e857 20480->20549 20481->20480 20482 40d212 3 API calls 20485 40f99f 20482->20485 20487 40fa22 20484->20487 20488 40f9fd WaitForInputIdle 20484->20488 20491 40d212 3 API calls 20485->20491 20495 40fa35 UnmapViewOfFile CloseHandle 20487->20495 20496 40fa47 20487->20496 20490 40fa0d 20488->20490 20489 40e857 154 API calls 20493 40fb3f 20489->20493 20490->20487 20494 40fa14 Sleep 20490->20494 20492 40f9ab MapViewOfFile 20491->20492 20498 40f9c8 _realloc 20492->20498 20579 40e2d7 20493->20579 20494->20487 20494->20490 20495->20496 20496->20352 20496->20447 20498->20470 20500 40e857 154 API calls 20502 40fb65 20500->20502 20501 40fb8b 20639 4060ab GetDlgItem EnableWindow 20501->20639 20502->20501 20505 40e857 154 API calls 20502->20505 20504->20372 20504->20373 20505->20501 20507 40611b 20506->20507 20509 4060f7 20506->20509 20677 40bbef 20507->20677 20510 406119 20509->20510 20657 40c15c 20509->20657 20510->20341 20510->20342 20510->20369 20513 405103 SHBrowseForFolderW 20512->20513 20515 4050ff 20512->20515 20514 405140 SHGetPathFromIDListW 20513->20514 20513->20515 20514->20515 20515->20369 20515->20381 20517 40d2c8 20516->20517 20518 40d2fa SendMessageW SendMessageW 20516->20518 20683 41918b 20517->20683 20520 40d34a SendMessageW SendMessageW SendMessageW 20518->20520 20521 40d32e 20518->20521 20523 40d394 SendMessageW 20520->20523 20524 40d376 SendMessageW 20520->20524 20521->20520 20523->20392 20524->20523 20527 40da99 __write_nolock 20525->20527 20526 40db11 20526->20397 20527->20526 20528 40dabe RegCreateKeyExW 20527->20528 20528->20526 20529 40dae4 _wcslen 20528->20529 20530 40daec RegSetValueExW RegCloseKey 20529->20530 20530->20526 20533 40936c __write_nolock _wcsncpy 20531->20533 20532 4093fb 20536 40941e 20532->20536 20686 4092c9 20532->20686 20533->20532 20535 4092c9 9 API calls 20533->20535 20533->20536 20535->20533 20536->20406 20536->20407 20537->20417 20539 408930 __write_nolock 20538->20539 20540 408991 20539->20540 20541 408997 CreateFileW 20539->20541 20542 4089df 20540->20542 20543 40a3dc 2 API calls 20540->20543 20541->20540 20542->20467 20544 4089c4 20543->20544 20544->20542 20545 4089c8 CreateFileW 20544->20545 20545->20542 20546->20449 20547->20460 20548->20476 20550 40e861 __EH_prolog __write_nolock 20549->20550 20551 40f431 20550->20551 20721 40d781 20550->20721 20551->20489 20554 40d781 ExpandEnvironmentStringsW 20569 40e896 _wcscat _wcslen _wcsrchr _wcscpy 20554->20569 20555 40ebb2 SetWindowTextW 20555->20569 20558 41a594 _realloc 72 API calls 20558->20569 20559 40ec50 RegOpenKeyExW 20560 40ec6c RegQueryValueExW RegCloseKey 20559->20560 20559->20569 20560->20569 20563 40e99e SetFileAttributesW 20565 40ea5c GetFileAttributesW 20563->20565 20567 40e999 _memset _wcslen 20563->20567 20564 41a506 __freebuf 67 API calls 20564->20569 20565->20567 20568 40ea6a DeleteFileW 20565->20568 20567->20563 20567->20569 20571 40960e 7 API calls 20567->20571 20573 40bc16 _swprintf 101 API calls 20567->20573 20578 40ea38 SHFileOperationW 20567->20578 20738 40aa7d 20567->20738 20568->20567 20569->20551 20569->20554 20569->20555 20569->20558 20569->20559 20569->20564 20569->20567 20575 40eda7 SendMessageW 20569->20575 20725 411e60 CompareStringW 20569->20725 20726 40db16 20569->20726 20733 419c9b GetCurrentDirectoryW 20569->20733 20734 40960e 20569->20734 20743 409449 20569->20743 20746 40d92d 20569->20746 20571->20567 20574 40ea9c GetFileAttributesW 20573->20574 20574->20567 20576 40eaad MoveFileW 20574->20576 20575->20569 20576->20567 20577 40eac5 MoveFileExW 20576->20577 20577->20567 20578->20565 20580 40e2e1 _wcscpy __EH_prolog __write_nolock 20579->20580 20765 410d16 20580->20765 20582 40e312 _wcscpy 20769 40537e 20582->20769 20584 40e330 20773 407150 20584->20773 20588 40e383 20788 407074 20588->20788 20592 40dbce __write_nolock 20591->20592 22329 419e56 20592->22329 20595 40dcb1 GetDlgItem SendMessageW 20610 419c9b GetCurrentDirectoryW 20595->20610 20596 40dbdb GetWindow 20596->20595 20602 40dbf8 20596->20602 20597 40dc0d GetClassNameW 22334 411e60 CompareStringW 20597->22334 20599 40dc35 GetWindowLongW 20600 40dc96 GetWindow 20599->20600 20601 40dc45 SendMessageW 20599->20601 20600->20595 20600->20602 20601->20600 20603 40dc57 GetObjectW 20601->20603 20602->20595 20602->20597 20602->20599 20602->20600 22335 419e13 20603->22335 20605 40dc6c 20606 419dd0 3 API calls 20605->20606 22339 419ea0 20605->22339 20606->20605 20609 40dc8f DeleteObject 20609->20600 20610->20362 20612 419cd3 20611->20612 20617 419cf8 20611->20617 22356 411e60 CompareStringW 20612->22356 20613 40fcb0 20619 40e75f 20613->20619 20614 419cfd SHAutoComplete 20614->20613 20616 419ce6 20616->20617 20618 419cea FindWindowExW 20616->20618 20617->20613 20617->20614 20618->20617 20620 40e769 __EH_prolog __write_nolock 20619->20620 20621 401822 133 API calls 20620->20621 20622 40e78b 20621->20622 22357 401a1a 20622->22357 20627 41cf3e _malloc 67 API calls 20629 40e7d1 _realloc 20627->20629 20628 40e804 20631 40e813 20628->20631 20632 401228 ctype 131 API calls 20628->20632 20629->20628 20630 41a506 __freebuf 67 API calls 20629->20630 20630->20628 20631->20391 20631->20395 20632->20631 20634 40d003 20633->20634 20635 40d01c 20633->20635 20636 40cfb9 124 API calls 20634->20636 20635->20462 20636->20635 20638 40d248 20637->20638 20638->20482 20639->20504 22405 419a36 LoadCursorW RegisterClassExW 20640->22405 20642 419ac7 GetWindowRect GetParent MapWindowPoints 20643 419b04 GetParent CreateWindowExW 20642->20643 20644 419afd DestroyWindow 20642->20644 20645 419b86 20643->20645 20649 419b49 20643->20649 20644->20643 20646 419b8a ShowWindow UpdateWindow 20645->20646 20647 419b9c 20645->20647 20646->20647 20654 40fd59 20647->20654 22412 4192d0 GetTickCount GetTickCount 20647->22412 20649->20654 22406 41947d 20649->22406 20652 419b68 ShowWindow SetWindowTextW 20653 41a506 __freebuf 67 API calls 20652->20653 20653->20654 20654->20442 20655->20429 20656->20419 20680 40c075 20657->20680 20659 40c17b GetWindowRect GetClientRect 20660 40c258 20659->20660 20666 40c1bf 20659->20666 20661 40c2a1 GetSystemMetrics GetWindow 20660->20661 20662 40c263 GetWindowTextW 20660->20662 20672 40c2c5 20661->20672 20664 40bf1d ctype 102 API calls 20662->20664 20663 40c29c 20663->20661 20665 40c28a SetWindowTextW 20664->20665 20665->20661 20666->20663 20667 40c212 GetWindowLongW 20666->20667 20670 40c232 SetWindowPos GetWindowRect 20667->20670 20671 40c22b 20667->20671 20668 40c3a1 20668->20510 20669 40c2d2 GetWindowTextW 20669->20672 20670->20660 20671->20670 20672->20668 20672->20669 20673 40bf1d ctype 102 API calls 20672->20673 20674 40c383 GetWindow 20672->20674 20675 40c319 GetWindowRect SetWindowPos 20672->20675 20676 40c303 SetWindowTextW 20673->20676 20674->20668 20674->20672 20675->20674 20676->20672 20678 40bc13 20677->20678 20679 40bbf5 GetWindowLongW SetWindowLongW 20677->20679 20678->20510 20679->20678 20681 40bf1d ctype 102 API calls 20680->20681 20682 40c09c _wcschr 20681->20682 20682->20659 20684 40d2d3 ShowWindow SendMessageW SendMessageW 20683->20684 20685 419195 DestroyWindow 20683->20685 20684->20518 20685->20684 20687 4092d6 __write_nolock 20686->20687 20688 4092ff 20687->20688 20689 4092f6 CreateDirectoryW 20687->20689 20700 4092a5 20688->20700 20689->20688 20691 40932e 20689->20691 20693 409334 20691->20693 20696 40933d 20691->20696 20703 40908d 20693->20703 20694 409341 GetLastError 20694->20696 20696->20536 20697 40a3dc 2 API calls 20698 40931b 20697->20698 20698->20694 20699 40931f CreateDirectoryW 20698->20699 20699->20691 20699->20694 20711 409041 20700->20711 20704 41aaf0 __write_nolock 20703->20704 20705 40909a SetFileAttributesW 20704->20705 20706 4090b3 20705->20706 20707 4090dc 20705->20707 20708 40a3dc 2 API calls 20706->20708 20707->20696 20709 4090c7 20708->20709 20709->20707 20710 4090cb SetFileAttributesW 20709->20710 20710->20707 20719 41aaf0 20711->20719 20714 409062 20716 40a3dc 2 API calls 20714->20716 20715 409085 20715->20694 20715->20697 20717 409076 20716->20717 20717->20715 20718 40907a GetFileAttributesW 20717->20718 20718->20715 20720 40904e GetFileAttributesW 20719->20720 20720->20714 20720->20715 20722 40d78e __write_nolock 20721->20722 20723 40d822 ExpandEnvironmentStringsW 20722->20723 20724 40d845 20722->20724 20723->20724 20724->20569 20725->20569 20727 40db23 __write_nolock 20726->20727 20728 40dbbd GetDlgItem SetWindowTextW SendMessageW 20727->20728 20729 40db3f RegOpenKeyExW 20727->20729 20728->20569 20729->20728 20730 40db5c RegQueryValueExW 20729->20730 20731 40dbb4 RegCloseKey 20730->20731 20732 40db88 20730->20732 20731->20728 20732->20731 20733->20569 20736 40961f 20734->20736 20735 409476 7 API calls 20735->20736 20736->20735 20737 4096af 20736->20737 20737->20569 20739 40a0ea CharUpperW 20738->20739 20740 40aa92 20739->20740 20741 40bc16 _swprintf 101 API calls 20740->20741 20742 40aaa9 _wcslen _wcschr _wcsncpy 20740->20742 20741->20742 20742->20567 20744 409454 FindClose 20743->20744 20745 40945b 20743->20745 20744->20745 20745->20569 20747 40d93a __write_nolock 20746->20747 20748 41cf3e _malloc 67 API calls 20747->20748 20749 40d946 20748->20749 20753 40d957 _wcscat _wcslen _wcscpy 20749->20753 20754 4063ce 20749->20754 20751 40d781 ExpandEnvironmentStringsW 20751->20753 20752 40d9f7 20752->20569 20753->20751 20753->20752 20759 40635c 20754->20759 20756 4063d6 20757 4062fd RaiseException 20756->20757 20758 4063df 20757->20758 20758->20753 20762 401b9b 20759->20762 20761 406366 20761->20756 20763 41170e ctype 119 API calls 20762->20763 20764 401bb7 20763->20764 20764->20761 20766 410d23 _wcslen 20765->20766 20794 4011a7 20766->20794 20768 410d3b _wcscpy 20768->20582 20770 410d16 _wcslen 20769->20770 20771 4011a7 125 API calls 20770->20771 20772 410d3b _wcscpy 20771->20772 20772->20584 20774 40715a __EH_prolog 20773->20774 20804 41a89a 20774->20804 20777 4071b1 20779 4083c0 20777->20779 20780 4083cd __write_nolock 20779->20780 20785 408434 20780->20785 20905 4096bc 20780->20905 20782 4084dd 20782->20588 20784 408499 20784->20782 20787 406376 ctype 119 API calls 20784->20787 20785->20784 20786 4096bc 8 API calls 20785->20786 20882 40820b 20785->20882 20786->20785 20787->20782 20789 40707e __EH_prolog 20788->20789 20790 4155ef 131 API calls 20789->20790 20792 40709b ctype 20789->20792 20790->20792 20791 401001 ctype 131 API calls 20793 4070ae 20791->20793 20792->20791 20793->20500 20795 401211 20794->20795 20796 4011b9 20794->20796 20795->20768 20797 4011e2 20796->20797 20799 406423 ctype 119 API calls 20796->20799 20798 41a594 _realloc 72 API calls 20797->20798 20802 401202 20798->20802 20800 4011d8 20799->20800 20801 4063ce 120 API calls 20800->20801 20801->20797 20802->20795 20803 4063ce 120 API calls 20802->20803 20803->20795 20806 41a8a4 20804->20806 20805 41cf3e _malloc 67 API calls 20805->20806 20806->20805 20807 40719d 20806->20807 20808 41fc9b _realloc 6 API calls 20806->20808 20810 41a8c0 20806->20810 20807->20777 20816 41768a 20807->20816 20808->20806 20809 41a8e6 20822 4125fa 20809->20822 20810->20809 20813 41c9cf __cinit 74 API calls 20810->20813 20813->20809 20814 41c77f __CxxThrowException@8 RaiseException 20815 41a8fe 20814->20815 20817 417694 __EH_prolog 20816->20817 20831 411072 20817->20831 20825 41d728 20822->20825 20826 412606 20825->20826 20827 41d748 _strlen 20825->20827 20826->20814 20827->20826 20828 41cf3e _malloc 67 API calls 20827->20828 20829 41d75b 20828->20829 20829->20826 20830 422896 _strcpy_s 67 API calls 20829->20830 20830->20826 20851 41a4dc 20831->20851 20833 41107c EnterCriticalSection 20834 41109f 20833->20834 20841 4110ba 20833->20841 20835 41a89a 75 API calls 20834->20835 20840 4110a5 20835->20840 20836 4110d0 20839 41a89a 75 API calls 20836->20839 20837 4110ff LeaveCriticalSection 20838 41110b 20837->20838 20847 4157db 20838->20847 20842 4110d6 20839->20842 20840->20841 20852 410f29 20840->20852 20841->20836 20841->20837 20844 4110ee LeaveCriticalSection 20842->20844 20846 410f29 123 API calls 20842->20846 20844->20838 20846->20844 20850 4157e8 _memset 20847->20850 20860 415724 20850->20860 20851->20833 20853 410f3b InitializeCriticalSection CreateSemaphoreW CreateEventW 20852->20853 20855 410f92 20853->20855 20856 410fb1 20855->20856 20857 406423 ctype 119 API calls 20855->20857 20856->20841 20858 410fa6 20857->20858 20859 406371 ctype RaiseException 20858->20859 20859->20856 20861 415730 _memset 20860->20861 20864 4152cd 20861->20864 20865 41530d 20864->20865 20866 4152da 20864->20866 20867 41533a 20865->20867 20868 414f64 67 API calls 20865->20868 20866->20865 20870 414f64 20866->20870 20867->20777 20868->20865 20873 413e66 20870->20873 20878 4129eb 20873->20878 20876 4129eb ctype 67 API calls 20877 413e79 20876->20877 20879 4129f1 20878->20879 20880 4129f7 20878->20880 20881 41a506 __freebuf 67 API calls 20879->20881 20880->20876 20881->20880 20883 408215 __EH_prolog __write_nolock 20882->20883 20911 401822 20883->20911 20885 408232 20917 4088fd 20885->20917 20890 40825e 20892 408262 20890->20892 20896 408286 _wcscpy 20890->20896 21052 40a788 20892->21052 20894 40826d 21042 401228 20894->21042 20896->20894 20901 4096bc 8 API calls 20896->20901 20904 408313 20896->20904 21056 40a8a1 20896->21056 20901->20896 20906 4096d1 20905->20906 20907 4096d5 20906->20907 22317 409476 20906->22317 20907->20780 20909 4096e5 20909->20907 20910 4096ea FindClose 20909->20910 20910->20907 20912 40182c __EH_prolog 20911->20912 20913 41a89a 75 API calls 20912->20913 20915 4018b7 _memset 20912->20915 20914 4018a4 20913->20914 20914->20915 20916 40a026 126 API calls 20914->20916 20915->20885 20916->20915 20918 408908 20917->20918 20919 408249 20918->20919 21065 406510 20918->21065 20919->20894 20921 401417 20919->20921 20922 401421 __EH_prolog 20921->20922 20945 408e7b 125 API calls 20922->20945 20923 401444 20924 401465 20923->20924 20943 401449 _wcscpy 20923->20943 21071 406760 20923->21071 20927 40158e 20924->20927 20931 40159e 20924->20931 20928 406376 ctype 119 API calls 20927->20928 20928->20943 20930 40369f 156 API calls 20930->20931 20931->20930 20936 4015fb 20931->20936 20931->20943 20938 401625 20936->20938 20939 406376 ctype 119 API calls 20936->20939 20936->20943 20938->20943 20939->20938 20943->20890 20945->20923 20946 408bae 122 API calls 21043 401232 __EH_prolog 21042->21043 21044 401261 ctype 21043->21044 22291 409ffc 21043->22291 21045 4129eb ctype 67 API calls 21044->21045 21046 401274 21045->21046 21048 4129eb ctype 67 API calls 21046->21048 21049 40127f 21048->21049 21068 406459 21065->21068 21067 40651b 21067->20919 21069 40639f 119 API calls 21068->21069 21070 40646b 21069->21070 21070->21067 21074 401106 21071->21074 21075 40116f 21074->21075 21076 401118 21074->21076 21075->20946 21077 401141 21076->21077 21078 406423 ctype 119 API calls 21076->21078 22292 40a00c _memset 22291->22292 22293 4129eb ctype 67 API calls 22292->22293 22294 40a01a ctype 22293->22294 22294->21044 22318 409483 __write_nolock 22317->22318 22319 409505 FindNextFileW 22318->22319 22320 40949b FindFirstFileW 22318->22320 22322 409512 GetLastError 22319->22322 22323 409528 22319->22323 22321 4094b2 22320->22321 22328 4094e9 ___inittime 22320->22328 22324 40a3dc 2 API calls 22321->22324 22322->22323 22323->22328 22325 4094c2 22324->22325 22326 4094c6 FindFirstFileW 22325->22326 22327 4094de GetLastError 22325->22327 22326->22327 22326->22328 22327->22328 22328->20909 22330 419dd0 3 API calls 22329->22330 22331 419e5d 22330->22331 22332 419e13 3 API calls 22331->22332 22333 40dbd3 22331->22333 22332->22333 22333->20595 22333->20596 22334->20602 22336 419e42 22335->22336 22337 419e1c GetDC 22335->22337 22336->20605 22337->22336 22338 419e2b GetDeviceCaps ReleaseDC 22337->22338 22338->22336 22352 419e75 GetDC GetDeviceCaps ReleaseDC 22339->22352 22341 419eab 22342 419ec2 GetObjectW 22341->22342 22343 419eaf 22341->22343 22345 419ee7 22342->22345 22346 419ee9 CoCreateInstance 22342->22346 22353 419d0b GetDC CreateCompatibleDC CreateCompatibleDC GetObjectW 22343->22353 22345->22346 22347 419f0b _memset 22346->22347 22349 40dc7c SendMessageW 22346->22349 22348 419f81 CreateDIBSection 22347->22348 22347->22349 22348->22349 22350 419fce 22348->22350 22349->20600 22349->20609 22350->22349 22351 41a022 DeleteObject 22350->22351 22351->22349 22352->22341 22354 419d52 22353->22354 22355 419d55 9 API calls 22353->22355 22354->22355 22355->22349 22356->20616 22358 4088fd 119 API calls 22357->22358 22359 401a26 22358->22359 22360 401a2a 22359->22360 22361 401417 156 API calls 22359->22361 22366 401768 22360->22366 22362 401a37 22361->22362 22362->22360 22363 406376 ctype 119 API calls 22362->22363 22364 401a46 22363->22364 22365 408a32 121 API calls 22364->22365 22365->22360 22367 401772 __EH_prolog 22366->22367 22368 40117b 122 API calls 22367->22368 22372 401783 22367->22372 22369 401793 22368->22369 22370 40179e 22369->22370 22373 4017c4 22369->22373 22371 40369f 156 API calls 22370->22371 22371->22372 22372->20627 22372->20629 22377 403767 22373->22377 22379 40376d 22377->22379 22378 40369f 156 API calls 22378->22379 22379->22378 22380 4017e2 22379->22380 22380->22372 22381 4012ea 22380->22381 22382 4012f4 __EH_prolog 22381->22382 22383 402c8b 195 API calls 22382->22383 22384 401316 22383->22384 22385 40131a 22384->22385 22386 40132f 22384->22386 22388 41a506 __freebuf 67 API calls 22385->22388 22390 401327 22385->22390 22398 4012b5 22386->22398 22388->22390 22390->22372 22393 411b3c MultiByteToWideChar 22394 401353 _wcslen 22393->22394 22395 4012d0 125 API calls 22394->22395 22396 40139f 22395->22396 22396->22390 22397 41a506 __freebuf 67 API calls 22396->22397 22397->22390 22399 401106 125 API calls 22398->22399 22400 4012bf 22399->22400 22401 4012d0 22400->22401 22402 4012e2 22401->22402 22403 4012d9 22401->22403 22402->22393 22402->22394 22404 4011a7 125 API calls 22403->22404 22404->22402 22405->20642 22407 41948e _wcslen 22406->22407 22408 41cf3e _malloc 67 API calls 22407->22408 22411 419498 22408->22411 22409 4195f5 22409->20652 22409->20654 22410 411e81 CompareStringW 22410->22411 22411->22409 22411->22410 22413 4192f5 22412->22413 22414 41934a VariantInit 22413->22414 22416 41930e PeekMessageW 22413->22416 22415 41937a 22414->22415 22415->20654 22417 419341 GetTickCount 22416->22417 22418 419320 TranslateMessage DispatchMessageW GetMessageW 22416->22418 22417->22413 22418->22417 23136 42108f 23143 4253be 23136->23143 23139 4210a2 23141 41a506 __freebuf 67 API calls 23139->23141 23142 4210ad 23141->23142 23156 4252e4 23143->23156 23145 421094 23145->23139 23146 425195 23145->23146 23147 4251a1 ___BuildCatchObjectHelper 23146->23147 23148 41efa3 __lock 67 API calls 23147->23148 23150 4251ad 23148->23150 23149 425216 23197 42522b 23149->23197 23150->23149 23154 4251eb DeleteCriticalSection 23150->23154 23184 426fb6 23150->23184 23152 425222 ___BuildCatchObjectHelper 23152->23139 23155 41a506 __freebuf 67 API calls 23154->23155 23155->23150 23157 4252f0 ___BuildCatchObjectHelper 23156->23157 23158 41efa3 __lock 67 API calls 23157->23158 23165 4252ff 23158->23165 23159 425397 23174 4253b5 23159->23174 23162 4253a3 ___BuildCatchObjectHelper 23162->23145 23164 42529c 105 API calls __fflush_nolock 23164->23165 23165->23159 23165->23164 23166 4210f0 23165->23166 23171 425386 23165->23171 23167 421113 EnterCriticalSection 23166->23167 23168 4210fd 23166->23168 23167->23165 23169 41efa3 __lock 67 API calls 23168->23169 23170 421106 23169->23170 23170->23165 23177 42115e 23171->23177 23173 425394 23173->23165 23183 41eec9 LeaveCriticalSection 23174->23183 23176 4253bc 23176->23162 23178 421181 LeaveCriticalSection 23177->23178 23179 42116e 23177->23179 23178->23173 23182 41eec9 LeaveCriticalSection 23179->23182 23181 42117e 23181->23173 23182->23181 23183->23176 23185 426fc2 ___BuildCatchObjectHelper 23184->23185 23186 426ff3 23185->23186 23187 426fd6 23185->23187 23191 426feb ___BuildCatchObjectHelper 23186->23191 23200 4210af 23186->23200 23188 41edae __mtinitlocknum 67 API calls 23187->23188 23190 426fdb 23188->23190 23193 420103 __cftog_l 6 API calls 23190->23193 23191->23150 23193->23191 23444 41eec9 LeaveCriticalSection 23197->23444 23199 425232 23199->23152 23201 4210e3 EnterCriticalSection 23200->23201 23202 4210c1 23200->23202 23205 4210d9 23201->23205 23202->23201 23203 4210c9 23202->23203 23204 41efa3 __lock 67 API calls 23203->23204 23204->23205 23206 426f3f 23205->23206 23207 426f53 23206->23207 23208 426f6f 23206->23208 23209 41edae __mtinitlocknum 67 API calls 23207->23209 23214 426f68 23208->23214 23225 425234 23208->23225 23210 426f58 23209->23210 23212 420103 __cftog_l 6 API calls 23210->23212 23212->23214 23222 42702a 23214->23222 23220 426f8f 23220->23214 23221 41a506 __freebuf 67 API calls 23220->23221 23221->23214 23437 421122 23222->23437 23224 427030 23224->23191 23226 42524d 23225->23226 23230 42526f 23225->23230 23227 424df7 __fileno 67 API calls 23226->23227 23226->23230 23228 425268 23227->23228 23264 424c6e 23228->23264 23231 4291a9 23230->23231 23232 426f83 23231->23232 23233 4291b9 23231->23233 23235 424df7 23232->23235 23233->23232 23234 41a506 __freebuf 67 API calls 23233->23234 23234->23232 23236 424e06 23235->23236 23238 424e1b 23235->23238 23237 41edae __mtinitlocknum 67 API calls 23236->23237 23239 424e0b 23237->23239 23241 4271af 23238->23241 23240 420103 __cftog_l 6 API calls 23239->23240 23240->23238 23242 4271bb ___BuildCatchObjectHelper 23241->23242 23243 4271c3 23242->23243 23244 4271de 23242->23244 23245 41edc1 __locking 67 API calls 23243->23245 23246 4271ec 23244->23246 23249 42722d 23244->23249 23247 4271c8 23245->23247 23248 41edc1 __locking 67 API calls 23246->23248 23250 41edae __mtinitlocknum 67 API calls 23247->23250 23251 4271f1 23248->23251 23252 426846 ___lock_fhandle 68 API calls 23249->23252 23259 4271d0 ___BuildCatchObjectHelper 23250->23259 23253 41edae __mtinitlocknum 67 API calls 23251->23253 23255 427233 23252->23255 23254 4271f8 23253->23254 23256 420103 __cftog_l 6 API calls 23254->23256 23257 427240 23255->23257 23258 42724e 23255->23258 23256->23259 23409 427113 23257->23409 23261 41edae __mtinitlocknum 67 API calls 23258->23261 23259->23220 23262 427248 23261->23262 23424 427272 23262->23424 23265 424c7a ___BuildCatchObjectHelper 23264->23265 23266 424c82 23265->23266 23267 424c9d 23265->23267 23289 41edc1 23266->23289 23268 424cab 23267->23268 23274 424cec 23267->23274 23270 41edc1 __locking 67 API calls 23268->23270 23273 424cb0 23270->23273 23272 41edae __mtinitlocknum 67 API calls 23284 424c8f ___BuildCatchObjectHelper 23272->23284 23275 41edae __mtinitlocknum 67 API calls 23273->23275 23292 426846 23274->23292 23277 424cb7 23275->23277 23281 420103 __cftog_l 6 API calls 23277->23281 23278 424cf2 23279 424d15 23278->23279 23280 424cff 23278->23280 23283 41edae __mtinitlocknum 67 API calls 23279->23283 23302 42453b 23280->23302 23281->23284 23286 424d1a 23283->23286 23284->23230 23285 424d0d 23361 424d40 23285->23361 23287 41edc1 __locking 67 API calls 23286->23287 23287->23285 23290 41e93b __getptd_noexit 67 API calls 23289->23290 23291 41edc6 23290->23291 23291->23272 23293 426852 ___BuildCatchObjectHelper 23292->23293 23294 4268ad 23293->23294 23297 41efa3 __lock 67 API calls 23293->23297 23295 4268b2 EnterCriticalSection 23294->23295 23296 4268cf ___BuildCatchObjectHelper 23294->23296 23295->23296 23296->23278 23298 42687e 23297->23298 23299 426895 23298->23299 23301 4241e6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 23298->23301 23364 4268dd 23299->23364 23301->23299 23303 42454a __write_nolock 23302->23303 23304 4245a3 23303->23304 23305 42457c 23303->23305 23334 424571 23303->23334 23310 42460b 23304->23310 23311 4245e5 23304->23311 23307 41edc1 __locking 67 API calls 23305->23307 23306 41e6de CatchGuardHandler 5 API calls 23308 424c6c 23306->23308 23309 424581 23307->23309 23308->23285 23314 41edae __mtinitlocknum 67 API calls 23309->23314 23313 42461f 23310->23313 23368 42439d 23310->23368 23312 41edc1 __locking 67 API calls 23311->23312 23315 4245ea 23312->23315 23378 424d93 23313->23378 23317 424588 23314->23317 23319 41edae __mtinitlocknum 67 API calls 23315->23319 23320 420103 __cftog_l 6 API calls 23317->23320 23322 4245f3 23319->23322 23320->23334 23321 42462a 23323 4248d0 23321->23323 23327 41e9b4 __getptd 67 API calls 23321->23327 23324 420103 __cftog_l 6 API calls 23322->23324 23325 4248e0 23323->23325 23326 424b9f WriteFile 23323->23326 23324->23334 23330 4249be 23325->23330 23335 4248f4 23325->23335 23329 424bd2 GetLastError 23326->23329 23353 4248b2 23326->23353 23328 424645 GetConsoleMode 23327->23328 23328->23323 23331 424670 23328->23331 23329->23353 23341 424a9e 23330->23341 23349 4249cd 23330->23349 23331->23323 23333 424682 GetConsoleCP 23331->23333 23332 424c1d 23332->23334 23336 41edae __mtinitlocknum 67 API calls 23332->23336 23333->23353 23359 4246a5 23333->23359 23334->23306 23335->23332 23338 424962 WriteFile 23335->23338 23335->23353 23339 424c40 23336->23339 23337 424bf0 23342 424bfb 23337->23342 23343 424c0f 23337->23343 23338->23329 23338->23335 23346 41edc1 __locking 67 API calls 23339->23346 23340 424b04 WideCharToMultiByte 23340->23329 23348 424b3b WriteFile 23340->23348 23341->23332 23341->23340 23341->23348 23341->23353 23347 41edae __mtinitlocknum 67 API calls 23342->23347 23390 41edd4 23343->23390 23344 424a42 WriteFile 23344->23329 23344->23349 23346->23334 23351 424c00 23347->23351 23348->23341 23350 424b72 GetLastError 23348->23350 23349->23332 23349->23344 23349->23353 23350->23341 23354 41edc1 __locking 67 API calls 23351->23354 23353->23332 23353->23334 23353->23337 23354->23334 23355 4250e5 79 API calls __fassign 23355->23359 23356 42690d 11 API calls __putwch_nolock 23356->23359 23357 424751 WideCharToMultiByte 23357->23353 23358 424782 WriteFile 23357->23358 23358->23329 23358->23359 23359->23329 23359->23353 23359->23355 23359->23356 23359->23357 23360 4247d6 WriteFile 23359->23360 23387 4227cb 23359->23387 23360->23329 23360->23359 23408 4268e6 LeaveCriticalSection 23361->23408 23363 424d48 23363->23284 23367 41eec9 LeaveCriticalSection 23364->23367 23366 4268e4 23366->23294 23367->23366 23395 4267cf 23368->23395 23370 4243bb 23371 4243c3 23370->23371 23372 4243d4 SetFilePointer 23370->23372 23373 41edae __mtinitlocknum 67 API calls 23371->23373 23374 4243ec GetLastError 23372->23374 23375 4243c8 23372->23375 23373->23375 23374->23375 23376 4243f6 23374->23376 23375->23313 23377 41edd4 __dosmaperr 67 API calls 23376->23377 23377->23375 23379 424da0 23378->23379 23381 424daf 23378->23381 23380 41edae __mtinitlocknum 67 API calls 23379->23380 23382 424da5 23380->23382 23383 424dd3 23381->23383 23384 41edae __mtinitlocknum 67 API calls 23381->23384 23382->23321 23383->23321 23385 424dc3 23384->23385 23386 420103 __cftog_l 6 API calls 23385->23386 23386->23383 23388 422793 __isleadbyte_l 77 API calls 23387->23388 23389 4227da 23388->23389 23389->23359 23391 41edc1 __locking 67 API calls 23390->23391 23392 41eddf _realloc 23391->23392 23393 41edae __mtinitlocknum 67 API calls 23392->23393 23394 41edf2 23393->23394 23394->23334 23396 4267dc 23395->23396 23399 4267f4 23395->23399 23397 41edc1 __locking 67 API calls 23396->23397 23398 4267e1 23397->23398 23401 41edae __mtinitlocknum 67 API calls 23398->23401 23400 41edc1 __locking 67 API calls 23399->23400 23402 426839 23399->23402 23403 426822 23400->23403 23404 4267e9 23401->23404 23402->23370 23405 41edae __mtinitlocknum 67 API calls 23403->23405 23404->23370 23406 426829 23405->23406 23407 420103 __cftog_l 6 API calls 23406->23407 23407->23402 23408->23363 23410 4267cf __lseeki64_nolock 67 API calls 23409->23410 23413 427123 23410->23413 23411 427179 23427 426749 23411->23427 23413->23411 23414 427157 23413->23414 23417 4267cf __lseeki64_nolock 67 API calls 23413->23417 23414->23411 23415 4267cf __lseeki64_nolock 67 API calls 23414->23415 23418 427163 CloseHandle 23415->23418 23420 42714e 23417->23420 23418->23411 23421 42716f GetLastError 23418->23421 23419 4271a3 23419->23262 23423 4267cf __lseeki64_nolock 67 API calls 23420->23423 23421->23411 23422 41edd4 __dosmaperr 67 API calls 23422->23419 23423->23414 23436 4268e6 LeaveCriticalSection 23424->23436 23426 42727a 23426->23259 23428 4267b5 23427->23428 23429 42675a 23427->23429 23430 41edae __mtinitlocknum 67 API calls 23428->23430 23429->23428 23434 426785 23429->23434 23431 4267ba 23430->23431 23432 41edc1 __locking 67 API calls 23431->23432 23433 4267ab 23432->23433 23433->23419 23433->23422 23434->23433 23435 4267a5 SetStdHandle 23434->23435 23435->23433 23436->23426 23438 421152 LeaveCriticalSection 23437->23438 23439 421133 23437->23439 23438->23224 23439->23438 23440 42113a 23439->23440 23443 41eec9 LeaveCriticalSection 23440->23443 23442 42114f 23442->23224 23443->23442 23444->23199 22702 41c618 22703 41c631 22702->22703 22704 41c63c 22702->22704 22707 41ec8a 22704->22707 22706 41c641 ___BuildCatchObjectHelper 22708 41ec96 ___BuildCatchObjectHelper 22707->22708 22709 41e9b4 __getptd 67 API calls 22708->22709 22710 41ec9b 22709->22710 22713 423f89 22710->22713 22712 41ecbd ___BuildCatchObjectHelper 22712->22706 22714 423faf 22713->22714 22715 423fa8 22713->22715 22725 42553a 22714->22725 22717 42179d __NMSG_WRITE 67 API calls 22715->22717 22717->22714 22719 423fc0 _memset 22721 424098 22719->22721 22723 424058 SetUnhandledExceptionFilter UnhandledExceptionFilter 22719->22723 22749 42171b 22721->22749 22723->22721 22726 41e768 __decode_pointer 6 API calls 22725->22726 22727 423fb5 22726->22727 22727->22719 22728 425547 22727->22728 22731 425553 ___BuildCatchObjectHelper 22728->22731 22729 4255af 22730 425590 22729->22730 22735 4255be 22729->22735 22734 41e768 __decode_pointer 6 API calls 22730->22734 22731->22729 22731->22730 22732 42557a 22731->22732 22738 425576 22731->22738 22733 41e93b __getptd_noexit 67 API calls 22732->22733 22736 42557f _siglookup 22733->22736 22734->22736 22737 41edae __mtinitlocknum 67 API calls 22735->22737 22740 425625 22736->22740 22742 42171b _raise 67 API calls 22736->22742 22748 425588 ___BuildCatchObjectHelper 22736->22748 22739 4255c3 22737->22739 22738->22732 22738->22735 22741 420103 __cftog_l 6 API calls 22739->22741 22743 41efa3 __lock 67 API calls 22740->22743 22745 425630 22740->22745 22741->22748 22742->22740 22743->22745 22744 41e75f ___crtMessageBoxW 6 API calls 22746 425665 22744->22746 22745->22744 22745->22746 22752 4256bb 22746->22752 22748->22719 22750 4215d9 _doexit 67 API calls 22749->22750 22751 42172c RtlUnwind 22750->22751 22751->22712 22753 4256c1 22752->22753 22754 4256c8 22752->22754 22756 41eec9 LeaveCriticalSection 22753->22756 22754->22748 22756->22754 19384 41d89d 19423 41fa9c 19384->19423 19386 41d8a9 GetStartupInfoA 19387 41d8cc 19386->19387 19424 41edf7 HeapCreate 19387->19424 19390 41d91c 19426 41eafd GetModuleHandleW 19390->19426 19394 41d874 _fast_error_exit 67 API calls 19395 41d92d __RTC_Initialize 19394->19395 19460 423b05 19395->19460 19397 41d93b 19398 41d947 GetCommandLineA 19397->19398 19399 421495 __amsg_exit 67 API calls 19397->19399 19475 4239ce 19398->19475 19401 41d946 19399->19401 19401->19398 19405 41d96c 19514 42369b 19405->19514 19406 421495 __amsg_exit 67 API calls 19406->19405 19409 41d97d 19529 421554 19409->19529 19410 421495 __amsg_exit 67 API calls 19410->19409 19412 41d984 19413 41d98f 19412->19413 19415 421495 __amsg_exit 67 API calls 19412->19415 19535 42363c 19413->19535 19415->19413 19423->19386 19425 41d910 19424->19425 19425->19390 19586 41d874 19425->19586 19427 41eb11 19426->19427 19428 41eb18 19426->19428 19600 421465 19427->19600 19430 41ec80 19428->19430 19431 41eb22 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 19428->19431 19639 41e817 19430->19639 19434 41eb6b TlsAlloc 19431->19434 19436 41d922 19434->19436 19437 41ebb9 TlsSetValue 19434->19437 19436->19394 19436->19395 19437->19436 19438 41ebca 19437->19438 19604 42174f 19438->19604 19441 41e6ed __encode_pointer 6 API calls 19442 41ebda 19441->19442 19443 41e6ed __encode_pointer 6 API calls 19442->19443 19444 41ebea 19443->19444 19445 41e6ed __encode_pointer 6 API calls 19444->19445 19446 41ebfa 19445->19446 19447 41e6ed __encode_pointer 6 API calls 19446->19447 19448 41ec0a 19447->19448 19611 41ee27 19448->19611 19451 41e768 __decode_pointer 6 API calls 19452 41ec2b 19451->19452 19452->19430 19615 421328 19452->19615 19455 41e768 __decode_pointer 6 API calls 19456 41ec5e 19455->19456 19456->19430 19457 41ec65 19456->19457 19621 41e854 19457->19621 19459 41ec6d GetCurrentThreadId 19459->19436 19691 41fa9c 19460->19691 19462 423b11 GetStartupInfoA 19463 421328 __calloc_crt 67 API calls 19462->19463 19464 423b32 19463->19464 19465 423d50 ___BuildCatchObjectHelper 19464->19465 19468 421328 __calloc_crt 67 API calls 19464->19468 19470 423c97 19464->19470 19472 423c1a 19464->19472 19465->19397 19466 423ccd GetStdHandle 19466->19470 19467 423d32 SetHandleCount 19467->19465 19468->19464 19469 423cdf GetFileType 19469->19470 19470->19465 19470->19466 19470->19467 19470->19469 19473 4241e6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19470->19473 19471 423c43 GetFileType 19471->19472 19472->19465 19472->19470 19472->19471 19474 4241e6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19472->19474 19473->19470 19474->19472 19476 4239ec GetEnvironmentStringsW 19475->19476 19479 423a0b 19475->19479 19477 4239f4 19476->19477 19478 423a00 GetLastError 19476->19478 19480 423a36 WideCharToMultiByte 19477->19480 19481 423a27 GetEnvironmentStringsW 19477->19481 19478->19479 19479->19477 19482 423aa4 19479->19482 19488 423a6a 19480->19488 19489 423a99 FreeEnvironmentStringsW 19480->19489 19481->19480 19484 41d957 19481->19484 19483 423aad GetEnvironmentStrings 19482->19483 19482->19484 19483->19484 19485 423abd 19483->19485 19501 423913 19484->19501 19490 4212e3 __malloc_crt 67 API calls 19485->19490 19491 4212e3 __malloc_crt 67 API calls 19488->19491 19489->19484 19492 423ad7 19490->19492 19493 423a70 19491->19493 19494 423aea _realloc 19492->19494 19495 423ade FreeEnvironmentStringsA 19492->19495 19493->19489 19496 423a78 WideCharToMultiByte 19493->19496 19499 423af4 FreeEnvironmentStringsA 19494->19499 19495->19484 19497 423a92 19496->19497 19498 423a8a 19496->19498 19497->19489 19500 41a506 __freebuf 67 API calls 19498->19500 19499->19484 19500->19497 19502 423928 19501->19502 19503 42392d GetModuleFileNameA 19501->19503 19698 422046 19502->19698 19504 423954 19503->19504 19692 423779 19504->19692 19508 41d961 19508->19405 19508->19406 19509 423990 19510 4212e3 __malloc_crt 67 API calls 19509->19510 19511 423996 19510->19511 19511->19508 19512 423779 _parse_cmdline 77 API calls 19511->19512 19513 4239b0 19512->19513 19513->19508 19515 4236a4 19514->19515 19518 4236a9 _strlen 19514->19518 19516 422046 ___initmbctable 111 API calls 19515->19516 19516->19518 19517 421328 __calloc_crt 67 API calls 19524 4236de _strlen 19517->19524 19518->19517 19521 41d972 19518->19521 19519 42373c 19520 41a506 __freebuf 67 API calls 19519->19520 19520->19521 19521->19409 19521->19410 19522 421328 __calloc_crt 67 API calls 19522->19524 19523 423762 19525 41a506 __freebuf 67 API calls 19523->19525 19524->19519 19524->19521 19524->19522 19524->19523 19526 422896 _strcpy_s 67 API calls 19524->19526 19527 423723 19524->19527 19525->19521 19526->19524 19527->19524 19528 41ffdb __invoke_watson 10 API calls 19527->19528 19528->19527 19531 421562 __IsNonwritableInCurrentImage 19529->19531 20128 4233d9 19531->20128 19532 421580 __initterm_e 19533 41c9cf __cinit 74 API calls 19532->19533 19534 42159f __IsNonwritableInCurrentImage __initterm 19532->19534 19533->19534 19534->19412 19536 42364a 19535->19536 19539 42364f 19535->19539 19537 422046 ___initmbctable 111 API calls 19536->19537 19537->19539 19538 41d995 19541 40fef0 19538->19541 19539->19538 19540 426731 __wincmdln 77 API calls 19539->19540 19540->19539 20132 410e1c GetModuleHandleW 19541->20132 19545 40ff16 _memset 19546 40ff27 GetCommandLineW 19545->19546 19547 40ffa2 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 19546->19547 19548 40ff36 19546->19548 20139 40bc16 19547->20139 20152 40d64b 19548->20152 19554 40ff44 OpenFileMappingW 19558 40ff91 CloseHandle 19554->19558 19559 40ff5d MapViewOfFile 19554->19559 19555 40ff9c 19556 40d5f7 2 API calls 19555->19556 19556->19547 19557 410051 20143 40c3a8 19557->20143 19558->19547 19561 40ff8a UnmapViewOfFile 19559->19561 19562 40ff6e _realloc 19559->19562 19561->19558 20159 40d5f7 SetEnvironmentVariableW 19562->20159 19564 41005c 20148 419dd0 19564->20148 19567 419dd0 3 API calls 19568 41007d DialogBoxParamW 19567->19568 19569 4100b7 19568->19569 20163 41a0ba 19569->20163 19587 41d882 19586->19587 19588 41d887 19586->19588 19589 421948 __FF_MSGBANNER 67 API calls 19587->19589 19590 42179d __NMSG_WRITE 67 API calls 19588->19590 19589->19588 19591 41d88f 19590->19591 19592 4214e9 __mtinitlocknum 3 API calls 19591->19592 19593 41d899 19592->19593 19593->19390 19601 421470 Sleep GetModuleHandleW 19600->19601 19602 41eb17 19601->19602 19603 42148e 19601->19603 19602->19428 19603->19601 19603->19602 19605 41e75f ___crtMessageBoxW 6 API calls 19604->19605 19606 421757 __init_pointers __initp_misc_winsig 19605->19606 19650 41ed0e 19606->19650 19609 41e6ed __encode_pointer 6 API calls 19610 41ebcf 19609->19610 19610->19441 19612 41ee32 19611->19612 19613 4241e6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19612->19613 19614 41ec17 19612->19614 19613->19612 19614->19430 19614->19451 19617 421331 19615->19617 19618 41ec44 19617->19618 19619 42134f Sleep 19617->19619 19653 4253c7 19617->19653 19618->19430 19618->19455 19620 421364 19619->19620 19620->19617 19620->19618 19670 41fa9c 19621->19670 19623 41e860 GetModuleHandleW 19624 41e870 19623->19624 19625 41e876 19623->19625 19626 421465 __crt_waiting_on_module_handle 2 API calls 19624->19626 19627 41e8b2 19625->19627 19628 41e88e GetProcAddress GetProcAddress 19625->19628 19626->19625 19629 41efa3 __lock 63 API calls 19627->19629 19628->19627 19630 41e8d1 InterlockedIncrement 19629->19630 19671 41e929 19630->19671 19633 41efa3 __lock 63 API calls 19634 41e8f2 19633->19634 19674 4221ad InterlockedIncrement 19634->19674 19636 41e910 19686 41e932 19636->19686 19638 41e91d ___BuildCatchObjectHelper 19638->19459 19640 41e821 19639->19640 19641 41e82d 19639->19641 19642 41e768 __decode_pointer 6 API calls 19640->19642 19643 41e841 TlsFree 19641->19643 19644 41e84f 19641->19644 19642->19641 19643->19644 19645 41ee8e DeleteCriticalSection 19644->19645 19647 41eea6 19644->19647 19646 41a506 __freebuf 67 API calls 19645->19646 19646->19644 19648 41eeb8 DeleteCriticalSection 19647->19648 19649 41eec6 19647->19649 19648->19647 19649->19436 19651 41e6ed __encode_pointer 6 API calls 19650->19651 19652 41ed18 19651->19652 19652->19609 19654 4253d3 ___BuildCatchObjectHelper 19653->19654 19655 4253eb 19654->19655 19665 42540a _memset 19654->19665 19656 41edae __mtinitlocknum 66 API calls 19655->19656 19657 4253f0 19656->19657 19658 420103 __cftog_l 6 API calls 19657->19658 19661 425400 ___BuildCatchObjectHelper 19658->19661 19659 42547c HeapAlloc 19659->19665 19660 41efa3 __lock 66 API calls 19660->19665 19661->19617 19662 41fc9b _realloc 6 API calls 19662->19665 19663 41f7b5 ___sbh_alloc_block 5 API calls 19663->19665 19665->19659 19665->19660 19665->19661 19665->19662 19665->19663 19666 4254c3 19665->19666 19669 41eec9 LeaveCriticalSection 19666->19669 19668 4254ca 19668->19665 19669->19668 19670->19623 19689 41eec9 LeaveCriticalSection 19671->19689 19673 41e8eb 19673->19633 19675 4221cb InterlockedIncrement 19674->19675 19676 4221ce 19674->19676 19675->19676 19677 4221db 19676->19677 19678 4221d8 InterlockedIncrement 19676->19678 19679 4221e5 InterlockedIncrement 19677->19679 19680 4221e8 19677->19680 19678->19677 19679->19680 19681 4221f2 InterlockedIncrement 19680->19681 19683 4221f5 19680->19683 19681->19683 19682 42220e InterlockedIncrement 19682->19683 19683->19682 19684 42221e InterlockedIncrement 19683->19684 19685 422229 InterlockedIncrement 19683->19685 19684->19683 19685->19636 19690 41eec9 LeaveCriticalSection 19686->19690 19688 41e939 19688->19638 19689->19673 19690->19688 19691->19462 19693 423798 19692->19693 19696 423805 19693->19696 19702 426731 19693->19702 19695 423903 19695->19508 19695->19509 19696->19695 19697 426731 77 API calls __wincmdln 19696->19697 19697->19696 19699 422056 19698->19699 19700 42204f 19698->19700 19699->19503 19943 421eac 19700->19943 19705 4266de 19702->19705 19708 41d0c8 19705->19708 19709 41d0db 19708->19709 19715 41d128 19708->19715 19716 41e9b4 19709->19716 19712 41d108 19712->19715 19736 421ba7 19712->19736 19715->19693 19752 41e93b GetLastError 19716->19752 19718 41e9bc 19719 41d0e0 19718->19719 19720 421495 __amsg_exit 67 API calls 19718->19720 19719->19712 19721 422313 19719->19721 19720->19719 19722 42231f ___BuildCatchObjectHelper 19721->19722 19723 41e9b4 __getptd 67 API calls 19722->19723 19724 422324 19723->19724 19725 422352 19724->19725 19727 422336 19724->19727 19726 41efa3 __lock 67 API calls 19725->19726 19728 422359 19726->19728 19729 41e9b4 __getptd 67 API calls 19727->19729 19771 4222d5 19728->19771 19731 42233b 19729->19731 19734 422349 ___BuildCatchObjectHelper 19731->19734 19735 421495 __amsg_exit 67 API calls 19731->19735 19734->19712 19735->19734 19737 421bb3 ___BuildCatchObjectHelper 19736->19737 19738 41e9b4 __getptd 67 API calls 19737->19738 19739 421bb8 19738->19739 19740 41efa3 __lock 67 API calls 19739->19740 19741 421bca 19739->19741 19742 421be8 19740->19742 19745 421495 __amsg_exit 67 API calls 19741->19745 19748 421bd8 ___BuildCatchObjectHelper 19741->19748 19743 421c31 19742->19743 19746 421c19 InterlockedIncrement 19742->19746 19747 421bff InterlockedDecrement 19742->19747 19939 421c42 19743->19939 19745->19748 19746->19743 19747->19746 19749 421c0a 19747->19749 19748->19715 19749->19746 19750 41a506 __freebuf 67 API calls 19749->19750 19751 421c18 19750->19751 19751->19746 19766 41e7e3 TlsGetValue 19752->19766 19754 41e9a8 SetLastError 19754->19718 19756 421328 __calloc_crt 64 API calls 19757 41e966 19756->19757 19757->19754 19758 41e768 __decode_pointer 6 API calls 19757->19758 19759 41e980 19758->19759 19760 41e987 19759->19760 19761 41e99f 19759->19761 19762 41e854 __mtinit 64 API calls 19760->19762 19763 41a506 __freebuf 64 API calls 19761->19763 19764 41e98f GetCurrentThreadId 19762->19764 19765 41e9a5 19763->19765 19764->19754 19765->19754 19767 41e813 19766->19767 19768 41e7f8 19766->19768 19767->19754 19767->19756 19769 41e768 __decode_pointer 6 API calls 19768->19769 19770 41e803 TlsSetValue 19769->19770 19770->19767 19772 4222d9 19771->19772 19778 42230b 19771->19778 19773 4221ad ___addlocaleref 8 API calls 19772->19773 19772->19778 19774 4222ec 19773->19774 19774->19778 19782 42223c 19774->19782 19779 42237d 19778->19779 19938 41eec9 LeaveCriticalSection 19779->19938 19781 422384 19781->19731 19783 4222d0 19782->19783 19784 42224d InterlockedDecrement 19782->19784 19783->19778 19796 422064 19783->19796 19785 422262 InterlockedDecrement 19784->19785 19786 422265 19784->19786 19785->19786 19787 422272 19786->19787 19788 42226f InterlockedDecrement 19786->19788 19789 42227f 19787->19789 19790 42227c InterlockedDecrement 19787->19790 19788->19787 19791 422289 InterlockedDecrement 19789->19791 19792 42228c 19789->19792 19790->19789 19791->19792 19793 4222a5 InterlockedDecrement 19792->19793 19794 4222c0 InterlockedDecrement 19792->19794 19795 4222b5 InterlockedDecrement 19792->19795 19793->19792 19794->19783 19795->19792 19797 4220e8 19796->19797 19801 42207b 19796->19801 19798 422135 19797->19798 19799 41a506 __freebuf 67 API calls 19797->19799 19815 42215c 19798->19815 19850 425bee 19798->19850 19803 422109 19799->19803 19800 4220af 19804 4220d0 19800->19804 19812 41a506 __freebuf 67 API calls 19800->19812 19801->19797 19801->19800 19810 41a506 __freebuf 67 API calls 19801->19810 19805 41a506 __freebuf 67 API calls 19803->19805 19808 41a506 __freebuf 67 API calls 19804->19808 19807 42211c 19805->19807 19814 41a506 __freebuf 67 API calls 19807->19814 19816 4220dd 19808->19816 19809 4221a1 19817 41a506 __freebuf 67 API calls 19809->19817 19818 4220a4 19810->19818 19811 41a506 __freebuf 67 API calls 19811->19815 19819 4220c5 19812->19819 19813 41a506 67 API calls __freebuf 19813->19815 19820 42212a 19814->19820 19815->19809 19815->19813 19821 41a506 __freebuf 67 API calls 19816->19821 19822 4221a7 19817->19822 19826 425dc8 19818->19826 19842 425d83 19819->19842 19825 41a506 __freebuf 67 API calls 19820->19825 19821->19797 19822->19778 19825->19798 19827 425e52 19826->19827 19828 425dd5 19826->19828 19827->19800 19829 425de6 19828->19829 19830 41a506 __freebuf 67 API calls 19828->19830 19831 425df8 19829->19831 19832 41a506 __freebuf 67 API calls 19829->19832 19830->19829 19833 425e0a 19831->19833 19834 41a506 __freebuf 67 API calls 19831->19834 19832->19831 19835 425e1c 19833->19835 19837 41a506 __freebuf 67 API calls 19833->19837 19834->19833 19836 425e2e 19835->19836 19838 41a506 __freebuf 67 API calls 19835->19838 19839 425e40 19836->19839 19840 41a506 __freebuf 67 API calls 19836->19840 19837->19835 19838->19836 19839->19827 19841 41a506 __freebuf 67 API calls 19839->19841 19840->19839 19841->19827 19843 425d90 19842->19843 19844 425dc4 19842->19844 19845 425da0 19843->19845 19846 41a506 __freebuf 67 API calls 19843->19846 19844->19804 19847 425db2 19845->19847 19848 41a506 __freebuf 67 API calls 19845->19848 19846->19845 19847->19844 19849 41a506 __freebuf 67 API calls 19847->19849 19848->19847 19849->19844 19851 422155 19850->19851 19852 425bff 19850->19852 19851->19811 19853 41a506 __freebuf 67 API calls 19852->19853 19854 425c07 19853->19854 19855 41a506 __freebuf 67 API calls 19854->19855 19856 425c0f 19855->19856 19857 41a506 __freebuf 67 API calls 19856->19857 19858 425c17 19857->19858 19859 41a506 __freebuf 67 API calls 19858->19859 19860 425c1f 19859->19860 19861 41a506 __freebuf 67 API calls 19860->19861 19862 425c27 19861->19862 19863 41a506 __freebuf 67 API calls 19862->19863 19864 425c2f 19863->19864 19865 41a506 __freebuf 67 API calls 19864->19865 19866 425c36 19865->19866 19867 41a506 __freebuf 67 API calls 19866->19867 19868 425c3e 19867->19868 19869 41a506 __freebuf 67 API calls 19868->19869 19870 425c46 19869->19870 19871 41a506 __freebuf 67 API calls 19870->19871 19872 425c4e 19871->19872 19873 41a506 __freebuf 67 API calls 19872->19873 19874 425c56 19873->19874 19938->19781 19942 41eec9 LeaveCriticalSection 19939->19942 19941 421c49 19941->19741 19942->19941 19944 421eb8 ___BuildCatchObjectHelper 19943->19944 19945 41e9b4 __getptd 67 API calls 19944->19945 19946 421ec1 19945->19946 19947 421ba7 _LocaleUpdate::_LocaleUpdate 69 API calls 19946->19947 19948 421ecb 19947->19948 19974 421c4b 19948->19974 19951 4212e3 __malloc_crt 67 API calls 19952 421eec 19951->19952 19953 42200b ___BuildCatchObjectHelper 19952->19953 19981 421cc7 19952->19981 19953->19699 19956 422018 19956->19953 19961 42202b 19956->19961 19962 41a506 __freebuf 67 API calls 19956->19962 19957 421f1c InterlockedDecrement 19958 421f2c 19957->19958 19959 421f3d InterlockedIncrement 19957->19959 19958->19959 19964 41a506 __freebuf 67 API calls 19958->19964 19959->19953 19960 421f53 19959->19960 19960->19953 19965 41efa3 __lock 67 API calls 19960->19965 19963 41edae __mtinitlocknum 67 API calls 19961->19963 19962->19961 19963->19953 19966 421f3c 19964->19966 19968 421f67 InterlockedDecrement 19965->19968 19966->19959 19969 421fe3 19968->19969 19970 421ff6 InterlockedIncrement 19968->19970 19969->19970 19972 41a506 __freebuf 67 API calls 19969->19972 19991 42200d 19970->19991 19973 421ff5 19972->19973 19973->19970 19975 41d0c8 _LocaleUpdate::_LocaleUpdate 77 API calls 19974->19975 19976 421c5f 19975->19976 19977 421c6a GetOEMCP 19976->19977 19978 421c88 19976->19978 19980 421c7a 19977->19980 19979 421c8d GetACP 19978->19979 19978->19980 19979->19980 19980->19951 19980->19953 19982 421c4b getSystemCP 79 API calls 19981->19982 19983 421ce7 19982->19983 19985 421d36 IsValidCodePage 19983->19985 19988 421cf2 setSBCS 19983->19988 19990 421d5b _memset __setmbcp_nolock 19983->19990 19984 41e6de CatchGuardHandler 5 API calls 19986 421eaa 19984->19986 19987 421d48 GetCPInfo 19985->19987 19985->19988 19986->19956 19986->19957 19987->19988 19987->19990 19988->19984 19994 421a14 GetCPInfo 19990->19994 20127 41eec9 LeaveCriticalSection 19991->20127 19993 422014 19993->19953 19995 421afa 19994->19995 19996 421a48 _memset 19994->19996 20000 41e6de CatchGuardHandler 5 API calls 19995->20000 20004 425bac 19996->20004 20002 421ba5 20000->20002 20002->19990 20003 42274e ___crtLCMapStringA 102 API calls 20003->19995 20005 41d0c8 _LocaleUpdate::_LocaleUpdate 77 API calls 20004->20005 20006 425bbf 20005->20006 20014 4259f2 20006->20014 20009 42274e 20010 41d0c8 _LocaleUpdate::_LocaleUpdate 77 API calls 20009->20010 20011 422761 20010->20011 20080 4223a9 20011->20080 20015 425a13 GetStringTypeW 20014->20015 20018 425a3e 20014->20018 20016 425a33 GetLastError 20015->20016 20017 425a2b 20015->20017 20016->20018 20020 425a77 MultiByteToWideChar 20017->20020 20036 425b1f 20017->20036 20018->20017 20019 425b25 20018->20019 20042 425ef0 GetLocaleInfoA 20019->20042 20026 425aa4 20020->20026 20020->20036 20022 41e6de CatchGuardHandler 5 API calls 20024 421ab5 20022->20024 20024->20009 20025 425b76 GetStringTypeA 20031 425b91 20025->20031 20025->20036 20027 425ab9 _memset __crtGetStringTypeA_stat 20026->20027 20028 41cf3e _malloc 67 API calls 20026->20028 20030 425af2 MultiByteToWideChar 20027->20030 20027->20036 20028->20027 20034 425b08 GetStringTypeW 20030->20034 20035 425b19 20030->20035 20032 41a506 __freebuf 67 API calls 20031->20032 20032->20036 20034->20035 20038 422389 20035->20038 20036->20022 20039 4223a6 20038->20039 20040 422395 20038->20040 20039->20036 20040->20039 20041 41a506 __freebuf 67 API calls 20040->20041 20041->20039 20043 425f23 20042->20043 20045 425f1e 20042->20045 20073 426f29 20043->20073 20046 41e6de CatchGuardHandler 5 API calls 20045->20046 20047 425b49 20046->20047 20047->20025 20047->20036 20048 425f39 20047->20048 20049 426003 20048->20049 20050 425f79 GetCPInfo 20048->20050 20053 41e6de CatchGuardHandler 5 API calls 20049->20053 20051 425f90 20050->20051 20052 425fee MultiByteToWideChar 20050->20052 20051->20052 20054 425f96 GetCPInfo 20051->20054 20052->20049 20057 425fa9 _strlen 20052->20057 20055 425b6a 20053->20055 20054->20052 20056 425fa3 20054->20056 20055->20025 20055->20036 20056->20052 20056->20057 20058 41cf3e _malloc 67 API calls 20057->20058 20060 425fdb _memset __crtGetStringTypeA_stat 20057->20060 20058->20060 20059 426038 MultiByteToWideChar 20061 426050 20059->20061 20062 42606f 20059->20062 20060->20049 20060->20059 20064 426057 WideCharToMultiByte 20061->20064 20065 426074 20061->20065 20063 422389 __freea 67 API calls 20062->20063 20063->20049 20064->20062 20066 426093 20065->20066 20067 42607f WideCharToMultiByte 20065->20067 20068 421328 __calloc_crt 67 API calls 20066->20068 20067->20062 20067->20066 20069 42609b 20068->20069 20069->20062 20070 4260a4 WideCharToMultiByte 20069->20070 20070->20062 20071 4260b6 20070->20071 20072 41a506 __freebuf 67 API calls 20071->20072 20072->20062 20076 426efe 20073->20076 20077 426f17 20076->20077 20078 426ccf strtoxl 91 API calls 20077->20078 20079 426f24 20078->20079 20079->20045 20081 4223ca LCMapStringW 20080->20081 20084 4223e5 20080->20084 20082 4223ed GetLastError 20081->20082 20081->20084 20082->20084 20083 4225e3 20087 425ef0 ___ansicp 91 API calls 20083->20087 20084->20083 20085 42243f 20084->20085 20086 422458 MultiByteToWideChar 20085->20086 20103 4225da 20085->20103 20096 422485 20086->20096 20086->20103 20089 42260b 20087->20089 20088 41e6de CatchGuardHandler 5 API calls 20090 421ad5 20088->20090 20091 422624 20089->20091 20092 4226ff LCMapStringA 20089->20092 20089->20103 20090->20003 20094 425f39 ___convertcp 74 API calls 20091->20094 20093 42265b 20092->20093 20097 422726 20093->20097 20102 41a506 __freebuf 67 API calls 20093->20102 20099 422636 20094->20099 20095 4224d6 MultiByteToWideChar 20100 4225d1 20095->20100 20101 4224ef LCMapStringW 20095->20101 20098 41cf3e _malloc 67 API calls 20096->20098 20107 42249e __crtGetStringTypeA_stat 20096->20107 20097->20103 20109 41a506 __freebuf 67 API calls 20097->20109 20098->20107 20099->20103 20104 422640 LCMapStringA 20099->20104 20105 422389 __freea 67 API calls 20100->20105 20101->20100 20106 422510 20101->20106 20102->20097 20103->20088 20104->20093 20112 422662 20104->20112 20105->20103 20108 422519 20106->20108 20111 422542 20106->20111 20107->20095 20107->20103 20108->20100 20110 42252b LCMapStringW 20108->20110 20109->20103 20110->20100 20114 42255d __crtGetStringTypeA_stat 20111->20114 20116 41cf3e _malloc 67 API calls 20111->20116 20115 422673 _memset __crtGetStringTypeA_stat 20112->20115 20117 41cf3e _malloc 67 API calls 20112->20117 20113 422591 LCMapStringW 20118 4225cb 20113->20118 20119 4225a9 WideCharToMultiByte 20113->20119 20114->20100 20114->20113 20115->20093 20121 4226b1 LCMapStringA 20115->20121 20116->20114 20117->20115 20120 422389 __freea 67 API calls 20118->20120 20119->20118 20120->20100 20123 4226d1 20121->20123 20124 4226cd 20121->20124 20125 425f39 ___convertcp 74 API calls 20123->20125 20126 422389 __freea 67 API calls 20124->20126 20125->20124 20126->20093 20127->19993 20129 4233df 20128->20129 20130 41e6ed __encode_pointer 6 API calls 20129->20130 20131 4233f7 20129->20131 20130->20129 20131->19532 20133 410e2b GetProcAddress 20132->20133 20134 40ff03 OleInitialize 20132->20134 20133->20134 20135 410e3b 20133->20135 20136 411f56 GetCPInfo 20134->20136 20135->20134 20137 411f7a IsDBCSLeadByte 20136->20137 20137->20137 20138 411f92 20137->20138 20138->19545 20140 41a9f7 __vswprintf_c_l 101 API calls 20139->20140 20141 40bc2e SetEnvironmentVariableW GetModuleHandleW LoadIconW LoadBitmapW 20140->20141 20142 41a060 LoadLibraryW LoadLibraryW OleInitialize InitCommonControlsEx SHGetMalloc 20141->20142 20142->19557 20169 40bc32 20143->20169 20145 40c3b4 20192 40c0f6 GetModuleHandleW FindResourceW 20145->20192 20147 40c3bb 20147->19564 20149 410073 20148->20149 20150 419dd9 GetDC 20148->20150 20149->19567 20150->20149 20151 419de8 GetDeviceCaps ReleaseDC 20150->20151 20151->20149 20158 40d66f 20152->20158 20153 40d77a 20153->19554 20153->19555 20154 40d6a4 CharUpperW 20154->20158 20155 40d72b CharUpperW 20155->20158 20156 40d6cb CharUpperW 20156->20158 20157 40d033 124 API calls 20157->20158 20158->20153 20158->20154 20158->20155 20158->20156 20158->20157 20161 40d626 20159->20161 20160 40d645 20160->19561 20161->20160 20162 40d63d SetEnvironmentVariableW 20161->20162 20162->20160 20170 40bc3c __EH_prolog _wcschr __write_nolock 20169->20170 20171 40bc5f GetModuleFileNameW 20170->20171 20173 40bc88 _wcscpy 20170->20173 20172 40bc7b _wcsrchr 20171->20172 20172->20173 20191 40bcbc ctype 20172->20191 20196 4087c3 20173->20196 20175 40bdf2 20177 408fed 124 API calls 20175->20177 20175->20191 20178 40be0e 20177->20178 20180 41cf3e _malloc 67 API calls 20178->20180 20181 40be18 20180->20181 20182 408e7b 125 API calls 20181->20182 20181->20191 20184 40be34 20182->20184 20186 41cf3e _malloc 67 API calls 20184->20186 20184->20191 20185 40bcb8 ctype _strncmp 20185->20175 20185->20191 20205 408bae 20185->20205 20213 408e7b 20185->20213 20221 408fed 20185->20221 20191->20145 20193 40c124 20192->20193 20194 40c11e 20192->20194 20304 40bf1d 20193->20304 20194->20147 20197 4087cd __write_nolock 20196->20197 20198 40882d CreateFileW 20197->20198 20199 40885d GetLastError 20198->20199 20203 4088af 20198->20203 20228 40a3dc 20199->20228 20201 40887d 20202 408881 CreateFileW GetLastError 20201->20202 20201->20203 20204 4088a6 20202->20204 20203->20185 20204->20203 20206 408bc0 20205->20206 20207 408bd3 SetFilePointer 20205->20207 20208 408c0b ___inittime 20206->20208 20248 406402 20206->20248 20207->20208 20209 408bee GetLastError 20207->20209 20208->20185 20209->20208 20211 408bf8 20209->20211 20211->20208 20212 406402 120 API calls 20211->20212 20212->20208 20215 408e93 20213->20215 20216 408ef5 20215->20216 20217 408ee0 20215->20217 20220 408eeb 20215->20220 20258 408ca0 20215->20258 20219 408ca0 5 API calls 20216->20219 20216->20220 20270 40653a 20217->20270 20219->20216 20220->20185 20288 408f4b 20221->20288 20224 409018 20224->20185 20225 406402 120 API calls 20225->20224 20229 40a3e9 __write_nolock 20228->20229 20237 40a3f3 _wcslen _wcscpy _wcsncpy 20229->20237 20238 40a0ea 20229->20238 20231 40a402 _wcslen 20241 40a2f5 20231->20241 20237->20201 20245 410b52 20238->20245 20242 40a300 20241->20242 20243 40a0ea CharUpperW 20242->20243 20244 40a30d 20242->20244 20243->20244 20246 40a0f8 20245->20246 20247 410b5f CharUpperW 20245->20247 20246->20231 20247->20246 20249 406416 20248->20249 20250 40640b 20248->20250 20254 4062fd 20249->20254 20251 406376 ctype 119 API calls 20250->20251 20251->20249 20255 40630c 20254->20255 20256 406329 20255->20256 20257 41c77f __CxxThrowException@8 RaiseException 20255->20257 20256->20207 20257->20256 20259 408cba ReadFile 20258->20259 20260 408caf GetStdHandle 20258->20260 20261 408cd3 20259->20261 20262 408cf3 20259->20262 20260->20259 20275 408c5a 20261->20275 20262->20215 20264 408cda 20279 40652c 20270->20279 20276 408c62 20275->20276 20277 408c65 GetFileType 20275->20277 20276->20264 20278 408c71 20277->20278 20278->20264 20282 406497 20279->20282 20285 40639f 20282->20285 20286 41170e ctype 119 API calls 20285->20286 20291 408fb4 20288->20291 20293 408f58 20288->20293 20289 408f89 SetFilePointer 20290 408faa GetLastError 20289->20290 20289->20291 20290->20291 20291->20224 20291->20225 20292 408f74 20292->20289 20293->20289 20293->20292 20295 408e03 20293->20295 20296 408e0d __EH_prolog 20295->20296 20301 40117b 20296->20301 20303 408bae 122 API calls 20301->20303 20302 401189 20303->20302 20305 40bf2a ctype __write_nolock 20304->20305 20306 40bf85 ctype _strlen 20305->20306 20311 40bfe4 _wcsrchr _wcscpy _wcschr ctype _wcsncpy 20305->20311 20312 411afd WideCharToMultiByte 20305->20312 20307 411afd ctype WideCharToMultiByte 20306->20307 20309 40bfb2 ctype _strlen 20307->20309 20310 40bc16 _swprintf 101 API calls 20309->20310 20310->20311 20311->20194 20313 411b27 20312->20313 20313->20306 18813 42993a 18818 405512 18813->18818 18819 40551c __EH_prolog 18818->18819 18837 40a026 18819->18837 18824 410d8e 67 API calls 18825 405546 18824->18825 18826 410d8e 67 API calls 18825->18826 18827 405555 18826->18827 18828 410d8e 67 API calls 18827->18828 18829 405564 18828->18829 18830 410d8e 67 API calls 18829->18830 18831 405573 18830->18831 18846 405394 18831->18846 18838 40a030 __EH_prolog 18837->18838 18859 40d0e6 18838->18859 18843 410d8e 18998 410d00 18843->18998 18847 409f85 2 API calls 18846->18847 18848 40539c 18847->18848 18849 410d00 67 API calls 18848->18849 18850 4053c9 18849->18850 18851 410d00 67 API calls 18850->18851 18852 4053d4 18851->18852 18853 410d00 67 API calls 18852->18853 18854 4053df 18853->18854 18855 410d00 67 API calls 18854->18855 18856 4053ea 18855->18856 18857 410d00 67 API calls 18856->18857 18858 4053f5 18857->18858 18866 40d033 18859->18866 18861 40a042 18862 409f85 18861->18862 18863 409f95 _memset 18862->18863 18993 410f12 18863->18993 18867 40d059 _wcslen 18866->18867 18868 40d042 _memset 18866->18868 18870 40cfb9 18867->18870 18868->18861 18871 40cfca _realloc 18870->18871 18874 40cef5 18871->18874 18875 40cf04 18874->18875 18876 40cf0e 18874->18876 18884 40ceb6 18875->18884 18878 40cf7c GetCurrentProcessId 18876->18878 18879 40cf31 18876->18879 18883 40cf5e 18878->18883 18879->18883 18888 406423 18879->18888 18881 40cf4c __init_pointers 18893 406371 18881->18893 18883->18868 18885 40ceef 18884->18885 18886 40cebf LoadLibraryW 18884->18886 18885->18876 18886->18885 18887 40ced0 GetProcAddress GetProcAddress 18886->18887 18887->18885 18897 41a9f7 18888->18897 18895 4062fd 18893->18895 18894 406329 18894->18883 18895->18894 18990 41c77f 18895->18990 18903 41a8ff 18897->18903 18900 406376 18945 41170e 18900->18945 18902 40639b 18902->18881 18904 41a92f 18903->18904 18905 41a90f 18903->18905 18908 41a93f 18904->18908 18913 41a95f 18904->18913 18918 41edae 18905->18918 18910 41edae __mtinitlocknum 67 API calls 18908->18910 18911 41a944 18910->18911 18912 420103 __cftog_l 6 API calls 18911->18912 18916 406446 18912->18916 18914 41a9a6 18913->18914 18913->18916 18924 41fe68 18913->18924 18914->18916 18917 41fe68 __flsbuf 101 API calls 18914->18917 18916->18900 18917->18916 18919 41e93b __getptd_noexit 67 API calls 18918->18919 18920 41a914 18919->18920 18921 420103 18920->18921 18922 41e768 __decode_pointer 6 API calls 18921->18922 18923 420113 __invoke_watson 18922->18923 18925 424df7 __fileno 67 API calls 18924->18925 18926 41fe78 18925->18926 18927 41fe83 18926->18927 18928 41fe9a 18926->18928 18930 41edae __mtinitlocknum 67 API calls 18927->18930 18929 41fe9e 18928->18929 18939 41feab __flsbuf 18928->18939 18931 41edae __mtinitlocknum 67 API calls 18929->18931 18938 41fe88 18930->18938 18931->18938 18932 41ff0c 18933 41ff9b 18932->18933 18934 41ff1b 18932->18934 18935 424c6e __locking 101 API calls 18933->18935 18936 41ff32 18934->18936 18942 41ff4f 18934->18942 18935->18938 18937 424c6e __locking 101 API calls 18936->18937 18937->18938 18938->18914 18939->18932 18939->18938 18940 424d93 __flsbuf 67 API calls 18939->18940 18941 41ff01 18939->18941 18940->18941 18941->18932 18944 424d4a __getbuf 67 API calls 18941->18944 18942->18938 18943 424422 __lseeki64 71 API calls 18942->18943 18943->18938 18944->18932 18946 41171d 18945->18946 18960 41176a 18945->18960 18949 41181c 18946->18949 18950 4117b3 18946->18950 18951 41176f 18946->18951 18952 411796 18946->18952 18953 4117df 18946->18953 18954 411763 18946->18954 18955 41178c 18946->18955 18946->18960 18965 411742 18946->18965 18947 40c3bf ctype 104 API calls 18966 41179d 18947->18966 18948 40c3bf ctype 104 API calls 18948->18965 18949->18951 18949->18952 18949->18955 18949->18960 18950->18948 18983 40c3bf 18951->18983 18963 40c3bf ctype 104 API calls 18952->18963 18958 40c3bf ctype 104 API calls 18953->18958 18978 40d3ac 18954->18978 18955->18947 18955->18960 18956 40e283 ctype 116 API calls 18956->18960 18962 4117ef 18958->18962 18960->18902 18967 40e283 ctype 116 API calls 18962->18967 18963->18966 18969 40e283 18965->18969 18966->18956 18968 4117f7 18967->18968 18968->18902 18970 40e2d4 18969->18970 18971 40e28c 18969->18971 18970->18902 18971->18970 18972 40e296 GetLastError 18971->18972 18973 41a9f7 __vswprintf_c_l 101 API calls 18972->18973 18974 40e2bb 18973->18974 18975 40d3ac ctype 13 API calls 18974->18975 18976 40e2c6 18975->18976 18976->18970 18977 40e2cd SetLastError 18976->18977 18977->18970 18979 40d3b9 __write_nolock 18978->18979 18980 40d3e6 18979->18980 18981 40d3c6 wvsprintfW 18979->18981 18980->18960 18982 40d298 ctype 12 API calls 18981->18982 18982->18980 18984 40c3cf ctype 18983->18984 18985 40c404 LoadStringW 18984->18985 18986 40c416 LoadStringW 18984->18986 18985->18986 18987 40c424 18985->18987 18986->18987 18988 40bf1d ctype 102 API calls 18987->18988 18989 40c432 18988->18989 18989->18965 18991 41c7b4 RaiseException 18990->18991 18992 41c7a8 18990->18992 18991->18894 18992->18991 18996 410edb GetCurrentProcess GetProcessAffinityMask 18993->18996 18997 405528 18996->18997 18997->18843 19001 401b67 18998->19001 19002 401b70 19001->19002 19003 401b76 19001->19003 19005 41a506 19002->19005 19003->18824 19007 41a512 ___BuildCatchObjectHelper 19005->19007 19006 41a58b _realloc ___BuildCatchObjectHelper 19006->19003 19007->19006 19017 41a551 19007->19017 19018 41efa3 19007->19018 19008 41a566 RtlFreeHeap 19008->19006 19010 41a578 19008->19010 19011 41edae __mtinitlocknum 65 API calls 19010->19011 19012 41a57d GetLastError 19011->19012 19012->19006 19013 41a543 19032 41a55c 19013->19032 19014 41a529 ___sbh_find_block 19014->19013 19025 41f006 19014->19025 19017->19006 19017->19008 19019 41efb8 19018->19019 19020 41efcb EnterCriticalSection 19018->19020 19035 41eee0 19019->19035 19020->19014 19022 41efbe 19022->19020 19061 421495 19022->19061 19027 41f045 19025->19027 19031 41f2e7 19025->19031 19026 41f231 VirtualFree 19028 41f295 19026->19028 19027->19026 19027->19031 19029 41f2a4 VirtualFree HeapFree 19028->19029 19028->19031 19260 41cb50 19029->19260 19031->19013 19264 41eec9 LeaveCriticalSection 19032->19264 19034 41a563 19034->19017 19036 41eeec ___BuildCatchObjectHelper 19035->19036 19048 41ef12 19036->19048 19068 421948 19036->19068 19040 41ef2d 19042 41ef43 19040->19042 19043 41ef34 19040->19043 19047 41efa3 __lock 67 API calls 19042->19047 19046 41edae __mtinitlocknum 67 API calls 19043->19046 19049 41ef22 ___BuildCatchObjectHelper 19046->19049 19050 41ef4a 19047->19050 19048->19049 19114 4212e3 19048->19114 19049->19022 19051 41ef52 19050->19051 19052 41ef7e 19050->19052 19119 4241e6 19051->19119 19053 41a506 __freebuf 67 API calls 19052->19053 19055 41ef6f 19053->19055 19123 41ef9a 19055->19123 19056 41ef5d 19056->19055 19057 41a506 __freebuf 67 API calls 19056->19057 19059 41ef69 19057->19059 19060 41edae __mtinitlocknum 67 API calls 19059->19060 19060->19055 19062 421948 __FF_MSGBANNER 67 API calls 19061->19062 19063 42149f 19062->19063 19064 42179d __NMSG_WRITE 67 API calls 19063->19064 19065 4214a7 19064->19065 19066 41e768 __decode_pointer 6 API calls 19065->19066 19067 41efca 19066->19067 19067->19020 19126 4259a7 19068->19126 19070 42194f 19071 4259a7 __set_error_mode 67 API calls 19070->19071 19075 42195c 19070->19075 19071->19075 19072 42179d __NMSG_WRITE 67 API calls 19073 421974 19072->19073 19076 42179d __NMSG_WRITE 67 API calls 19073->19076 19074 41ef01 19077 42179d 19074->19077 19075->19072 19075->19074 19076->19074 19078 4217b1 19077->19078 19079 4259a7 __set_error_mode 64 API calls 19078->19079 19110 41ef08 19078->19110 19080 4217d3 19079->19080 19081 421911 GetStdHandle 19080->19081 19082 4259a7 __set_error_mode 64 API calls 19080->19082 19083 42191f _strlen 19081->19083 19081->19110 19084 4217e4 19082->19084 19086 421938 WriteFile 19083->19086 19083->19110 19084->19081 19085 4217f6 19084->19085 19085->19110 19132 422896 19085->19132 19086->19110 19089 42182c GetModuleFileNameA 19091 42184a 19089->19091 19096 42186d _strlen 19089->19096 19093 422896 _strcpy_s 64 API calls 19091->19093 19094 42185a 19093->19094 19094->19096 19097 41ffdb __invoke_watson 10 API calls 19094->19097 19095 4218b0 19157 42587e 19095->19157 19096->19095 19148 4258f2 19096->19148 19097->19096 19102 4218d4 19103 42587e _strcat_s 64 API calls 19102->19103 19105 4218e8 19103->19105 19104 41ffdb __invoke_watson 10 API calls 19104->19102 19107 4218f9 19105->19107 19108 41ffdb __invoke_watson 10 API calls 19105->19108 19106 41ffdb __invoke_watson 10 API calls 19106->19095 19166 425715 19107->19166 19108->19107 19111 4214e9 19110->19111 19226 4214be GetModuleHandleW 19111->19226 19118 4212ec 19114->19118 19116 421322 19116->19040 19117 421303 Sleep 19117->19118 19118->19116 19118->19117 19229 41cf3e 19118->19229 19258 41fa9c 19119->19258 19121 4241f2 InitializeCriticalSectionAndSpinCount 19122 424236 ___BuildCatchObjectHelper 19121->19122 19122->19056 19259 41eec9 LeaveCriticalSection 19123->19259 19125 41efa1 19125->19049 19127 4259b6 19126->19127 19128 41edae __mtinitlocknum 67 API calls 19127->19128 19131 4259c0 19127->19131 19129 4259d9 19128->19129 19130 420103 __cftog_l 6 API calls 19129->19130 19130->19131 19131->19070 19133 4228a7 19132->19133 19134 4228ae 19132->19134 19133->19134 19139 4228d4 19133->19139 19135 41edae __mtinitlocknum 67 API calls 19134->19135 19136 4228b3 19135->19136 19137 420103 __cftog_l 6 API calls 19136->19137 19138 421818 19137->19138 19138->19089 19141 41ffdb 19138->19141 19139->19138 19140 41edae __mtinitlocknum 67 API calls 19139->19140 19140->19136 19193 41a820 19141->19193 19143 420008 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19144 4200e4 GetCurrentProcess TerminateProcess 19143->19144 19145 4200d8 __invoke_watson 19143->19145 19195 41e6de 19144->19195 19145->19144 19147 420101 19147->19089 19152 425904 19148->19152 19149 425908 19150 42189d 19149->19150 19151 41edae __mtinitlocknum 67 API calls 19149->19151 19150->19095 19150->19106 19153 425924 19151->19153 19152->19149 19152->19150 19155 42594e 19152->19155 19154 420103 __cftog_l 6 API calls 19153->19154 19154->19150 19155->19150 19156 41edae __mtinitlocknum 67 API calls 19155->19156 19156->19153 19158 425896 19157->19158 19161 42588f 19157->19161 19159 41edae __mtinitlocknum 67 API calls 19158->19159 19160 42589b 19159->19160 19162 420103 __cftog_l 6 API calls 19160->19162 19161->19158 19163 4258ca 19161->19163 19164 4218c3 19162->19164 19163->19164 19165 41edae __mtinitlocknum 67 API calls 19163->19165 19164->19102 19164->19104 19165->19160 19203 41e75f 19166->19203 19169 425738 LoadLibraryA 19171 425862 19169->19171 19172 42574d GetProcAddress 19169->19172 19170 4257ea 19176 41e768 __decode_pointer 6 API calls 19170->19176 19191 425815 19170->19191 19171->19110 19172->19171 19174 425763 19172->19174 19173 4257c0 19173->19170 19216 41e768 TlsGetValue 19173->19216 19206 41e6ed TlsGetValue 19174->19206 19175 41e768 __decode_pointer 6 API calls 19175->19171 19187 42582d 19176->19187 19181 41e768 __decode_pointer 6 API calls 19181->19170 19182 41e6ed __encode_pointer 6 API calls 19183 42577e GetProcAddress 19182->19183 19184 41e6ed __encode_pointer 6 API calls 19183->19184 19185 425793 GetProcAddress 19184->19185 19186 41e6ed __encode_pointer 6 API calls 19185->19186 19188 4257a8 19186->19188 19189 41e768 __decode_pointer 6 API calls 19187->19189 19187->19191 19188->19173 19190 4257b2 GetProcAddress 19188->19190 19189->19191 19192 41e6ed __encode_pointer 6 API calls 19190->19192 19191->19175 19192->19173 19194 41a82c __VEC_memzero 19193->19194 19194->19143 19196 41e6e6 19195->19196 19197 41e6e8 IsDebuggerPresent 19195->19197 19196->19147 19199 424e29 __invoke_watson 19197->19199 19200 423f50 SetUnhandledExceptionFilter UnhandledExceptionFilter 19199->19200 19201 423f75 GetCurrentProcess TerminateProcess 19200->19201 19202 423f6d __invoke_watson 19200->19202 19201->19147 19202->19201 19204 41e6ed __encode_pointer 6 API calls 19203->19204 19205 41e766 19204->19205 19205->19169 19205->19173 19207 41e705 19206->19207 19208 41e726 GetModuleHandleW 19206->19208 19207->19208 19209 41e70f TlsGetValue 19207->19209 19210 41e741 GetProcAddress 19208->19210 19211 41e736 19208->19211 19214 41e71a 19209->19214 19212 41e71e GetProcAddress 19210->19212 19213 421465 __crt_waiting_on_module_handle Sleep GetModuleHandleW 19211->19213 19212->19182 19215 41e73c 19213->19215 19214->19208 19214->19212 19215->19210 19215->19212 19217 41e7a1 GetModuleHandleW 19216->19217 19218 41e780 19216->19218 19220 41e7b1 19217->19220 19221 41e7bc GetProcAddress 19217->19221 19218->19217 19219 41e78a TlsGetValue 19218->19219 19224 41e795 19219->19224 19222 421465 __crt_waiting_on_module_handle Sleep GetModuleHandleW 19220->19222 19223 41e799 19221->19223 19225 41e7b7 19222->19225 19223->19181 19224->19217 19224->19223 19225->19221 19225->19223 19227 4214d2 GetProcAddress 19226->19227 19228 4214e2 ExitProcess 19226->19228 19227->19228 19230 41cff1 19229->19230 19236 41cf50 19229->19236 19231 41fc9b _realloc 6 API calls 19230->19231 19233 41cff7 19231->19233 19232 41cf61 19234 421948 __FF_MSGBANNER 66 API calls 19232->19234 19232->19236 19239 42179d __NMSG_WRITE 66 API calls 19232->19239 19241 4214e9 __mtinitlocknum 3 API calls 19232->19241 19235 41edae __mtinitlocknum 66 API calls 19233->19235 19234->19232 19237 41cfe9 19235->19237 19236->19232 19236->19237 19240 41cfad RtlAllocateHeap 19236->19240 19242 41cfdd 19236->19242 19245 41cfe2 19236->19245 19247 41ceef 19236->19247 19255 41fc9b 19236->19255 19237->19118 19239->19232 19240->19236 19241->19232 19243 41edae __mtinitlocknum 66 API calls 19242->19243 19243->19245 19246 41edae __mtinitlocknum 66 API calls 19245->19246 19246->19237 19248 41cefb ___BuildCatchObjectHelper 19247->19248 19249 41efa3 __lock 67 API calls 19248->19249 19250 41cf2c ___BuildCatchObjectHelper 19248->19250 19251 41cf11 19249->19251 19250->19236 19252 41f7b5 ___sbh_alloc_block 5 API calls 19251->19252 19253 41cf1c 19252->19253 19254 41cf35 _malloc LeaveCriticalSection 19253->19254 19254->19250 19256 41e768 __decode_pointer 6 API calls 19255->19256 19257 41fcab 19256->19257 19257->19236 19258->19121 19259->19125 19261 41cb68 19260->19261 19262 41cb97 19261->19262 19263 41cb8f __VEC_memcpy 19261->19263 19262->19031 19263->19262 19264->19034

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 00410E1C: GetModuleHandleW.KERNEL32(kernel32,0040FF03,00000001), ref: 00410E21
                                                              • Part of subcall function 00410E1C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00410E31
                                                            • OleInitialize.OLE32(00000000), ref: 0040FF06
                                                              • Part of subcall function 00411F56: GetCPInfo.KERNEL32(00000000,?,?,?,?,0040FF16), ref: 00411F67
                                                              • Part of subcall function 00411F56: IsDBCSLeadByte.KERNEL32(00000000), ref: 00411F7B
                                                            • _memset.LIBCMT ref: 0040FF22
                                                            • GetCommandLineW.KERNEL32 ref: 0040FF2A
                                                            • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0040FF50
                                                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007002), ref: 0040FF62
                                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0040FF8B
                                                              • Part of subcall function 0040D5F7: SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 0040D610
                                                              • Part of subcall function 0040D5F7: SetEnvironmentVariableW.KERNEL32(sfxpar,00000002,00000000,00000000,?,?,00000400), ref: 0040D643
                                                            • CloseHandle.KERNEL32(?), ref: 0040FF94
                                                            • GetModuleFileNameW.KERNEL32(00000000,00439820,00000800), ref: 0040FFAE
                                                            • SetEnvironmentVariableW.KERNELBASE(sfxname,00439820), ref: 0040FFC0
                                                            • GetLocalTime.KERNEL32(?), ref: 0040FFC6
                                                            • _swprintf.LIBCMT ref: 0040FFFD
                                                            • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00410011
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00410014
                                                            • LoadIconW.USER32(00000000,00000064), ref: 0041002B
                                                            • LoadBitmapW.USER32(00000065), ref: 0041003E
                                                            • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,0040F58D,00000000), ref: 0041009D
                                                            • DeleteObject.GDI32 ref: 004100FE
                                                            • DeleteObject.GDI32(?), ref: 0041010A
                                                              • Part of subcall function 0040D64B: CharUpperW.USER32(?,?,?,?,00000400), ref: 0040D6AC
                                                              • Part of subcall function 0040D64B: CharUpperW.USER32(?,?,?,?,?,00000400), ref: 0040D6D3
                                                            • CloseHandle.KERNEL32(000000FF), ref: 00410147
                                                            • Sleep.KERNEL32(?), ref: 00410157
                                                            • OleUninitialize.OLE32 ref: 0041015D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: EnvironmentFileHandleVariable$Module$CharCloseDeleteLoadObjectUpperView$AddressBitmapByteCommandDialogIconInfoInitializeLeadLineLocalMappingNameOpenParamProcSleepTimeUninitializeUnmap_memset_swprintf
                                                            • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                            • API String ID: 2890863147-3710569615
                                                            • Opcode ID: e302a6a03e0c0a9aaa08beecaf1dedc93de811017ef03846853a5e8821ade7c7
                                                            • Instruction ID: f6d524faf13461bd4ea8cb5a97d50562f0dad5b6822c88fd20d602f5543b7383
                                                            • Opcode Fuzzy Hash: e302a6a03e0c0a9aaa08beecaf1dedc93de811017ef03846853a5e8821ade7c7
                                                            • Instruction Fuzzy Hash: 5061D971A00205BFC720BFA1DC499AE7BB8EB05314F50443BF901A22A1DB7D4D95DB6E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 611 402f2c-402f5e call 41a4dc call 41aaf0 call 40b736 618 402f60-402f75 611->618 619 402faf-402fb3 611->619 618->619 621 402f77 618->621 620 40302f-403034 call 40b4c8 619->620 625 403039-40303c 620->625 623 402f83-402f9e call 401bbb 621->623 624 402f79-402f81 621->624 627 402fa0-402fa2 call 401c37 623->627 637 402fb5-402fee call 405fe7 623->637 624->619 624->623 625->627 628 403042-403071 call 40b5af call 40b670 call 40b60d 625->628 632 402fa7-402faa 627->632 651 403675-403677 call 401c80 628->651 652 403077-403079 628->652 635 403680 632->635 640 403682-40368a call 41a506 635->640 641 40368b 635->641 646 402ff0-403007 call 41ac04 637->646 647 40302c 637->647 640->641 642 40368d-40369e 641->642 646->647 656 403009-403027 call 406376 call 4062ba 646->656 647->620 657 40367c 651->657 652->651 655 40307f-403089 652->655 655->651 658 40308f-403092 655->658 656->632 657->635 658->651 660 403098-4030a4 call 40b4c8 658->660 666 4030b2-403103 call 40b716 call 40b60d * 2 660->666 667 4030a6-4030ad call 401c37 660->667 676 403105-403123 call 401c80 call 4062ba 666->676 677 40313d-40314c 666->677 667->657 676->677 697 403125-403138 call 40639f 676->697 678 40317b-403188 677->678 679 40314e-403166 call 40b60d 677->679 682 403198-4031ce call 4010d4 678->682 683 40318a-403195 call 40b60d 678->683 679->678 690 403168 679->690 693 4031d4 682->693 694 40358d-4035ec call 409b19 call 40b60d 682->694 683->682 695 40316a-40316d 690->695 696 40316f-403176 call 401c80 690->696 699 403641-40364d 693->699 700 4031da-4031dd 693->700 723 4035fe 694->723 724 4035ee-4035fc call 40b60d 694->724 695->678 695->696 696->632 697->657 704 40365f-403666 699->704 705 40364f 699->705 707 4031e3-4031e6 700->707 708 4032f7-403300 700->708 712 403671-403673 704->712 713 403668-403670 call 41a506 704->713 705->651 710 403651-40365d 705->710 714 403225-40323a call 40b60d 707->714 715 4031e8-4031eb 707->715 716 403302 708->716 717 403308-403375 call 409b44 call 40b60d * 2 708->717 710->651 710->704 712->642 713->712 733 40324c-403270 call 40b60d call 40b562 714->733 734 40323c-403247 call 401ca3 714->734 715->699 720 4031f1-403220 call 40b60d 715->720 716->717 750 403377-403382 717->750 751 403388-4033a2 717->751 720->699 731 403605-40360c 723->731 724->731 736 40361c 731->736 737 40360e-403615 731->737 733->734 753 403272-40328a call 40b696 733->753 734->657 744 40361e-40362a 736->744 737->736 742 403617-40361a 737->742 742->744 744->699 748 40362c-40363c call 40272e 744->748 748->699 750->751 754 4033a4 751->754 755 4033aa-4033ac 751->755 762 4032eb-4032f2 753->762 763 40328c-4032e5 call 40b696 * 2 call 4106ae call 4109b0 call 410a29 call 41ac04 753->763 756 4033a6-4033a8 754->756 757 4033ae-4033cc call 40b60d 754->757 755->757 756->755 756->757 764 4033e4-4033f4 757->764 765 4033ce-4033df call 40b5af call 411357 757->765 762->699 763->762 769 4033f6-403404 call 40b5af 764->769 770 40340a-403464 call 40b60d * 3 764->770 765->764 769->770 787 403466-40346c 770->787 788 40346e-403470 770->788 791 403475-4034a2 787->791 788->791 792 403472 788->792 794 4034a4-4034a8 791->794 795 4034af 791->795 792->791 794->795 797 4034aa-4034ad 794->797 798 4034b1-403502 795->798 797->798 799 403504 798->799 800 403506-403539 call 40b696 call 411cd1 798->800 799->800 805 40354a-40354e 800->805 806 40353b-403545 call 40272e 800->806 808 403550-403558 call 401a7e 805->808 809 40355a-403569 call 41aa21 805->809 806->805 814 403572-403576 808->814 809->814 815 40356b 809->815 814->699 816 40357c-403588 call 40639f 814->816 815->814 816->699
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memcmp$H_prolog
                                                            • String ID: @$CMT
                                                            • API String ID: 212800410-3935043585
                                                            • Opcode ID: 37295884825835a7901171c985930d0b7c01ea67690c6e0965a3387f9fb6a373
                                                            • Instruction ID: 4535b6ba2d5654eb70152741eafeedd3820f65e0183003bc7b62017ff8f1088e
                                                            • Opcode Fuzzy Hash: 37295884825835a7901171c985930d0b7c01ea67690c6e0965a3387f9fb6a373
                                                            • Instruction Fuzzy Hash: 252215715006849FDB24DF24C891BDA3BE5AF14308F08057FED4AEB2C6DB799588CB69

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 819 409476-409499 call 41aaf0 822 409505-409510 FindNextFileW 819->822 823 40949b-4094ac FindFirstFileW 819->823 826 409512-409522 GetLastError 822->826 827 409528-40952c 822->827 824 409532-4095f8 call 410b9c call 40a745 call 41abd0 call 411333 * 3 823->824 825 4094b2-4094c4 call 40a3dc 823->825 828 4095fd-40960b 824->828 834 4094c6-4094dc FindFirstFileW 825->834 835 4094de-4094e7 GetLastError 825->835 826->827 827->824 827->828 834->824 834->835 837 4094f8 835->837 838 4094e9-4094ec 835->838 841 4094fa-409500 837->841 838->837 840 4094ee-4094f1 838->840 840->837 843 4094f3-4094f6 840->843 841->828 843->841
                                                            APIs
                                                            • FindFirstFileW.KERNELBASE(?,?,00000800,?,?,?,004096E5,000000FF,?,?,?,?,00408411,?,?,00000000), ref: 004094A4
                                                            • FindFirstFileW.KERNEL32(?,?,?,?,00000800,?,004096E5,000000FF,?,?,?,?,00408411,?,?,00000000), ref: 004094D4
                                                            • GetLastError.KERNEL32(?,?,00000800,?,004096E5,000000FF,?,?,?,?,00408411,?,?,00000000,?,00000800), ref: 004094DE
                                                            • FindNextFileW.KERNEL32(000000FF,?,00000800,?,?,?,004096E5,000000FF,?,?,?,?,00408411,?,?,00000000), ref: 00409508
                                                            • GetLastError.KERNEL32(?,004096E5,000000FF,?,?,?,?,00408411,?,?,00000000,?,00000800), ref: 00409516
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: FileFind$ErrorFirstLast$Next
                                                            • String ID:
                                                            • API String ID: 869497890-0
                                                            • Opcode ID: 2a733cbadd2ca7cd29a11b90f53c863ddd5810a24544a1ec061ee6039bd7df5a
                                                            • Instruction ID: 852f22f8762d0aaf1b59ecd7198268998001e7cc0733578d9edc4610c3c70bd0
                                                            • Opcode Fuzzy Hash: 2a733cbadd2ca7cd29a11b90f53c863ddd5810a24544a1ec061ee6039bd7df5a
                                                            • Instruction Fuzzy Hash: 2E414071500648ABCB21DF29CC84ADA77F8AF48350F10466AF9AEE2291D774AEC1DB14
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID: "%s"%s$-el -s2 "-d%s" "-p%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp$z8D
                                                            • API String ID: 3519838083-129321368
                                                            • Opcode ID: a4dd4ca0380014ca9fbcc784b7d3cd6a11c13eb0733f377532361ed44e646897
                                                            • Instruction ID: cc4c1e380d3e9e53cf766c3de9df5bd6880f95cbde9f973ccf433d51db550174
                                                            • Opcode Fuzzy Hash: a4dd4ca0380014ca9fbcc784b7d3cd6a11c13eb0733f377532361ed44e646897
                                                            • Instruction Fuzzy Hash: C732C371540248BFEB31BF619C85E9B3A68EB06304F44407BF901B61E2DB794999CB6E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 247 40e857-40e86f call 41a4dc call 41aaf0 252 40f434-40f43f 247->252 253 40e875-40e89b call 40d781 247->253 253->252 256 40e8a1-40e8a4 253->256 257 40e8a9-40e8c3 256->257 258 40e8ca-40e8dd call 40dcb8 257->258 261 40e8df 258->261 262 40e8e3-40e8fb call 411e60 261->262 265 40e90b-40e90f 262->265 266 40e8fd-40e904 262->266 267 40f405-40f42b call 40d781 265->267 268 40e915-40e918 265->268 266->262 269 40e906 266->269 267->257 284 40f431-40f433 267->284 270 40eb06-40eb0a 268->270 271 40ebc7-40ebcb 268->271 272 40eba8-40ebac 268->272 273 40e91f-40e923 268->273 269->267 270->267 277 40eb10-40eb1f 270->277 271->267 275 40ebd1-40ebd9 271->275 272->267 279 40ebb2-40ebc2 SetWindowTextW 272->279 273->267 276 40e929-40e993 call 419c9b call 40a146 call 409433 call 40945c call 4067e1 call 40960e 273->276 275->267 280 40ebdf-40ebf9 275->280 348 40eaf2-40eb01 call 409449 276->348 349 40e999 276->349 282 40eb21-40eb2d call 41a7c9 277->282 283 40eb2e-40eb32 277->283 279->267 285 40ec04-40ec0d call 41a7af 280->285 286 40ebfb-40ec01 280->286 282->283 289 40eb34-40eb3a 283->289 290 40eb3c-40eb44 call 40d92d 283->290 284->252 285->267 301 40ec13-40ec1a 285->301 286->285 294 40eb46-40eb4a 289->294 290->294 299 40eb50-40eb5c call 41a7af 294->299 300 40eb4c-40eb4e 294->300 303 40eb5e-40eb82 call 41a7af call 41a594 299->303 300->303 307 40ec36-40ec3a 301->307 308 40ec1c-40ec21 301->308 329 40eb84-40eb86 303->329 330 40eb89-40eb96 call 41a7c9 303->330 313 40ec40-40ec43 307->313 314 40ed1b 307->314 308->307 311 40ec23-40ec2a 308->311 311->267 317 40ec30-40ec31 311->317 319 40ec50-40ec6a RegOpenKeyExW 313->319 320 40ec45-40ec4a 313->320 315 40ed1c-40ed23 call 41a7f7 314->315 328 40ed28-40ed29 315->328 317->315 324 40ecb5-40ecbd 319->324 325 40ec6c-40eca6 RegQueryValueExW RegCloseKey 319->325 320->314 320->319 326 40ecea-40ed08 call 41a7af * 2 324->326 327 40ecbf-40ecd5 call 41a7af 324->327 332 40eca8 325->332 333 40ecab-40ecad 325->333 335 40ed2a-40ed3c call 41ca4f 326->335 364 40ed0a-40ed19 call 41a7c9 326->364 327->326 344 40ecd7-40ece9 call 41a7c9 327->344 328->335 329->330 330->267 346 40eb9c-40eba3 call 41a506 330->346 332->333 333->324 353 40ed4a-40ed98 call 41a7f7 call 40db16 GetDlgItem SetWindowTextW SendMessageW call 41aa21 335->353 354 40ed3e-40ed43 335->354 344->326 346->267 348->267 351 40e99e-40e9b4 SetFileAttributesW 349->351 358 40e9ba-40e9ee call 40aa7d call 40a116 call 41a7af 351->358 359 40ea5c-40ea68 GetFileAttributesW 351->359 384 40ed9d-40eda1 353->384 354->353 361 40ed45-40ed47 354->361 389 40e9f0-40ea00 call 41a7af 358->389 390 40ea02-40ea10 call 40a0a4 358->390 366 40ead6-40eaec call 40960e 359->366 367 40ea6a-40ea79 DeleteFileW 359->367 361->353 364->328 366->348 366->351 367->366 371 40ea7b-40ea7f 367->371 376 40ea87-40eaab call 40bc16 GetFileAttributesW 371->376 387 40ea81-40ea84 376->387 388 40eaad-40eac3 MoveFileW 376->388 384->267 385 40eda7-40edbc SendMessageW 384->385 385->267 387->376 388->366 391 40eac5-40ead0 MoveFileExW 388->391 389->390 396 40ea16-40ea56 call 41a7af call 41a820 SHFileOperationW 389->396 390->348 390->396 391->366 396->359
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0040E85C
                                                              • Part of subcall function 0040D781: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0040D82F
                                                            • SetFileAttributesW.KERNEL32(?,00000000,?,00000000,?,?,00000800,?,00000000,753D5540,?,0040F541,?,00000003), ref: 0040E9A7
                                                            • _wcslen.LIBCMT ref: 0040E9E2
                                                            • _wcslen.LIBCMT ref: 0040E9F7
                                                            • _wcslen.LIBCMT ref: 0040EA1D
                                                            • _memset.LIBCMT ref: 0040EA33
                                                            • SHFileOperationW.SHELL32 ref: 0040EA56
                                                            • GetFileAttributesW.KERNEL32(?), ref: 0040EA63
                                                            • DeleteFileW.KERNEL32(?), ref: 0040EA71
                                                            • _wcscat.LIBCMT ref: 0040EB27
                                                            • _wcslen.LIBCMT ref: 0040EB5F
                                                            • _realloc.LIBCMT ref: 0040EB71
                                                            • _wcscat.LIBCMT ref: 0040EB8B
                                                            • SetWindowTextW.USER32(?,?), ref: 0040EBBC
                                                            • _wcslen.LIBCMT ref: 0040EC05
                                                            • _wcscpy.LIBCMT ref: 0040ED23
                                                            • _wcsrchr.LIBCMT ref: 0040ED33
                                                            • _wcscpy.LIBCMT ref: 0040ED52
                                                            • GetDlgItem.USER32(?,00000066), ref: 0040ED6B
                                                            • SetWindowTextW.USER32(00000000,?), ref: 0040ED7B
                                                            • SendMessageW.USER32(00000000,00000143,00000000,%s.%d.tmp), ref: 0040ED8A
                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0040EDB6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$File$AttributesMessageSendTextWindow_wcscat_wcscpy$DeleteEnvironmentExpandH_prologItemOperationStrings_memset_realloc_wcsrchr
                                                            • String ID: "$%s.%d.tmp$<br>$C:\Windows$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$\
                                                            • API String ID: 3339014310-2533930246
                                                            • Opcode ID: c81f8d7f1960366ff0ac0b138369ee3006538eb7a10c16c36d47d9a37235cbbb
                                                            • Instruction ID: 0f1639a2c7fd1c8d50817f8e0d6f0902ef34777a202bf9cba062cd401a3abf5d
                                                            • Opcode Fuzzy Hash: c81f8d7f1960366ff0ac0b138369ee3006538eb7a10c16c36d47d9a37235cbbb
                                                            • Instruction Fuzzy Hash: F2F14EB1900219AADB20DBA1DC45BEE7378FF04314F4408BBFA15B21D1EB789A958F59

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 465 40bc32-40bc5d call 41a4dc call 41aaf0 call 41ca29 472 40bc88-40bcba call 41a7f7 call 408786 call 4087c3 465->472 473 40bc5f-40bc7f GetModuleFileNameW call 41ca4f 465->473 484 40bcd0-40bcda 472->484 485 40bcbc-40bccb call 408c7d 472->485 478 40bc85 473->478 479 40bf0e-40bf1a 473->479 478->472 487 40bcdb-40bcdf 484->487 492 40bf0d 485->492 489 40bce5-40bd05 call 408bae call 408e7b 487->489 490 40bdfc-40be23 call 408fed call 41cf3e 487->490 499 40bd0a-40bd14 489->499 500 40bf03-40bf0c call 408c7d 490->500 501 40be29-40be3b call 408e7b 490->501 492->479 502 40bdc8-40bdec call 408fed 499->502 503 40bd1a-40bd24 499->503 500->492 517 40be44-40be53 call 41cf3e 501->517 518 40be3d-40be42 501->518 502->487 521 40bdf2-40bdf6 502->521 506 40bd26-40bd2e 503->506 507 40bd4b-40bd4f 503->507 506->507 511 40bd30-40bd49 call 41d008 506->511 512 40bd51-40bd5d 507->512 513 40bd7d-40bd80 507->513 511->507 531 40bdc0-40bdc5 511->531 512->513 520 40bd5f-40bd67 512->520 515 40bd82-40bd8a 513->515 516 40bdab-40bdb4 513->516 515->516 522 40bd8c-40bda5 call 41d008 515->522 516->503 523 40bdba 516->523 528 40befd 517->528 538 40be59-40be77 call 411b3c call 41a506 517->538 524 40be79-40be83 518->524 520->513 527 40bd69-40bd7b call 41c81c 520->527 521->490 521->528 522->516 522->528 523->502 533 40be85 524->533 534 40be87-40be94 524->534 527->513 542 40bdbc 527->542 528->500 531->502 533->534 535 40bef2-40befa 534->535 536 40be96-40bea0 534->536 535->528 536->535 540 40bea2-40bea6 536->540 538->524 543 40bea8-40beaf 540->543 544 40bed9-40bedd 540->544 542->531 546 40beb1-40beb4 543->546 547 40bed4 543->547 549 40bee5 544->549 550 40bedf-40bee3 544->550 552 40bed0-40bed2 546->552 553 40beb6-40beb9 546->553 554 40bed6-40bed7 547->554 551 40bee7 549->551 550->549 556 40bee8-40bef0 550->556 551->556 552->554 557 40bebb-40bebe 553->557 558 40becc-40bece 553->558 554->551 556->535 556->536 559 40bec0-40bec2 557->559 560 40bec8-40beca 557->560 558->554 559->556 561 40bec4-40bec6 559->561 560->554 561->554
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0040BC37
                                                            • _wcschr.LIBCMT ref: 0040BC4E
                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000800,004335BC,0040C3B4,0041005C,00439820,0041005C,00439820), ref: 0040BC67
                                                            • _wcsrchr.LIBCMT ref: 0040BC76
                                                            • _wcscpy.LIBCMT ref: 0040BC8C
                                                            • _malloc.LIBCMT ref: 0040BE13
                                                              • Part of subcall function 00408BAE: SetFilePointer.KERNELBASE(?,00000000,?,00000001), ref: 00408BE1
                                                              • Part of subcall function 00408BAE: GetLastError.KERNEL32(?,?), ref: 00408BEE
                                                            • _strncmp.LIBCMT ref: 0040BD3F
                                                            • _strncmp.LIBCMT ref: 0040BD9B
                                                            • _malloc.LIBCMT ref: 0040BE49
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: File_malloc_strncmp$ErrorH_prologLastModuleNamePointer_wcschr_wcscpy_wcsrchr
                                                            • String ID: *messages***$*messages***$a
                                                            • API String ID: 644328012-1639468518
                                                            • Opcode ID: cfa50f55f05dd38727f7e2c767a8efa24f78901bf0e7e1d2db41408b4bb4ba45
                                                            • Instruction ID: aa973f8903d1be904dc07ab5abbbb304e5ce1521a2ae556c165a5ca6c4136d8e
                                                            • Opcode Fuzzy Hash: cfa50f55f05dd38727f7e2c767a8efa24f78901bf0e7e1d2db41408b4bb4ba45
                                                            • Instruction Fuzzy Hash: 5981F2B1A002099ADB34DF64CC85BEA77A4EF10354F10417FE791B72D1DBB88A85CA9D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 562 40c15c-40c1b9 call 40c075 GetWindowRect GetClientRect 565 40c258-40c261 562->565 566 40c1bf-40c1c3 562->566 567 40c2a1-40c2c0 GetSystemMetrics GetWindow 565->567 568 40c263-40c29a GetWindowTextW call 40bf1d SetWindowTextW 565->568 569 40c1c9-40c208 566->569 570 40c29c 566->570 572 40c399-40c39b 567->572 568->567 573 40c20a 569->573 574 40c20c-40c20e 569->574 570->567 578 40c3a1-40c3a5 572->578 579 40c2c5-40c2cc 572->579 573->574 576 40c210 574->576 577 40c212-40c229 GetWindowLongW 574->577 576->577 581 40c232-40c255 SetWindowPos GetWindowRect 577->581 582 40c22b 577->582 579->578 580 40c2d2-40c2eb GetWindowTextW 579->580 583 40c313-40c317 580->583 584 40c2ed-40c30d call 40bf1d SetWindowTextW 580->584 581->565 582->581 586 40c383-40c394 GetWindow 583->586 587 40c319-40c37d GetWindowRect SetWindowPos 583->587 584->583 586->578 589 40c396 586->589 587->586 589->572
                                                            APIs
                                                              • Part of subcall function 0040C075: _wcschr.LIBCMT ref: 0040C0A5
                                                            • GetWindowRect.USER32(?,?), ref: 0040C185
                                                            • GetClientRect.USER32(?,?), ref: 0040C192
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0040C21E
                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0040C242
                                                            • GetWindowRect.USER32(?,?), ref: 0040C24F
                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 0040C26E
                                                            • SetWindowTextW.USER32(?,?), ref: 0040C294
                                                            • GetSystemMetrics.USER32(00000008), ref: 0040C2A3
                                                            • GetWindow.USER32(?,00000005), ref: 0040C2B0
                                                            • GetWindowTextW.USER32(00000000,?,00000400), ref: 0040C2DD
                                                            • SetWindowTextW.USER32(00000000,00000000), ref: 0040C30D
                                                            • GetWindowRect.USER32(00000000,?), ref: 0040C320
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000110,00000000,00000110,00000204), ref: 0040C37D
                                                            • GetWindow.USER32(00000000,00000002), ref: 0040C388
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                                                            • String ID:
                                                            • API String ID: 4134264131-0
                                                            • Opcode ID: 9886efa1d7aa19233dee01def18c78a05a732e10b374928cec257c7fc49daa0d
                                                            • Instruction ID: 46c95fab82868b9c938a6533d3e49af797eb3fa96210388a24d02bb49560b234
                                                            • Opcode Fuzzy Hash: 9886efa1d7aa19233dee01def18c78a05a732e10b374928cec257c7fc49daa0d
                                                            • Instruction Fuzzy Hash: 9A711671A00219EFDF10DFE8CC89AEEBBB9FB08314F048169FD15B61A0D774AA558B54

                                                            Control-flow Graph

                                                            APIs
                                                            • GetDlgItem.USER32(00000068,00000000), ref: 0040D2A9
                                                            • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040D3E6,00000001,?,?,0040E2C6,0042A848,0044CF30,0044CF30,00001000), ref: 0040D2D6
                                                            • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0040D2E2
                                                            • SendMessageW.USER32(00000000,000000C2,00000000,0042A73C), ref: 0040D2F1
                                                            • SendMessageW.USER32(0040639B,000000B1,05F5E100,05F5E100), ref: 0040D305
                                                            • SendMessageW.USER32(0040639B,0000043A,00000000,?), ref: 0040D31C
                                                            • SendMessageW.USER32(0040639B,00000444,00000001,0000005C), ref: 0040D357
                                                            • SendMessageW.USER32(0040639B,000000C2,00000000,00000456), ref: 0040D366
                                                            • SendMessageW.USER32(0040639B,000000B1,05F5E100,05F5E100), ref: 0040D36E
                                                            • SendMessageW.USER32(0040639B,00000444,00000001,0000005C), ref: 0040D392
                                                            • SendMessageW.USER32(0040639B,000000C2,00000000,0042A810), ref: 0040D3A3
                                                              • Part of subcall function 0041918B: DestroyWindow.USER32(?,753D5540,0040D2D3,?,?,?,?,?,0040D3E6,00000001,?,?,0040E2C6,0042A848,0044CF30,0044CF30), ref: 00419196
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$DestroyItemShow
                                                            • String ID: \
                                                            • API String ID: 2996232536-2967466578
                                                            • Opcode ID: 099f520084dbf5fca48704fc3201186082e925487be8ae0bd6b4d09b2fa327de
                                                            • Instruction ID: 06257c9e161764c7d53c24ae9c51dbab41789d270eb5449b748dea2bf3ac4db1
                                                            • Opcode Fuzzy Hash: 099f520084dbf5fca48704fc3201186082e925487be8ae0bd6b4d09b2fa327de
                                                            • Instruction Fuzzy Hash: C431B170E4025CBBEB219BA0CC4AFAEBFB9EB41714F10412AF500BA1E0D7B51D55DB59

                                                            Control-flow Graph

                                                            APIs
                                                            • LoadLibraryW.KERNELBASE(riched32.dll,00000000,00439820,?,?,?,00410051), ref: 0041A07B
                                                            • LoadLibraryW.KERNEL32(riched20.dll,?,00410051), ref: 0041A084
                                                            • OleInitialize.OLE32(00000000), ref: 0041A08B
                                                            • InitCommonControlsEx.COMCTL32(?), ref: 0041A0A3
                                                            • SHGetMalloc.SHELL32(0044F800), ref: 0041A0AE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad$CommonControlsInitInitializeMalloc
                                                            • String ID: riched20.dll$riched32.dll
                                                            • API String ID: 448729520-3294723617
                                                            • Opcode ID: 8624e4f240296107261ce0a47b5d27c571c626025523bcd3f0aeccd25934cca6
                                                            • Instruction ID: d62a9b991739124620cbbd73e07a01740528edc951963754c9102d88a2026b42
                                                            • Opcode Fuzzy Hash: 8624e4f240296107261ce0a47b5d27c571c626025523bcd3f0aeccd25934cca6
                                                            • Instruction Fuzzy Hash: EFF08271B00318AFD7209FA5DC0EB9ABBE8EF40766F50442DE54593250DBB8A4458BA9

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 600 40da8c-40daa2 call 41aaf0 603 40db11-40db13 600->603 604 40daa4-40daab 600->604 604->603 605 40daad-40dae2 call 40da4f RegCreateKeyExW 604->605 605->603 608 40dae4-40db0b call 41a7af RegSetValueExW RegCloseKey 605->608 608->603
                                                            APIs
                                                              • Part of subcall function 0040DA4F: _wcscpy.LIBCMT ref: 0040DA54
                                                            • RegCreateKeyExW.KERNELBASE(80000001,Software\WinRAR SFX,00000000,00000000,00000000,00020006,00000000,?,?,C:\Windows), ref: 0040DAD9
                                                            • _wcslen.LIBCMT ref: 0040DAE7
                                                            • RegSetValueExW.KERNELBASE(?,?,00000000,00000001,?,?), ref: 0040DB02
                                                            • RegCloseKey.KERNELBASE(?), ref: 0040DB0B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateValue_wcscpy_wcslen
                                                            • String ID: C:\Windows$Software\WinRAR SFX
                                                            • API String ID: 3170333323-1036045337
                                                            • Opcode ID: 253b5885f96daf7b7a8b4f1510ea2afe6e1404dcbc281fb2c19877bebd1cbb3e
                                                            • Instruction ID: c04f9cf324d6fb33717342d95d48926d42d97767c878bcc2ae640bd506731f16
                                                            • Opcode Fuzzy Hash: 253b5885f96daf7b7a8b4f1510ea2afe6e1404dcbc281fb2c19877bebd1cbb3e
                                                            • Instruction Fuzzy Hash: 7F018476A0020CBFEB21AF90DC86EDA777CEB08388F504076B60562061DA745ED99669

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 849 41a506-41a517 call 41fa9c 852 41a519-41a520 849->852 853 41a58e-41a593 call 41fae1 849->853 854 41a522-41a53a call 41efa3 call 41efd6 852->854 855 41a565 852->855 866 41a545-41a555 call 41a55c 854->866 867 41a53c-41a544 call 41f006 854->867 858 41a566-41a576 RtlFreeHeap 855->858 858->853 860 41a578-41a58d call 41edae GetLastError call 41ed6c 858->860 860->853 866->853 874 41a557-41a55a 866->874 867->866 874->858
                                                            APIs
                                                            • __lock.LIBCMT ref: 0041A524
                                                              • Part of subcall function 0041EFA3: __mtinitlocknum.LIBCMT ref: 0041EFB9
                                                              • Part of subcall function 0041EFA3: __amsg_exit.LIBCMT ref: 0041EFC5
                                                              • Part of subcall function 0041EFA3: EnterCriticalSection.KERNEL32(0041A9AB,0041A9AB,?,00425448,00000004,0042DB18,0000000C,0042133E,00000000,0041A9BA,00000000,00000000,00000000,?,0041E966,00000001), ref: 0041EFCD
                                                            • ___sbh_find_block.LIBCMT ref: 0041A52F
                                                            • ___sbh_free_block.LIBCMT ref: 0041A53E
                                                            • RtlFreeHeap.NTDLL(00000000,00000000,0042D658,0000000C,0041EF84,00000000,0042D930,0000000C,0041EFBE,00000000,0041A9AB,?,00425448,00000004,0042DB18,0000000C), ref: 0041A56E
                                                            • GetLastError.KERNEL32(?,00425448,00000004,0042DB18,0000000C,0042133E,00000000,0041A9BA,00000000,00000000,00000000,?,0041E966,00000001,00000214), ref: 0041A57F
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                            • String ID:
                                                            • API String ID: 2714421763-0
                                                            • Opcode ID: 1eba3eb2bfd23f5b1e043426ba5b029f38dd9947a11c8dba489f2cac3b6c6ae4
                                                            • Instruction ID: 0c17081243acc93c5e04f74f5850e91c5e9c62578e05a8caa74c22d26ff5c9bd
                                                            • Opcode Fuzzy Hash: 1eba3eb2bfd23f5b1e043426ba5b029f38dd9947a11c8dba489f2cac3b6c6ae4
                                                            • Instruction Fuzzy Hash: 1D01847194A215BBDB306BB29C067DE3B65AF00798F10012BFC0496291DB3C86D19A5E

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 0041102B: ResetEvent.KERNEL32(?,00000200,?,?,00405016), ref: 00411051
                                                              • Part of subcall function 0041102B: ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 00411061
                                                            • ReleaseSemaphore.KERNEL32(?,00000020,00000000,?,?,0044F590,00411241,?,00401024,?,?,0040128E), ref: 00411135
                                                            • CloseHandle.KERNELBASE(00000003,00000003,?,?,0044F590,00411241,?,00401024,?,?,0040128E), ref: 00411156
                                                            • DeleteCriticalSection.KERNEL32(?,?,0044F590,00411241,?,00401024,?,?,0040128E), ref: 0041116C
                                                            • CloseHandle.KERNELBASE(?,?,0044F590,00411241,?,00401024,?,?,0040128E), ref: 00411178
                                                            • CloseHandle.KERNEL32(?,?,0044F590,00411241,?,00401024,?,?,0040128E), ref: 00411180
                                                              • Part of subcall function 00410EA0: WaitForSingleObject.KERNEL32(?,000000FF,00410FD9,?,?,00411197,?,?,?,?,?,004111E6), ref: 00410EA6
                                                              • Part of subcall function 00410EA0: GetLastError.KERNEL32(?,?,?,?,?,004111E6), ref: 00410EB2
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                            • String ID:
                                                            • API String ID: 1868215902-0
                                                            • Opcode ID: 29ee5acdc12332976cb057a69276285ab821669b88e8e9e7981cd7b54762f760
                                                            • Instruction ID: 628da898c48b8095e2505876ae832dd6733ab043d372e65b09dbeb3e2adc3a3f
                                                            • Opcode Fuzzy Hash: 29ee5acdc12332976cb057a69276285ab821669b88e8e9e7981cd7b54762f760
                                                            • Instruction Fuzzy Hash: F9F06275101704AFD7206B70DC45BD7BBA5EB0A354F00042AF7AA41120CB7768A19B29

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 884 40db16-40db2a call 41aaf0 887 40db30-40db5a call 40da4f RegOpenKeyExW 884->887 888 40dbbd-40dbbe 884->888 887->888 891 40db5c-40db86 RegQueryValueExW 887->891 892 40dbb4-40dbb7 RegCloseKey 891->892 893 40db88-40db93 891->893 892->888 894 40db95 893->894 895 40db98-40dbaf call 410b9c 893->895 894->895 895->892
                                                            APIs
                                                              • Part of subcall function 0040DA4F: _wcscpy.LIBCMT ref: 0040DA54
                                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\WinRAR SFX,00000000,00000001,?,?), ref: 0040DB51
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0040DB7E
                                                            • RegCloseKey.ADVAPI32(?), ref: 0040DBB7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CloseOpenQueryValue_wcscpy
                                                            • String ID: Software\WinRAR SFX
                                                            • API String ID: 2005349754-754673328
                                                            • Opcode ID: 5a2b69c89800e9bdd399ce0e9e4a259883a1022fe18fb91a4a4725133ef4c013
                                                            • Instruction ID: 4c76dbbd45d9bc8f01a1638326186229006e98cd85c276784524804615dea21e
                                                            • Opcode Fuzzy Hash: 5a2b69c89800e9bdd399ce0e9e4a259883a1022fe18fb91a4a4725133ef4c013
                                                            • Instruction Fuzzy Hash: 29110635A0020CEBEF219F90DD45FDE7BB8EF04345F5040B6B905A2191D7B8AA94DB69

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 897 4050e8-4050fd SHGetMalloc 898 405103-40513a SHBrowseForFolderW 897->898 899 4050ff-405101 897->899 901 405140-40515e SHGetPathFromIDListW 898->901 902 40513c-40513e 898->902 900 405160-405161 899->900 903 40515f 901->903 902->903 903->900
                                                            APIs
                                                            • SHGetMalloc.SHELL32(?), ref: 004050F5
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00405130
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: BrowseFolderMalloc
                                                            • String ID: A
                                                            • API String ID: 3812826013-3554254475
                                                            • Opcode ID: 38b49180d38aa256d497848d66ef1996a2da1d611468f43139da5b44fce9136b
                                                            • Instruction ID: 7c691baa3b27f7502734ebd35b11d26621297010b335108cc4fc530f71bfb90e
                                                            • Opcode Fuzzy Hash: 38b49180d38aa256d497848d66ef1996a2da1d611468f43139da5b44fce9136b
                                                            • Instruction Fuzzy Hash: F0010572900619EBDB11CFA4D909BEF7BF8EF49311F204466E805EB240D779DA058FA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 905 419cb2-419cd1 GetClassNameW 906 419cd3-419ce8 call 411e60 905->906 907 419cf9-419cfb 905->907 912 419cf8 906->912 913 419cea-419cf6 FindWindowExW 906->913 908 419d06-419d08 907->908 909 419cfd-419d00 SHAutoComplete 907->909 909->908 912->907 913->912
                                                            APIs
                                                            • GetClassNameW.USER32(?,?,00000050), ref: 00419CC9
                                                            • SHAutoComplete.SHLWAPI(?,00000010), ref: 00419D00
                                                              • Part of subcall function 00411E60: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,00000000,000000FF,00409CA8,?,00000000,?,00409DC2,00000000,-00000002,?,00000000,?), ref: 00411E76
                                                            • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00419CF0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                            • String ID: EDIT
                                                            • API String ID: 4243998846-3080729518
                                                            • Opcode ID: b027ed5b97d113a91e8e700dc85ec23dd11054ff1df16afbaa6f3d453c1c9159
                                                            • Instruction ID: c03662b206b47bf0f9187f3c1687b62eae72e09aaad69f108c393d7fbd584eff
                                                            • Opcode Fuzzy Hash: b027ed5b97d113a91e8e700dc85ec23dd11054ff1df16afbaa6f3d453c1c9159
                                                            • Instruction Fuzzy Hash: 3CF0E232300219BBDB305A15AD05FEB36BC9F86B40F840066FE01E2280EB68D84285BA

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 914 4087c3-4087e6 call 41aaf0 917 4087f0 914->917 918 4087e8-4087ea 914->918 920 4087f2-40880e 917->920 918->917 919 4087ec-4087ee 918->919 919->920 921 408810 920->921 922 408816-408824 920->922 921->922 923 408826-408829 922->923 924 40882d-40885b CreateFileW 922->924 923->924 925 4088c0-4088d4 924->925 926 40885d-40887f GetLastError call 40a3dc 924->926 927 4088d6-4088e9 call 410b9c 925->927 928 4088ee-4088fa 925->928 932 408881-4088a4 CreateFileW GetLastError 926->932 933 4088af-4088b4 926->933 927->928 934 4088a6 932->934 935 4088aa-4088ad 932->935 933->925 936 4088b6 933->936 934->935 935->925 935->933 936->925
                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,-7FFFF7FE,?,00000000,00000003,-00000001,00000000,00000802,00000000,?,00000000,00406E59,00000000,00000005,?,00000011), ref: 00408854
                                                            • GetLastError.KERNEL32(?,00000000,00406E59,00000000,00000005,?,00000011,00000000,?,00000000,?,0000003A,00000802,?,00000000,00000802), ref: 0040885D
                                                            • CreateFileW.KERNEL32(?,-7FFFF7FE,?,00000000,00000003,00000000,00000000,?,?,00000800,?,00000000,00406E59,00000000,00000005,?), ref: 00408895
                                                            • GetLastError.KERNEL32(?,00000000,00406E59,00000000,00000005,?,00000011,00000000,?,00000000,?,0000003A,00000802,?,00000000,00000802), ref: 00408899
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CreateErrorFileLast
                                                            • String ID:
                                                            • API String ID: 1214770103-0
                                                            • Opcode ID: 4d3b36c18a63bf9a6cb3bb75dabf04ddc5da56a9a0870096324c8bcc010d085f
                                                            • Instruction ID: e5fec55928a071c2e3d1b6f10086eb5e0cd4d8e33465c7e2028d9d916ffc9c2f
                                                            • Opcode Fuzzy Hash: 4d3b36c18a63bf9a6cb3bb75dabf04ddc5da56a9a0870096324c8bcc010d085f
                                                            • Instruction Fuzzy Hash: 083169725047449BE7309B20CD05BEB77D4AB80318F104A2EF9D0A33C2DBBE9548D75A
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 00401827
                                                              • Part of subcall function 00405F3C: __EH_prolog.LIBCMT ref: 00405F41
                                                              • Part of subcall function 00405F3C: _memset.LIBCMT ref: 00405FA4
                                                              • Part of subcall function 00405F3C: _memset.LIBCMT ref: 00405FB0
                                                              • Part of subcall function 00405F3C: _memset.LIBCMT ref: 00405FCE
                                                              • Part of subcall function 0040B8E3: __EH_prolog.LIBCMT ref: 0040B8E8
                                                            • _memset.LIBCMT ref: 0040196A
                                                            • _memset.LIBCMT ref: 00401979
                                                            • _memset.LIBCMT ref: 00401988
                                                              • Part of subcall function 0041A89A: _malloc.LIBCMT ref: 0041A8B4
                                                              • Part of subcall function 0040A026: __EH_prolog.LIBCMT ref: 0040A02B
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset$H_prolog$_malloc
                                                            • String ID:
                                                            • API String ID: 4233843809-0
                                                            • Opcode ID: 89f10ec8c43f5c59ed1e48a3837198038f2aefdd0a2d009fb04471144bad9c18
                                                            • Instruction ID: 211b101a5e2dbba32f2c8dae62910ed897794103f7d8a7f2ed724c9505602145
                                                            • Opcode Fuzzy Hash: 89f10ec8c43f5c59ed1e48a3837198038f2aefdd0a2d009fb04471144bad9c18
                                                            • Instruction Fuzzy Hash: 865127B1445F809EC321DF7988916D7FFE0AF29314F84496E91FE93282D7352658CB29
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset$H_prolog_malloc
                                                            • String ID:
                                                            • API String ID: 1600808285-0
                                                            • Opcode ID: f9e7b2a6a83c73fc1ba99619ebe61da21776ee40c69ad0e57b9b97bafc6a76b5
                                                            • Instruction ID: 702ce421a693160a9893d7f58a622c69960126b9ff2eeb296b605b135dd4a1ff
                                                            • Opcode Fuzzy Hash: f9e7b2a6a83c73fc1ba99619ebe61da21776ee40c69ad0e57b9b97bafc6a76b5
                                                            • Instruction Fuzzy Hash: F831D4B1E01215ABDB14AF65D9057EB76A8FF14319F10013FE105E7281E7789E9087ED
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F6,004335AC,?,00000000,?,?,00408EB0,?,00000000,?,?,00000000), ref: 00408CB1
                                                            • ReadFile.KERNELBASE(?,?,?,00000000,00000000,004335AC,?,00000000,?,?,00408EB0,?,00000000,?,?,00000000), ref: 00408CC9
                                                            • GetLastError.KERNEL32(?,00408EB0,?,00000000,?,?,00000000), ref: 00408D01
                                                            • GetLastError.KERNEL32(?,00408EB0,?,00000000,?,?,00000000), ref: 00408D1C
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$FileHandleRead
                                                            • String ID:
                                                            • API String ID: 2244327787-0
                                                            • Opcode ID: c1fed62a9ea2a8515d50b02984c21f09fd940ae1629289a4c1ded04f954c3d6f
                                                            • Instruction ID: b149f771e66fe820b49a3db0cdc04a66bbf6f60059da98a6e892905e95da3d99
                                                            • Opcode Fuzzy Hash: c1fed62a9ea2a8515d50b02984c21f09fd940ae1629289a4c1ded04f954c3d6f
                                                            • Instruction Fuzzy Hash: B411A734504608EFEB205B50DA4096A37A8FF71374B10863FE996A52D1DE3DCD41DF2A
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004076AF
                                                              • Part of subcall function 00418B3D: _wcscpy.LIBCMT ref: 00418C26
                                                            • _memcmp.LIBCMT ref: 00407ABB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog_memcmp_wcscpy
                                                            • String ID: E
                                                            • API String ID: 1926841707-3568589458
                                                            • Opcode ID: 196e278f7dddb126d2dbccce5fe2abb71f5a872f6c9e6e354283e500f103bc2c
                                                            • Instruction ID: c8680630b07ceb330da05956c27536b96a03d31217007f6de18683c0289c3294
                                                            • Opcode Fuzzy Hash: 196e278f7dddb126d2dbccce5fe2abb71f5a872f6c9e6e354283e500f103bc2c
                                                            • Instruction Fuzzy Hash: 4872B870D086849EEF25DB64C844BEA7BA55F05304F0840FFE94A6B2D2C77D7984CB6A
                                                            APIs
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040D127
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040D138
                                                            • TranslateMessage.USER32(?), ref: 0040D142
                                                            • DispatchMessageW.USER32(?), ref: 0040D14C
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Message$DispatchPeekTranslate
                                                            • String ID:
                                                            • API String ID: 4217535847-0
                                                            • Opcode ID: db1d2709ee26d26a19af258b04a512226032370801fdef34d6f208b0e00134af
                                                            • Instruction ID: 62915b0a08277243b8fe4fd8ce30adb6e130eab43b2b780e39f86cd7d7c3188f
                                                            • Opcode Fuzzy Hash: db1d2709ee26d26a19af258b04a512226032370801fdef34d6f208b0e00134af
                                                            • Instruction Fuzzy Hash: 9FE0ED72E0112AA7CB20ABE19C0CDDB7F6CEE062517404021BD05E2015D638D116C7F5
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 00408210
                                                              • Part of subcall function 00401822: __EH_prolog.LIBCMT ref: 00401827
                                                              • Part of subcall function 00401822: _memset.LIBCMT ref: 0040196A
                                                              • Part of subcall function 00401822: _memset.LIBCMT ref: 00401979
                                                              • Part of subcall function 00401822: _memset.LIBCMT ref: 00401988
                                                              • Part of subcall function 00401417: __EH_prolog.LIBCMT ref: 0040141C
                                                            • _wcscpy.LIBCMT ref: 004082AF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog_memset$_wcscpy
                                                            • String ID: rar
                                                            • API String ID: 2876264062-1792618458
                                                            • Opcode ID: d8064b72c640e36a82a0b68421302acdf3e8c056939b4e9f8210efc5c70c758b
                                                            • Instruction ID: 75000dcce843433d4275637ef0618472c828e59e125cdaf0ff5f97d994d1ab7f
                                                            • Opcode Fuzzy Hash: d8064b72c640e36a82a0b68421302acdf3e8c056939b4e9f8210efc5c70c758b
                                                            • Instruction Fuzzy Hash: 3D41A4319002589EDB24DB50C955BEA77B8AB14304F4448FFE489B3182DB796FC8CB29
                                                            APIs
                                                            • CreateThread.KERNELBASE(00000000,00010000,Function_000111DD,?,00000000,?), ref: 00411278
                                                            • SetThreadPriority.KERNEL32(?,00000000,?,?,004112E4,-00000108,00404FE0), ref: 004112BF
                                                              • Part of subcall function 00406423: __vswprintf_c_l.LIBCMT ref: 00406441
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Thread$CreatePriority__vswprintf_c_l
                                                            • String ID: CreateThread failed
                                                            • API String ID: 2655393344-3849766595
                                                            • Opcode ID: 3061c48cbf7df5314d67cb84a6f78a2ab06f9f7c5b99b3b88179035cff10f0ee
                                                            • Instruction ID: 964536ca15170dd961cb9332306e5bd8003a90b1d1e662a5f33448d65f1dc838
                                                            • Opcode Fuzzy Hash: 3061c48cbf7df5314d67cb84a6f78a2ab06f9f7c5b99b3b88179035cff10f0ee
                                                            • Instruction Fuzzy Hash: 4B01A2753453057BD3215F55AC46BB673A9EB44766F20043FFB82E11D0DAB4A8608A2D
                                                            APIs
                                                            • __CxxThrowException@8.LIBCMT ref: 0041276B
                                                            • _malloc.LIBCMT ref: 00412785
                                                              • Part of subcall function 0041CF3E: __FF_MSGBANNER.LIBCMT ref: 0041CF61
                                                              • Part of subcall function 0041CF3E: __NMSG_WRITE.LIBCMT ref: 0041CF68
                                                              • Part of subcall function 0041CF3E: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,004212F4,00000000,00000001,00000000,?,0041EF2D,00000018,0042D930,0000000C,0041EFBE), ref: 0041CFB5
                                                            • _memset.LIBCMT ref: 004127D8
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AllocateException@8HeapThrow_malloc_memset
                                                            • String ID:
                                                            • API String ID: 3965744532-0
                                                            • Opcode ID: aecc41870ac87d010834a5c488dea66f27f1e28d46d9c5665e17219ed6a13b4d
                                                            • Instruction ID: 1154a5c9599e5537b836a1002f89e902606abe80a59ae87693d08389c363c3d7
                                                            • Opcode Fuzzy Hash: aecc41870ac87d010834a5c488dea66f27f1e28d46d9c5665e17219ed6a13b4d
                                                            • Instruction Fuzzy Hash: 05410470905745ABEB25EE38D6C47DBB7D0AF14304F20482FE5A6D3281C7B8A9E4C718
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F5,?,?,?,0040BB41,?,?,00000000,?,?,004124ED,?,?,?,00000001,?), ref: 00408AC5
                                                            • WriteFile.KERNEL32(00000001,?,00004000,?,00000000,?,?,0040BB41,?,?,00000000,?,?,004124ED,?,?), ref: 00408B01
                                                            • WriteFile.KERNELBASE(00000001,?,00000000,?,00000000,?,?,?,?,?,0040BB41,?,?,00000000,?,?), ref: 00408B2D
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: FileWrite$Handle
                                                            • String ID:
                                                            • API String ID: 4209713984-0
                                                            • Opcode ID: 2630e5a33cfd0af18d09aa74bbfd8346207367a51011a650ef626fa881f46d74
                                                            • Instruction ID: f20fcf70e75a5c6d44a32b1c4255a65a5bf54a4d93884812af3801fc7a684339
                                                            • Opcode Fuzzy Hash: 2630e5a33cfd0af18d09aa74bbfd8346207367a51011a650ef626fa881f46d74
                                                            • Instruction Fuzzy Hash: 9B31C371300204AFDB209F65CA44BAB77A9EB94310F04813FF996E72C1DB78A905DF29
                                                            APIs
                                                              • Part of subcall function 0040A08A: _wcslen.LIBCMT ref: 0040A090
                                                            • CreateDirectoryW.KERNELBASE(00000000,00000000,00000000,?,?,?,0040941E,?,00000001,00000000,?,?,?,?,?), ref: 004092F9
                                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,?,00000800,00000000,00000000,?,?,?,0040941E,?,00000001,00000000,?,?), ref: 00409328
                                                            • GetLastError.KERNEL32(00000000,00000000,?,?,?,0040941E,?,00000001,00000000,?,?,?,?,?,?,004067A5), ref: 00409341
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectory$ErrorLast_wcslen
                                                            • String ID:
                                                            • API String ID: 2260680371-0
                                                            • Opcode ID: e440fb91986ed667ecea05b8623b67f22d0563812c7c3dc4cd5ad5119d8de580
                                                            • Instruction ID: 5cfd1deac55777c6f3d5c0bdf32a3cf990456680eccb4e8d5c114054f7fd3324
                                                            • Opcode Fuzzy Hash: e440fb91986ed667ecea05b8623b67f22d0563812c7c3dc4cd5ad5119d8de580
                                                            • Instruction Fuzzy Hash: DD01C031100204A5DB216A664C42BBB37589B4EB84F88447BFD41F62D2CB7C9C92D97E
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0040E2DC
                                                            • _wcscpy.LIBCMT ref: 0040E2FC
                                                              • Part of subcall function 00410D16: _wcslen.LIBCMT ref: 00410D2C
                                                              • Part of subcall function 00410D16: _wcscpy.LIBCMT ref: 00410D42
                                                            • _wcscpy.LIBCMT ref: 0040E31A
                                                              • Part of subcall function 00407150: __EH_prolog.LIBCMT ref: 00407155
                                                              • Part of subcall function 00407074: __EH_prolog.LIBCMT ref: 00407079
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog_wcscpy$_wcslen
                                                            • String ID:
                                                            • API String ID: 2067596392-0
                                                            • Opcode ID: aa5c2ab907567c22763022a3e14260f934ba444c4f603d8b7408ac10fc9ad921
                                                            • Instruction ID: 34baa23ef678cdf00172776f2fc4f6da7b22e3ce89fab18911e310d79256e735
                                                            • Opcode Fuzzy Hash: aa5c2ab907567c22763022a3e14260f934ba444c4f603d8b7408ac10fc9ad921
                                                            • Instruction Fuzzy Hash: E7112675906294AED705EBA4AC427CD7BA0DB16318F1040AFF444A2292CFB91A90DB6E
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID: CMT
                                                            • API String ID: 3519838083-2756464174
                                                            • Opcode ID: c5dcd452fd1e4eeec7eacad65d6409f1913b512c17b790326e9b6827e8618ada
                                                            • Instruction ID: 903a9e83ebfadd1395375551f57b58f4375dbb7200b7f1b09ca9293e13445996
                                                            • Opcode Fuzzy Hash: c5dcd452fd1e4eeec7eacad65d6409f1913b512c17b790326e9b6827e8618ada
                                                            • Instruction Fuzzy Hash: C5210275600144AFCB05EF6488908AEBBB9EF44314B00C06FF866773E2CB389E01DB68
                                                            APIs
                                                            • _realloc.LIBCMT ref: 0040115B
                                                              • Part of subcall function 00406423: __vswprintf_c_l.LIBCMT ref: 00406441
                                                            Strings
                                                            • Maximum allowed array size (%u) is exceeded, xrefs: 0040112C
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: __vswprintf_c_l_realloc
                                                            • String ID: Maximum allowed array size (%u) is exceeded
                                                            • API String ID: 620378156-979119166
                                                            • Opcode ID: dce6db5a0bfaf73c63961f3884acddfac192c2d93569977231d8791de2d42667
                                                            • Instruction ID: b98885df3920ffeceb53ce79d7a953b92e5ea0a83a6506546a83ec3ee512e677
                                                            • Opcode Fuzzy Hash: dce6db5a0bfaf73c63961f3884acddfac192c2d93569977231d8791de2d42667
                                                            • Instruction Fuzzy Hash: 8D014F353006056FD728EA25D89193BB3E9EB88764310483FF99B97791EA39BC548718
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: e8d4131a6c0ab78f129bbdc20b8640a8360fcb8037d97d2b6f97067a7eefdc9b
                                                            • Instruction ID: 1df30631c7f2331ab9bb659be56b51083ca38efb3ea41a431c6c341c2f7f2518
                                                            • Opcode Fuzzy Hash: e8d4131a6c0ab78f129bbdc20b8640a8360fcb8037d97d2b6f97067a7eefdc9b
                                                            • Instruction Fuzzy Hash: D7A1A370904B44AFDB31DB38C8447ABB7E5AB45304F14482FE4A7A72E1D779A881CB59
                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,?,?,00000000,00000002,00000000,00000000,?,?,?,-00000011,?,00408777,?,-00000011,?), ref: 004089A5
                                                            • CreateFileW.KERNEL32(?,000000FF,?,00000000,00000002,00000000,00000000,?,?,00000800,?,?,?,-00000011,?,00408777), ref: 004089DA
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: a074d9b34406725a99dd7798f6dc6781e4ed09d04832e0e73d262d8c08033346
                                                            • Instruction ID: 01d84b190ee352a3a297c1effa4f932d2cea621e1ee0f9c6dc0f58f94aa457de
                                                            • Opcode Fuzzy Hash: a074d9b34406725a99dd7798f6dc6781e4ed09d04832e0e73d262d8c08033346
                                                            • Instruction Fuzzy Hash: F621E6B1000709AFDB20AF28CD41AEA7BA9EB04324F00853EF5D5972D1CA799D859B59
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004012EF
                                                              • Part of subcall function 00402C8B: __EH_prolog.LIBCMT ref: 00402C90
                                                            • _wcslen.LIBCMT ref: 00401391
                                                              • Part of subcall function 0041A506: __lock.LIBCMT ref: 0041A524
                                                              • Part of subcall function 0041A506: ___sbh_find_block.LIBCMT ref: 0041A52F
                                                              • Part of subcall function 0041A506: ___sbh_free_block.LIBCMT ref: 0041A53E
                                                              • Part of subcall function 0041A506: RtlFreeHeap.NTDLL(00000000,00000000,0042D658,0000000C,0041EF84,00000000,0042D930,0000000C,0041EFBE,00000000,0041A9AB,?,00425448,00000004,0042DB18,0000000C), ref: 0041A56E
                                                              • Part of subcall function 0041A506: GetLastError.KERNEL32(?,00425448,00000004,0042DB18,0000000C,0042133E,00000000,0041A9BA,00000000,00000000,00000000,?,0041E966,00000001,00000214), ref: 0041A57F
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog$ErrorFreeHeapLast___sbh_find_block___sbh_free_block__lock_wcslen
                                                            • String ID:
                                                            • API String ID: 2367413355-0
                                                            • Opcode ID: 11f42ef8cdaa0769df478fd29a00db720605d229e9827037435442823eb81be9
                                                            • Instruction ID: 0a298500d8bcfa7ff7c3c7c798daa7998fe1fc2396f24876ea38c2992963b511
                                                            • Opcode Fuzzy Hash: 11f42ef8cdaa0769df478fd29a00db720605d229e9827037435442823eb81be9
                                                            • Instruction Fuzzy Hash: 43218131C04219AADF11AF95D8019EFBBBAEF44704F10402FF815B26B1D7791951DB99
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0040E764
                                                              • Part of subcall function 00401822: __EH_prolog.LIBCMT ref: 00401827
                                                              • Part of subcall function 00401822: _memset.LIBCMT ref: 0040196A
                                                              • Part of subcall function 00401822: _memset.LIBCMT ref: 00401979
                                                              • Part of subcall function 00401822: _memset.LIBCMT ref: 00401988
                                                              • Part of subcall function 00401768: __EH_prolog.LIBCMT ref: 0040176D
                                                            • _malloc.LIBCMT ref: 0040E7CC
                                                              • Part of subcall function 0041CF3E: __FF_MSGBANNER.LIBCMT ref: 0041CF61
                                                              • Part of subcall function 0041CF3E: __NMSG_WRITE.LIBCMT ref: 0041CF68
                                                              • Part of subcall function 0041CF3E: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,004212F4,00000000,00000001,00000000,?,0041EF2D,00000018,0042D930,0000000C,0041EFBE), ref: 0041CFB5
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog_memset$AllocateHeap_malloc
                                                            • String ID:
                                                            • API String ID: 47157355-0
                                                            • Opcode ID: 8a0e236cf4d95a6c185fe36cf45249ef349d68e2c77d2ed9baa34b65b141d772
                                                            • Instruction ID: 028989472a53044f7525bc0779393b56fb6d8ddec0b6eee1d5d0b7402cf9aefd
                                                            • Opcode Fuzzy Hash: 8a0e236cf4d95a6c185fe36cf45249ef349d68e2c77d2ed9baa34b65b141d772
                                                            • Instruction Fuzzy Hash: 09217F72800259EFCF15EFA5D8819EEB7B4BF08308F10456FE006B3291E7385A44DB69
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(?,00000000,?,00000001), ref: 00408BE1
                                                            • GetLastError.KERNEL32(?,?), ref: 00408BEE
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastPointer
                                                            • String ID:
                                                            • API String ID: 2976181284-0
                                                            • Opcode ID: 401041f812e38b2c9cc7bc658f647880eeddc778264b755613b9ad4916800595
                                                            • Instruction ID: 02e03e75e993c9a8a945b97f90e28c3a97864ede8bf9f3e31abc9cd0b64ad5c5
                                                            • Opcode Fuzzy Hash: 401041f812e38b2c9cc7bc658f647880eeddc778264b755613b9ad4916800595
                                                            • Instruction Fuzzy Hash: 540145B2706204BFE7209B788D458AB36ADCB84334B14423FB192E33C1EA749D00527D
                                                            APIs
                                                            • LoadStringW.USER32(?,-004335D5,00000200), ref: 0040C410
                                                            • LoadStringW.USER32(?,-004335D5,00000200), ref: 0040C422
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: LoadString
                                                            • String ID:
                                                            • API String ID: 2948472770-0
                                                            • Opcode ID: 72945bf23e6ae9cf9b0fab0a5a9e43b8bd420b2efeca12c7a5d03f8341522d8c
                                                            • Instruction ID: edfc175873420c56a2918f30daf07abd917a54f8fc7c105ac48efc03a3cacc81
                                                            • Opcode Fuzzy Hash: 72945bf23e6ae9cf9b0fab0a5a9e43b8bd420b2efeca12c7a5d03f8341522d8c
                                                            • Instruction Fuzzy Hash: 200186722012107FD6209F19AC85F577BEDEB99351F10543AB900D32A1D6359C01876C
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(?,?,00000001,00000000,?,?,?,?,00408FD1,00000000,00000000,00000000,?,00407DE2,?,?), ref: 00408F9E
                                                            • GetLastError.KERNEL32(00408FD1,00000000,00000000,00000000,?,00407DE2,?,?,?,?,?,?,?,?), ref: 00408FAA
                                                              • Part of subcall function 00408E03: __EH_prolog.LIBCMT ref: 00408E08
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileH_prologLastPointer
                                                            • String ID:
                                                            • API String ID: 4236474358-0
                                                            • Opcode ID: fcb39ab4431aa7e293366899b2db99d4a95afe2178fb6d1211a042b2fb6e45d7
                                                            • Instruction ID: 31f7e80921147255a447777291f97898e209bd40052f61b908ef1a5d0e3b9beb
                                                            • Opcode Fuzzy Hash: fcb39ab4431aa7e293366899b2db99d4a95afe2178fb6d1211a042b2fb6e45d7
                                                            • Instruction Fuzzy Hash: 1E019631200306DBCF248F64CD046AE776ABF813A5F14463EF8A1A22D0DB78D951DA55
                                                            APIs
                                                            • _malloc.LIBCMT ref: 0041A8B4
                                                              • Part of subcall function 0041CF3E: __FF_MSGBANNER.LIBCMT ref: 0041CF61
                                                              • Part of subcall function 0041CF3E: __NMSG_WRITE.LIBCMT ref: 0041CF68
                                                              • Part of subcall function 0041CF3E: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,004212F4,00000000,00000001,00000000,?,0041EF2D,00000018,0042D930,0000000C,0041EFBE), ref: 0041CFB5
                                                            • __CxxThrowException@8.LIBCMT ref: 0041A8F9
                                                              • Part of subcall function 0041216A: std::exception::exception.LIBCMT ref: 00412174
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AllocateException@8HeapThrow_mallocstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 1264268182-0
                                                            • Opcode ID: 652451197443050397a994e0f1a437ce7b6bc5e6c303dc83bd53091e5d1b5587
                                                            • Instruction ID: 42064790ed8d2a037bfba99cbedd4ff18ff19c5b52db1d8e26b3e688ef0b8114
                                                            • Opcode Fuzzy Hash: 652451197443050397a994e0f1a437ce7b6bc5e6c303dc83bd53091e5d1b5587
                                                            • Instruction Fuzzy Hash: 64F0E23160021972CB047B22ED46ACE37586F01728B10403BFC1199192DFAC9ADA919E
                                                            APIs
                                                            • DeleteFileW.KERNELBASE(?,?,-00000011,?,0040877F,?,?,00000001,?,?,?,?,?,?,00000000,?), ref: 004090FC
                                                            • DeleteFileW.KERNEL32(?,?,?,00000800,?,0040877F,?,?,00000001,?,?,?,?,?,?,00000000), ref: 00409126
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: DeleteFile
                                                            • String ID:
                                                            • API String ID: 4033686569-0
                                                            • Opcode ID: 0a42f7c6465a65df2585c125a2f12a68c0d7bb240ddda169d7c29578124ac562
                                                            • Instruction ID: c332a15ca0b0e5e82477794df9822c7aeed54c7470201c7e9f38434531037f1b
                                                            • Opcode Fuzzy Hash: 0a42f7c6465a65df2585c125a2f12a68c0d7bb240ddda169d7c29578124ac562
                                                            • Instruction Fuzzy Hash: DBE02B3114122AA7EB00A620DC01FDA3B5C9F043C0F0440737C80E71D1DB75DCE0D9A4
                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(?,?,?,?,004092AE,?,00406796,?,?,?,?), ref: 00409059
                                                            • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,?,?,004092AE,?,00406796,?,?,?,?), ref: 00409081
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: b25c0f1027ae8764d85bcc1b21548e8f0eb716d18d4362393a4ff3fac8f95358
                                                            • Instruction ID: f0aa2148c7acefeba2e85b7bc3a11c2245577506fd5686bf0be3bfe97b3e7ecd
                                                            • Opcode Fuzzy Hash: b25c0f1027ae8764d85bcc1b21548e8f0eb716d18d4362393a4ff3fac8f95358
                                                            • Instruction Fuzzy Hash: BBE092326101186ACB10A669DC00BDE379D9BC83E5F0401B3BE44E32D5DAB4DD95CBA5
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ItemText_swprintf
                                                            • String ID:
                                                            • API String ID: 3011073432-0
                                                            • Opcode ID: 8034b9b9aa660211ead63cdf03b6a57d34fff27c13a9ae0071d7a28958d0b1e9
                                                            • Instruction ID: 335ddef7e6713e4d0d4f603cdcadd61df7388e1f4a4116fbf7552c9c9eb2c210
                                                            • Opcode Fuzzy Hash: 8034b9b9aa660211ead63cdf03b6a57d34fff27c13a9ae0071d7a28958d0b1e9
                                                            • Instruction Fuzzy Hash: 02F0EC75A0420866E711B7A1CC07F9B36589B09789F04047FB601760F3D9795564479A
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(?,?,?,?,?,00410F17,00409FF4), ref: 00410EE8
                                                            • GetProcessAffinityMask.KERNEL32(00000000), ref: 00410EEF
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Process$AffinityCurrentMask
                                                            • String ID:
                                                            • API String ID: 1231390398-0
                                                            • Opcode ID: 5b6efae98f4fd143c9c11739b7a9d49426725563ed325c59bf560736ad01bde8
                                                            • Instruction ID: ae3045e16ef29d64dcafac8e7d0c22bbd438388315c71f77e1501110187c073f
                                                            • Opcode Fuzzy Hash: 5b6efae98f4fd143c9c11739b7a9d49426725563ed325c59bf560736ad01bde8
                                                            • Instruction Fuzzy Hash: 86E08672A1020AA78F2897A0CD4A9EF32ACEB01215700087BE503C1640EAF8D5D24629
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ItemShowWindow
                                                            • String ID:
                                                            • API String ID: 3351165006-0
                                                            • Opcode ID: 76029219059209f4090a36f07538af165f69a2de4b0c3b600f66da5fa765a026
                                                            • Instruction ID: 00e924dde3bcd55588ca107b376b403c6fb897f844ebcc5e5070703d20151260
                                                            • Opcode Fuzzy Hash: 76029219059209f4090a36f07538af165f69a2de4b0c3b600f66da5fa765a026
                                                            • Instruction Fuzzy Hash: E7C01232258241FFCB020BB0DC09E2ABBA8ABA5312F10CD68B4A5C1160C23AC024DB22
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 2adb2e46dfa9c528ebc340105a31a2d546adb33428178d20608c313c98083781
                                                            • Instruction ID: d2613427887af626ac15b725df06f6c4975e9b849f4698f9cbfae21a5c634ed1
                                                            • Opcode Fuzzy Hash: 2adb2e46dfa9c528ebc340105a31a2d546adb33428178d20608c313c98083781
                                                            • Instruction Fuzzy Hash: 8E615870505B40AADB34DB39C999BEBB7E4AF51304F00456FF4AB622C2CBBC2944DB59
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcsncpy
                                                            • String ID:
                                                            • API String ID: 1735881322-0
                                                            • Opcode ID: eec277942e391c224009335c7c4fdbf9ccf01f1ad50b69e55fa7bc55e694a795
                                                            • Instruction ID: d4505bb1f71f0a7630b1187c5dc073957316d7994076f763c5609016dbc7fb68
                                                            • Opcode Fuzzy Hash: eec277942e391c224009335c7c4fdbf9ccf01f1ad50b69e55fa7bc55e694a795
                                                            • Instruction Fuzzy Hash: 1821F9705412146ADF209BA5C8817EF73A8AF09744F104067FD84E71C2E6BC9DC58799
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 64ae09b8b7d6d911e9fbb323825e8f5681d7d5dd0d1dbfba22af46c2c3ac0037
                                                            • Instruction ID: 0e7476b061c64c38a033d28293548f621ad6c4fedd1d6d7b32e1dff298444af0
                                                            • Opcode Fuzzy Hash: 64ae09b8b7d6d911e9fbb323825e8f5681d7d5dd0d1dbfba22af46c2c3ac0037
                                                            • Instruction Fuzzy Hash: F611E336D04216A7CB21AE69D881BAF7774AB84724F00427FF910772C0C77CAD4186AE
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004155F4
                                                              • Part of subcall function 0041A506: __lock.LIBCMT ref: 0041A524
                                                              • Part of subcall function 0041A506: ___sbh_find_block.LIBCMT ref: 0041A52F
                                                              • Part of subcall function 0041A506: ___sbh_free_block.LIBCMT ref: 0041A53E
                                                              • Part of subcall function 0041A506: RtlFreeHeap.NTDLL(00000000,00000000,0042D658,0000000C,0041EF84,00000000,0042D930,0000000C,0041EFBE,00000000,0041A9AB,?,00425448,00000004,0042DB18,0000000C), ref: 0041A56E
                                                              • Part of subcall function 0041A506: GetLastError.KERNEL32(?,00425448,00000004,0042DB18,0000000C,0042133E,00000000,0041A9BA,00000000,00000000,00000000,?,0041E966,00000001,00000214), ref: 0041A57F
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ErrorFreeH_prologHeapLast___sbh_find_block___sbh_free_block__lock
                                                            • String ID:
                                                            • API String ID: 2675452811-0
                                                            • Opcode ID: 8497dd6851e15abeade78bc1a96ba9a899c127afdb4d8d4cff6b23ee0cc24447
                                                            • Instruction ID: af90cb06349abb904c7e908c808b67ca80216b7905dff4050bf1b7fec03d4104
                                                            • Opcode Fuzzy Hash: 8497dd6851e15abeade78bc1a96ba9a899c127afdb4d8d4cff6b23ee0cc24447
                                                            • Instruction Fuzzy Hash: DA117871210740DAC325FF76DA636DBB7B0AF24304F40091EA06B525D2EFB8BA44CA19
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 00407155
                                                              • Part of subcall function 0040B8E3: __EH_prolog.LIBCMT ref: 0040B8E8
                                                              • Part of subcall function 0041A89A: _malloc.LIBCMT ref: 0041A8B4
                                                              • Part of subcall function 0041768A: __EH_prolog.LIBCMT ref: 0041768F
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog$_malloc
                                                            • String ID:
                                                            • API String ID: 4254904621-0
                                                            • Opcode ID: f4a0015dd81c6367a1e3723969d7ed7b71eec4aecea33b784c0cc5c9c2fc540f
                                                            • Instruction ID: 4fa22713ff1b1cd4263d7298948381a35fc14f9b7bb01a12f51cc5b8ed2a70ee
                                                            • Opcode Fuzzy Hash: f4a0015dd81c6367a1e3723969d7ed7b71eec4aecea33b784c0cc5c9c2fc540f
                                                            • Instruction Fuzzy Hash: B401ADB2A107009AC7109FAAC44029AF7E9FF94310F00842FE459D3390D7B8A9408B59
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 863cc4a6e1e3a3a4d87e432309fddcfd3b8ff728f9b2f9572ac3dc0eeb2e4462
                                                            • Instruction ID: bd93042bfc1aad2116d0877f42dabf9818625296a81febac24436190ec2c14aa
                                                            • Opcode Fuzzy Hash: 863cc4a6e1e3a3a4d87e432309fddcfd3b8ff728f9b2f9572ac3dc0eeb2e4462
                                                            • Instruction Fuzzy Hash: 33F04F35B00214AFD7149F58C889FADB7B5EF48724F208159E912A73D1CB749D008A54
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 00405517
                                                              • Part of subcall function 0040A026: __EH_prolog.LIBCMT ref: 0040A02B
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 8d7273e43c00e3d352773117abe9a80c711290f191c18f656fba03e9df2d1900
                                                            • Instruction ID: fa77f21fc7194b1e08a14eb3a2c561e3cb85337c9bb77c22dcaa42305da5d14c
                                                            • Opcode Fuzzy Hash: 8d7273e43c00e3d352773117abe9a80c711290f191c18f656fba03e9df2d1900
                                                            • Instruction Fuzzy Hash: A2013130901694DAD715EBA5D1157DDB7B49F14308F00449FE456532C3DFF82B84CB66
                                                            APIs
                                                              • Part of subcall function 0040A0A4: _wcspbrk.LIBCMT ref: 0040A0B5
                                                            • FindClose.KERNELBASE(00000000,00000800,000000FF,?,?,?,?,00408411,?,?,00000000,?,00000800), ref: 004096EC
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CloseFind_wcspbrk
                                                            • String ID:
                                                            • API String ID: 2190230203-0
                                                            • Opcode ID: 85123c6e94d2e517bbdffd63dea6bf8ab785228859dafa86eb4c7b41f0ab578b
                                                            • Instruction ID: c5db38677187ea9b8dec244fb3c8af9ff7d0a6647eff614e001a313c4cd0766c
                                                            • Opcode Fuzzy Hash: 85123c6e94d2e517bbdffd63dea6bf8ab785228859dafa86eb4c7b41f0ab578b
                                                            • Instruction Fuzzy Hash: 21F09635005380ABCA225B658404AC77B945F55365F048A1EB1F9621D7C279545ADB26
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 00407079
                                                              • Part of subcall function 004155EF: __EH_prolog.LIBCMT ref: 004155F4
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: b7d3c8e010c571e5a6642b72fc2b2d393aaf48cfcd88e5119046994b0af1dfd5
                                                            • Instruction ID: da238740c98ae75ebc3f5927faf798116ad114c2e9bc9b884e51ec1b39bdab83
                                                            • Opcode Fuzzy Hash: b7d3c8e010c571e5a6642b72fc2b2d393aaf48cfcd88e5119046994b0af1dfd5
                                                            • Instruction Fuzzy Hash: D1E06D32A11610ABC715AB29C4066EEF3B9EFC0728F10422FA062636C1DBB86D418659
                                                            APIs
                                                            • SetThreadExecutionState.KERNEL32(00000001), ref: 00410E13
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ExecutionStateThread
                                                            • String ID:
                                                            • API String ID: 2211380416-0
                                                            • Opcode ID: 99114e7ac6e4293e68323f01352a3d081b9a398302f12d6f006bb62c0eb9cb63
                                                            • Instruction ID: ce8ef4de1523c5d0242b00cb845f3d850d1a93a8e5a83f46045a12d46b5ed054
                                                            • Opcode Fuzzy Hash: 99114e7ac6e4293e68323f01352a3d081b9a398302f12d6f006bb62c0eb9cb63
                                                            • Instruction Fuzzy Hash: 62D0C23170015022CA213B2B2815BEE56194F81724F0900BFB501622E38EAC09C281EE
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: c61d5f3dc6c1f9b97ffe444c65296dc1c5881d1e0fbf0653a527c25b506bb31f
                                                            • Instruction ID: 57c48ace6bef99692c10c7cc37c4410ce12e8001caaa4568d5ee7d388360cf58
                                                            • Opcode Fuzzy Hash: c61d5f3dc6c1f9b97ffe444c65296dc1c5881d1e0fbf0653a527c25b506bb31f
                                                            • Instruction Fuzzy Hash: D7E0CD729053406AD371751D9C04F579AD85B95725F14C82FB089A32C3C1BC5C51C759
                                                            APIs
                                                            • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041EE0C
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CreateHeap
                                                            • String ID:
                                                            • API String ID: 10892065-0
                                                            • Opcode ID: 6c78c704c61e396e770c5c9d5bf39bc32bfab303bf8d18d204e2a82309729daa
                                                            • Instruction ID: eb53d8fa6b9c670d76401f9b6e634384cdf5b6bc28e7f080834842f41bea832e
                                                            • Opcode Fuzzy Hash: 6c78c704c61e396e770c5c9d5bf39bc32bfab303bf8d18d204e2a82309729daa
                                                            • Instruction Fuzzy Hash: E6D05E366503485ADB106F716C09B763BDCD384396F104436BC1DC6150F775C5A09A48
                                                            APIs
                                                            • GetFileType.KERNELBASE(?,00408CDA,?,00408EB0,?,00000000,?,?,00000000), ref: 00408C66
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: FileType
                                                            • String ID:
                                                            • API String ID: 3081899298-0
                                                            • Opcode ID: b9077224b9f88db5cd0ce6d94ac7233058a1c10921077028cad7c3ce69d3e2a2
                                                            • Instruction ID: 2361e1c995e4a541e26ad64c94d2af3b89e31d8e4072a4a2db2c19a8efa4df55
                                                            • Opcode Fuzzy Hash: b9077224b9f88db5cd0ce6d94ac7233058a1c10921077028cad7c3ce69d3e2a2
                                                            • Instruction Fuzzy Hash: 8EC0127151610056DF2046385A8845B376687433667789FF9E071D12E5CB3ECC56B025
                                                            APIs
                                                            • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 0040D530
                                                              • Part of subcall function 0040D116: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040D127
                                                              • Part of subcall function 0040D116: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0040D138
                                                              • Part of subcall function 0040D116: TranslateMessage.USER32(?), ref: 0040D142
                                                              • Part of subcall function 0040D116: DispatchMessageW.USER32(?), ref: 0040D14C
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Message$DispatchItemPeekSendTranslate
                                                            • String ID:
                                                            • API String ID: 4142818094-0
                                                            • Opcode ID: 7040c51d5953534f53b945be8071fa726febfab1a70e776a765f2f75df90e843
                                                            • Instruction ID: 888b2871e718dea131dfcf0ec1cbc21fe8f041a13ed789b986bd41985b0bed4c
                                                            • Opcode Fuzzy Hash: 7040c51d5953534f53b945be8071fa726febfab1a70e776a765f2f75df90e843
                                                            • Instruction Fuzzy Hash: FDC01235240300ABE7117B50DD07F1A3A62BB88B09F808039BA81380F2CEB648369A0A
                                                            APIs
                                                            • SetEndOfFile.KERNELBASE(?,004080D7,?,?,?,?,?,?), ref: 00408C4A
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: File
                                                            • String ID:
                                                            • API String ID: 749574446-0
                                                            • Opcode ID: 372b206049e22359e890f019f69c17f88631756899d3b8a56b0e056d033f7bf1
                                                            • Instruction ID: 463f2a0b6f7528456a39aa395305c1415068e572747894341c9f749ccc5f34b3
                                                            • Opcode Fuzzy Hash: 372b206049e22359e890f019f69c17f88631756899d3b8a56b0e056d033f7bf1
                                                            • Instruction Fuzzy Hash: 80B012703E0006878E102B30CD084143910D71130630041B0600AC6061CB13C0135611
                                                            APIs
                                                            • SetCurrentDirectoryW.KERNELBASE(?,0040D8E5,0042A65C,00000000,?,00000006,?,00000800), ref: 00419C8C
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory
                                                            • String ID:
                                                            • API String ID: 1611563598-0
                                                            • Opcode ID: 35c8f440b0c787f752f8f5ff34d68e699b4f54a7e8ae052c3817328c3539a25c
                                                            • Instruction ID: 2a7281b05ebb75ae791a00df68b116ffeccc810d55834c007acaed3bb23dd98c
                                                            • Opcode Fuzzy Hash: 35c8f440b0c787f752f8f5ff34d68e699b4f54a7e8ae052c3817328c3539a25c
                                                            • Instruction Fuzzy Hash: 50A012302940064F8A100B30CC0D82577506760702F0096307002C10A4CB304430A505
                                                            APIs
                                                            • CloseHandle.KERNELBASE(?,76F920B0,00000000,0040868D,?,?,?,?,00407427,?,00000000,?,00000800,?,?,?), ref: 00408A4D
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: b21f32aa194ba9df83e0161a33b0e827325d82f6e4b9bdb228d687f297159138
                                                            • Instruction ID: ad6283f58ebf58fc73997c28fab75cfea7daa8eae0e70c9973603df5d86841c1
                                                            • Opcode Fuzzy Hash: b21f32aa194ba9df83e0161a33b0e827325d82f6e4b9bdb228d687f297159138
                                                            • Instruction Fuzzy Hash: 55F027706427044FD73056384A4879333D85B16331F049B2FD8E2A3BC0CB7898894E64
                                                            APIs
                                                            • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0040DED8
                                                            • DestroyIcon.USER32(00000000), ref: 0040DEE3
                                                            • EndDialog.USER32(?,00000006), ref: 0040DEEB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: DestroyDialogIconItemMessageSend
                                                            • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                            • API String ID: 3309745630-1840816070
                                                            • Opcode ID: 16eeae55bdc9405558cec747ebfcc07caac1c70e605718ffa483f40035c658e6
                                                            • Instruction ID: 1ca02d43f13477766b0e0b2ecc80fe6690186a1d560daa565d76ee57e1f32e2a
                                                            • Opcode Fuzzy Hash: 16eeae55bdc9405558cec747ebfcc07caac1c70e605718ffa483f40035c658e6
                                                            • Instruction Fuzzy Hash: 56A18272A4021CABEB21DFE0CC85FEF776DEB04704F440476BA05E60D1D6789E5A8B65
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0040690F
                                                            • _wcslen.LIBCMT ref: 00406978
                                                            • _wcscpy.LIBCMT ref: 004069E4
                                                            • _wcslen.LIBCMT ref: 004069F0
                                                              • Part of subcall function 00406553: GetCurrentProcess.KERNEL32(00000020,?), ref: 00406562
                                                              • Part of subcall function 00406553: OpenProcessToken.ADVAPI32(00000000), ref: 00406569
                                                              • Part of subcall function 00406553: LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00406589
                                                              • Part of subcall function 00406553: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000000,00000000,00000000), ref: 0040659E
                                                              • Part of subcall function 00406553: GetLastError.KERNEL32 ref: 004065A8
                                                              • Part of subcall function 00406553: CloseHandle.KERNEL32(?), ref: 004065B7
                                                              • Part of subcall function 0040935F: _wcsncpy.LIBCMT ref: 004093C6
                                                            • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000001,00000080,00000000,00000000,00000001), ref: 00406A7B
                                                            • CloseHandle.KERNEL32(00000000), ref: 00406A8C
                                                            • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000001), ref: 00406A99
                                                            • _wcscpy.LIBCMT ref: 00406AE5
                                                            • _wcscpy.LIBCMT ref: 00406B09
                                                            • _wcscpy.LIBCMT ref: 00406B55
                                                            • _wcscpy.LIBCMT ref: 00406B7E
                                                            • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00406BA4
                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00406BCF
                                                            • CloseHandle.KERNEL32(00000000), ref: 00406BDA
                                                            • GetLastError.KERNEL32 ref: 00406BEC
                                                            • RemoveDirectoryW.KERNEL32(00000000), ref: 00406C21
                                                            • DeleteFileW.KERNEL32(00000000), ref: 00406C29
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy$CloseCreateFileHandle$DirectoryErrorLastProcessToken_wcslen$AdjustControlCurrentDeleteDeviceH_prologLookupOpenPrivilegePrivilegesRemoveValue_wcsncpy
                                                            • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                            • API String ID: 295717069-3508440684
                                                            • Opcode ID: 61ce2a1e948bc651cc5c71645e7a660e15ad332992f425926efc10dd858bd714
                                                            • Instruction ID: 0b044a0677013c3ee0dedeb9ad72db73be6c8eb7e300feb6a7d55a674be6f19f
                                                            • Opcode Fuzzy Hash: 61ce2a1e948bc651cc5c71645e7a660e15ad332992f425926efc10dd858bd714
                                                            • Instruction Fuzzy Hash: 56B1B471A00215AFDF21EF64CC45BDA77B8EF04304F00446AF95AF7281D778AAA4CB69
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: __byteswap_ulong
                                                            • String ID: @Z@
                                                            • API String ID: 2309504477-3109265564
                                                            • Opcode ID: 3d995ba0cc5bd3afd1912a8f52df84b91350d78957cf3c3d8552aa4fe151a300
                                                            • Instruction ID: 1dc3a99616fea8f09d0a2898b21a56a39af3494018e3c7a499627515aa5f83aa
                                                            • Opcode Fuzzy Hash: 3d995ba0cc5bd3afd1912a8f52df84b91350d78957cf3c3d8552aa4fe151a300
                                                            • Instruction Fuzzy Hash: 869119B1A006148FCB24DF5AC881A9EB7F1FF48308F1445AEE59AE7721D734E9948F48
                                                            APIs
                                                            • LoadLibraryW.KERNEL32(Crypt32.dll,00000020,0040CF0E,00000020,?,?,00405D3C,?,00000020,00000001,00000000,?,00000010,?,?,?), ref: 0040CEC4
                                                            • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0040CEDD
                                                            • GetProcAddress.KERNEL32(00438800,CryptUnprotectMemory), ref: 0040CEE9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad
                                                            • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                            • API String ID: 2238633743-1753850145
                                                            • Opcode ID: 5fe6950aaff99067424b8bdf76d8a3167c7df5a56d66711809a8faa92a841fba
                                                            • Instruction ID: 6e3b8f00ce2f8e0fa430b510b5536735c08c44b91adf59875fbb0715622b898a
                                                            • Opcode Fuzzy Hash: 5fe6950aaff99067424b8bdf76d8a3167c7df5a56d66711809a8faa92a841fba
                                                            • Instruction Fuzzy Hash: 7EE092306003119FD7319F79EC44B03BBE89F94B10B14846FE984E3250C6B8D4518B5D
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000020,?), ref: 00406562
                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00406569
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00406589
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000000,00000000,00000000), ref: 0040659E
                                                            • GetLastError.KERNEL32 ref: 004065A8
                                                            • CloseHandle.KERNEL32(?), ref: 004065B7
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
                                                            • String ID:
                                                            • API String ID: 3398352648-0
                                                            • Opcode ID: c4d8732f7f1e2046f43f8b45a71e1742e44d7c33346580acd03521233585be14
                                                            • Instruction ID: 201d4201c496fcfd48e74424a9b99b2c6b7fcfb09556bcb8571a25bcb240e8ee
                                                            • Opcode Fuzzy Hash: c4d8732f7f1e2046f43f8b45a71e1742e44d7c33346580acd03521233585be14
                                                            • Instruction Fuzzy Hash: A0011DB1600209FFDB209FA4DC89EAF7BBCAB04344F401076B902E1255D775CE259A75
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 00401CC6
                                                            • _strlen.LIBCMT ref: 00402237
                                                              • Part of subcall function 00411B3C: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,00001FFF,?,?,004022BC,00000000,?,00000800,?,00001FFF,?), ref: 00411B58
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00402393
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ByteCharH_prologMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                            • String ID: CMT
                                                            • API String ID: 1706572503-2756464174
                                                            • Opcode ID: a938faf7c17183071b0639e51388f91889b5cef4979cfb0538ab3c6a938d128c
                                                            • Instruction ID: 47e58a6222a9c82a3371e9f2a391d10810198bea5a194d1edf5ea2ede1dda2e7
                                                            • Opcode Fuzzy Hash: a938faf7c17183071b0639e51388f91889b5cef4979cfb0538ab3c6a938d128c
                                                            • Instruction Fuzzy Hash: 8B6201709006849FCF25DF64C8947EE7BB1AF14304F0844BEE986BB2D6DB795985CB28
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32 ref: 00423F3E
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423F53
                                                            • UnhandledExceptionFilter.KERNEL32(0042BA78), ref: 00423F5E
                                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 00423F7A
                                                            • TerminateProcess.KERNEL32(00000000), ref: 00423F81
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                            • String ID:
                                                            • API String ID: 2579439406-0
                                                            • Opcode ID: 4de6ed279e9cf42e89259ac0ebda5d4927e8938d534c68d964197d147836f072
                                                            • Instruction ID: 77c401cdca4814435c65699ef26cb777055d8c499ed0f7a386f9586c05fd5705
                                                            • Opcode Fuzzy Hash: 4de6ed279e9cf42e89259ac0ebda5d4927e8938d534c68d964197d147836f072
                                                            • Instruction Fuzzy Hash: 6F21C0B8A10208DFE710DF25F8496597BA0FB1A315F90117BE90887271EBB5599ECF0E
                                                            APIs
                                                            • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0040D17B
                                                            • GetNumberFormatW.KERNEL32(00000400,00000000,?,004300CC,?,?), ref: 0040D1CA
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: FormatInfoLocaleNumber
                                                            • String ID:
                                                            • API String ID: 2169056816-0
                                                            • Opcode ID: fae0c5bc4c9ea969901553f08fe9413b92117c2e4d377c34b7ff725826ea960f
                                                            • Instruction ID: 2e86bd0250e0b4fef5c8dc12a3830970d19becb9d4c55c3472b337e1343b8b10
                                                            • Opcode Fuzzy Hash: fae0c5bc4c9ea969901553f08fe9413b92117c2e4d377c34b7ff725826ea960f
                                                            • Instruction Fuzzy Hash: DB017C35600248AEE710DFA4EC41FAAB7FCEF09714F005426FA04EB1A0D3B89915CB6D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: <D$DD
                                                            • API String ID: 0-3036587789
                                                            • Opcode ID: a120047ceaa170e9019935171625ae5ad03bfb54992e95746f25c16dbdc0a917
                                                            • Instruction ID: 59a02f745f793eb532b4d9e305735a670a6f692f985c4356a20c5044c607aa25
                                                            • Opcode Fuzzy Hash: a120047ceaa170e9019935171625ae5ad03bfb54992e95746f25c16dbdc0a917
                                                            • Instruction Fuzzy Hash: E8D15D72A0061ACFCF14CF58D884599B3B1FF8C308B2685ADE919AB245D731BA56CF94
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: f2ddf0237e8c887b9397686041efde03e6b7465c6b8aca2acf299e0ee70c85ec
                                                            • Instruction ID: ca8e397051957a2ab45e24d4035287d6273771f133136d8253d7927585564b75
                                                            • Opcode Fuzzy Hash: f2ddf0237e8c887b9397686041efde03e6b7465c6b8aca2acf299e0ee70c85ec
                                                            • Instruction Fuzzy Hash: 5692D5709087859FCB29CF34C4D06E9BBF1AF55308F18C5AED8968B342D738A985CB59
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _realloc
                                                            • String ID:
                                                            • API String ID: 1750794848-0
                                                            • Opcode ID: 19fe713726019c3973d82b14b26a9fc68d02c60563561d4d82d0835d1efeca77
                                                            • Instruction ID: 2a1397d1efbb1e156a4ddc1088eaf27e515a490876f5f290c2ff2c2445328417
                                                            • Opcode Fuzzy Hash: 19fe713726019c3973d82b14b26a9fc68d02c60563561d4d82d0835d1efeca77
                                                            • Instruction Fuzzy Hash: 0B02E5B1A106069BCB1DCF28C5916E9B7E1FF85304F24852ED556CBA85D338F9E1CB88
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: 9c54e9cdedc4d1f5f0a70ee5fbfd421263a38b40d6fcac4ed0c82430486a0b60
                                                            • Instruction ID: 3562be7dcc5a33f83423fe2ddc28cf6e78eed116dec30ec79901489c8d2199a3
                                                            • Opcode Fuzzy Hash: 9c54e9cdedc4d1f5f0a70ee5fbfd421263a38b40d6fcac4ed0c82430486a0b60
                                                            • Instruction Fuzzy Hash: CBA11472A00208EBDB04DF65C581BED77B5AB94304F24447FE942EB282C77C9AC2DB59
                                                            APIs
                                                            • CoCreateInstance.OLE32(0042B1F8,00000000,00000001,0042B148,?), ref: 00419BC9
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CreateInstance
                                                            • String ID:
                                                            • API String ID: 542301482-0
                                                            • Opcode ID: 291608a549582a43ab036b31c95ed53b806bcf03129be81fab9f556b712dc9f9
                                                            • Instruction ID: e9337f94160ec10d5a134cda80235c1f61728acff05639409476ed3799cc72ed
                                                            • Opcode Fuzzy Hash: 291608a549582a43ab036b31c95ed53b806bcf03129be81fab9f556b712dc9f9
                                                            • Instruction Fuzzy Hash: FC311875A00209EFCF04CFA0C898DAA7BB9EF49304B204499F942DB250D739EE51DBA4
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: f170c41e67568dbb41c50a43ec108573c349a1076046e87b2a713adcc681154b
                                                            • Instruction ID: e1f0199fda650a5869103b9083c5b7a650503f912fa59dbaeb4dd54c60283149
                                                            • Opcode Fuzzy Hash: f170c41e67568dbb41c50a43ec108573c349a1076046e87b2a713adcc681154b
                                                            • Instruction Fuzzy Hash: 0721F672704209DFD724CF28D4817AA7BE5AB19300F10892FD896E73C2C678E9458B49
                                                            APIs
                                                            • GetVersionExW.KERNEL32(?), ref: 00409C2B
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Version
                                                            • String ID:
                                                            • API String ID: 1889659487-0
                                                            • Opcode ID: 1145292b874a8e7a56bde58bed546469a1a499fc1dbdbc0264d61b52db470385
                                                            • Instruction ID: d7c6bb9a1732f6c2eece22a2b410928bcf9985e9f3444315991ea75afaaef588
                                                            • Opcode Fuzzy Hash: 1145292b874a8e7a56bde58bed546469a1a499fc1dbdbc0264d61b52db470385
                                                            • Instruction Fuzzy Hash: E4F0F4B1A041088FDB28CF18E992A99B7F5A748305F1002A5D619D3390DA78AE81CF69
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0002348C), ref: 004234D3
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: c83ebaee86b923b47ec218d74108a47e8bb0214f05dc8ef17ebda85afd4cada2
                                                            • Instruction ID: 1b01da781a1f42b14bf088c4285091799bc00e9a7c54fca4454c541a30810ab4
                                                            • Opcode Fuzzy Hash: c83ebaee86b923b47ec218d74108a47e8bb0214f05dc8ef17ebda85afd4cada2
                                                            • Instruction Fuzzy Hash: 539002603521104746112BB06C1D51565A17F48617BD104A5B401C5054DA598621551B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: gj
                                                            • API String ID: 0-4203073231
                                                            • Opcode ID: 8e8f698dc4288f7cd721a7a81a634b87765ee1de91585cf515aab87a68fe5fee
                                                            • Instruction ID: d9eb52a2d6ff44a43e3580116b86408f9a206631cbab7b39ea8bb55ae5343344
                                                            • Opcode Fuzzy Hash: 8e8f698dc4288f7cd721a7a81a634b87765ee1de91585cf515aab87a68fe5fee
                                                            • Instruction Fuzzy Hash: 81C126B2D002289BDF44CF9AD8405EEFBF2BFC8310F2AC1A6D81477615D6346A529F91
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: 345b0d20b664bc5a7c067b8b85495d146ce8f508c18b5b2458494fa8c5d0ce26
                                                            • Instruction ID: ec473c390e775c3513d1f4c5f902ffdbdf11d251c2712a84011b28fca20aaef5
                                                            • Opcode Fuzzy Hash: 345b0d20b664bc5a7c067b8b85495d146ce8f508c18b5b2458494fa8c5d0ce26
                                                            • Instruction Fuzzy Hash: 5F72E770A087459FCB29CF24C5D0AE9BBF1EF55304F1584AED99A8B342D338E985CB58
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55f74d88c168b2656ab75066bc4e011c1757566443c1fcad1fbcf06b528a1986
                                                            • Instruction ID: 136bcfac07b0c46142f126060f48d767d5d9002a5a6c7f55271a6c6e067ee92a
                                                            • Opcode Fuzzy Hash: 55f74d88c168b2656ab75066bc4e011c1757566443c1fcad1fbcf06b528a1986
                                                            • Instruction Fuzzy Hash: 8C72B070A04645DFCB19CF68C5806EDBBB1FF45308F2981AED8598B742C339E991CB59
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                            • Instruction ID: fa64fecedd4ee0fbc6ebc6d5fd45eff142ec883d8ec5514f9c97111b8272a84e
                                                            • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                            • Instruction Fuzzy Hash: 93D18E73C0E9B34A8735812D84582BBEE62AFD175031EC3E2DCE42F389D62B5D9196D4
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                            • Instruction ID: 1a9104bdc18b99a6bc3a57d880f0b00b8efb4b2948f4f82757f4a36a4691901f
                                                            • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                            • Instruction Fuzzy Hash: 8DD18E73D1E9B30A8735812D80682ABEE62AFD175031EC3E2DCE42F389D72B5D9195D4
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                            • Instruction ID: 29e0c2194e43b481a6c61040bafb45c2199937250b84d4f9493dc4b244529513
                                                            • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                            • Instruction Fuzzy Hash: 24C16E73C0E9B30A8736812D81685ABEE62AFD175031FC3A2DCE42F389D36B5D9195D4
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                            • Instruction ID: 2db7ca3506525dcc090db9a2522c638e963424884ad3e69ae6d01f57f6380b46
                                                            • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                            • Instruction Fuzzy Hash: 7AC17173D0E9B3068735812E84686ABEE62AFD175031FC3E29CE42F389D32B5D9495D4
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74c5e34f9abefec6387e3142de93532e06a17bc948433487153fd85e66a9dea7
                                                            • Instruction ID: 3d3811311c0e96151038b15cdb33c9c3baef1538c920ea216c41a1bce0e780a6
                                                            • Opcode Fuzzy Hash: 74c5e34f9abefec6387e3142de93532e06a17bc948433487153fd85e66a9dea7
                                                            • Instruction Fuzzy Hash: DC812731600644ABDB14EF29C590BFD73A5EB92318F20842FE9569B2C2C77CD9C2CB59
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 10288e97197f0ad943ca35c4742294250ec2590f5ea2a5543df369fbf88b7a0a
                                                            • Instruction ID: 755fc568a246bd0a3aab6df15388740ae6706893d1001b075bd9344283f82762
                                                            • Opcode Fuzzy Hash: 10288e97197f0ad943ca35c4742294250ec2590f5ea2a5543df369fbf88b7a0a
                                                            • Instruction Fuzzy Hash: FFC151B48182D9AECF01DFA5D4A09FEBFF4AF1A240B0950DAE5D5A7252C234D720DB64
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e054519032d673b283cd141de9047936413c4ec94c95275afdf7b1c1e6e7c11b
                                                            • Instruction ID: cc05d4957c3f93bbff5645bcbd2bf23a73745bdaee5f26767fd414b38deba9ac
                                                            • Opcode Fuzzy Hash: e054519032d673b283cd141de9047936413c4ec94c95275afdf7b1c1e6e7c11b
                                                            • Instruction Fuzzy Hash: 7281E35220E2E18EE71AC73C14E96F63FA11F72100B2EA2EEC4CD4F6D7D665051AD729
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aae54acdac3927cc066ee4afd89015ce1ad81bcf754d871dab6d471837bf2d3e
                                                            • Instruction ID: ff0af43037c4d522a8ee791cbe8e93d8d44487ff0532052a3f1666816209b0e9
                                                            • Opcode Fuzzy Hash: aae54acdac3927cc066ee4afd89015ce1ad81bcf754d871dab6d471837bf2d3e
                                                            • Instruction Fuzzy Hash: CF51F874804298AACF11CFA4C4D05FDBFB0EF5A328F6955BFD8857B282C2356646CB94
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51b2d21a1de5244f25583c5063fbcf28c6649e746e5830653507aa8b0461497a
                                                            • Instruction ID: 1b781f1f23d015917a337ea3c6206954a5313e6084e2437016288461132a8366
                                                            • Opcode Fuzzy Hash: 51b2d21a1de5244f25583c5063fbcf28c6649e746e5830653507aa8b0461497a
                                                            • Instruction Fuzzy Hash: EF312372A10605ABCB04DF38C4912DEBBE2EF81308F14812FD865DB782D37DA945CB94
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 866ee34adc6fec30ee19582cd252525266032b464ccb2f20f1e66a817629a287
                                                            • Instruction ID: 2ccb413243c8e3f3810094ea986113c02d7a387cc67c693c5ca68079d889c8bb
                                                            • Opcode Fuzzy Hash: 866ee34adc6fec30ee19582cd252525266032b464ccb2f20f1e66a817629a287
                                                            • Instruction Fuzzy Hash: 2821D872A106716BD7048F65EC8412733A2D7CA3617DB4237DF445B3B1D135B922CAE8
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy_wcslen_wcsncpy
                                                            • String ID: UNC$\\?\
                                                            • API String ID: 677062453-253988292
                                                            • Opcode ID: 2abde0defb8e8217f0e08e38dadbd9202aa69e0edf90a9fc0407522747aefdaa
                                                            • Instruction ID: cd13f9bd72fca169d524aa050727d65a10ef4dcd9f377a8cbe6755f4863ba3db
                                                            • Opcode Fuzzy Hash: 2abde0defb8e8217f0e08e38dadbd9202aa69e0edf90a9fc0407522747aefdaa
                                                            • Instruction Fuzzy Hash: 7441AF7294131476DB20AA618C82AEB33687F55748F04442FF954732C2E7BCD6A586AB
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 0041979F
                                                            • _malloc.LIBCMT ref: 004197AC
                                                              • Part of subcall function 0041CF3E: __FF_MSGBANNER.LIBCMT ref: 0041CF61
                                                              • Part of subcall function 0041CF3E: __NMSG_WRITE.LIBCMT ref: 0041CF68
                                                              • Part of subcall function 0041CF3E: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,004212F4,00000000,00000001,00000000,?,0041EF2D,00000018,0042D930,0000000C,0041EFBE), ref: 0041CFB5
                                                            • _wcscpy.LIBCMT ref: 004197C5
                                                            • _wcscat.LIBCMT ref: 004197D0
                                                            • _wcscat.LIBCMT ref: 004197DB
                                                            • _wcscat.LIBCMT ref: 00419816
                                                            • _wcscat.LIBCMT ref: 00419827
                                                            • _wcslen.LIBCMT ref: 00419840
                                                            • GlobalAlloc.KERNEL32(00000040,-00000009,?,<html>,00000006), ref: 00419851
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000106,00000000,00000000), ref: 00419872
                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,00000000), ref: 0041989A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcscat$Global_wcslen$AllocAllocateByteCharCreateHeapMultiStreamWide_malloc_wcscpy
                                                            • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                            • API String ID: 4158105118-4209811716
                                                            • Opcode ID: b13132087b6157768e62f45c8a46c0f1663856c825173c1b80b74b9a5b241520
                                                            • Instruction ID: 9750a07ada00fadd6417d4a808c8c0194c88b3581ecb1a923ba5d07fa5d26e01
                                                            • Opcode Fuzzy Hash: b13132087b6157768e62f45c8a46c0f1663856c825173c1b80b74b9a5b241520
                                                            • Instruction Fuzzy Hash: 1C312A32900205BBDB11BB659C95EEF77789F42724F14415FF810AB2C6DB7C8E81836A
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 0040E489
                                                            • _memset.LIBCMT ref: 0040E4A4
                                                            • ShellExecuteExW.SHELL32(?), ref: 0040E59A
                                                            • IsWindowVisible.USER32(?), ref: 0040E5D3
                                                            • ShowWindow.USER32(?,00000000), ref: 0040E5E1
                                                            • WaitForInputIdle.USER32(?,000007D0), ref: 0040E5EF
                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 0040E60C
                                                            • CloseHandle.KERNEL32(?), ref: 0040E62B
                                                            • ShowWindow.USER32(?,00000001), ref: 0040E684
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Window$Show$CloseCodeExecuteExitHandleIdleInputProcessShellVisibleWait_memset_wcslen
                                                            • String ID: .exe$.inf$z(D
                                                            • API String ID: 3215649069-3601587883
                                                            • Opcode ID: bed88ef6189cab0bc2363a68129e730fc28d238946ac4723ee352b551c7a999f
                                                            • Instruction ID: 3e26098100528e53db86749210a7047ac1cc05a8490cbdb1dbf577081e62715c
                                                            • Opcode Fuzzy Hash: bed88ef6189cab0bc2363a68129e730fc28d238946ac4723ee352b551c7a999f
                                                            • Instruction Fuzzy Hash: 8051B571910258BADF31AFA2EC405AE7BB4EF11304F444C7BE841B72E1E77999A5CB09
                                                            APIs
                                                            • ShowWindow.USER32(?,00000000,00000000,?,?), ref: 00419AB7
                                                              • Part of subcall function 00419A36: LoadCursorW.USER32(00000000,00007F00), ref: 00419A6D
                                                              • Part of subcall function 00419A36: RegisterClassExW.USER32(00000030), ref: 00419A8E
                                                            • GetWindowRect.USER32(?,?), ref: 00419AD8
                                                            • GetParent.USER32(?), ref: 00419AEB
                                                            • MapWindowPoints.USER32(00000000,00000000), ref: 00419AF0
                                                            • DestroyWindow.USER32(?), ref: 00419AFE
                                                            • GetParent.USER32(?), ref: 00419B1C
                                                            • CreateWindowExW.USER32(00000000,RarHtmlClassName,00000000,40000000,?,?,?,?,00000000), ref: 00419B3B
                                                            • ShowWindow.USER32(?,00000005,?), ref: 00419B6D
                                                            • SetWindowTextW.USER32(?,00000000), ref: 00419B77
                                                            • ShowWindow.USER32(00000000,00000005), ref: 00419B8D
                                                            • UpdateWindow.USER32(?), ref: 00419B96
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Window$Show$Parent$ClassCreateCursorDestroyLoadPointsRectRegisterTextUpdate
                                                            • String ID: RarHtmlClassName
                                                            • API String ID: 3841971108-1658105358
                                                            • Opcode ID: 16e1c11b631fea3f24aabbe380a880f14a925712ab14143eb1e2f30964cb5bb4
                                                            • Instruction ID: a0655035169e6554100d25c4e6de203faa719369231219c5c88fda93c074337e
                                                            • Opcode Fuzzy Hash: 16e1c11b631fea3f24aabbe380a880f14a925712ab14143eb1e2f30964cb5bb4
                                                            • Instruction Fuzzy Hash: 0331B035600604EFCB319F65EC48EAFBBB9FF44700F10451AF91692260D735AD51DBA9
                                                            APIs
                                                            • _wcscpy.LIBCMT ref: 00405182
                                                            • _wcslen.LIBCMT ref: 0040518A
                                                            • _wcscpy.LIBCMT ref: 0040519A
                                                            • _wcslen.LIBCMT ref: 004051A0
                                                            • _wcscpy.LIBCMT ref: 004051B8
                                                            • _wcslen.LIBCMT ref: 004051BE
                                                            • _wcscpy.LIBCMT ref: 004051CD
                                                            • _wcslen.LIBCMT ref: 004051D3
                                                            • _memset.LIBCMT ref: 004051E8
                                                            • GetSaveFileNameW.COMDLG32(?,?,?,?,?,?,000000A2), ref: 00405234
                                                            • GetOpenFileNameW.COMDLG32(?,?,?,?,?,?,000000A2), ref: 0040523C
                                                            • CommDlgExtendedError.COMDLG32(?,?,?,?,?,000000A2), ref: 00405244
                                                            • GetSaveFileNameW.COMDLG32(?,?,?,?,?,?,000000A2), ref: 00405260
                                                            • GetOpenFileNameW.COMDLG32(?,?,?,?,?,?,000000A2), ref: 00405268
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: FileName_wcscpy_wcslen$OpenSave$CommErrorExtended_memset
                                                            • String ID:
                                                            • API String ID: 3496903968-0
                                                            • Opcode ID: 446a76bb310dad6e5806d0052d9e568853349a282fe8c87d623ef543e340e0f8
                                                            • Instruction ID: 017447a648ceccb586da1f31f92202068c03838f3088d87860c47b682a039f1a
                                                            • Opcode Fuzzy Hash: 446a76bb310dad6e5806d0052d9e568853349a282fe8c87d623ef543e340e0f8
                                                            • Instruction Fuzzy Hash: D531D775901618ABCB11AFA5DC45ACF7BB8EF04314F00002AF904B7281DB38DA958FAE
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 00419D17
                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00419D27
                                                            • CreateCompatibleDC.GDI32(?), ref: 00419D2E
                                                            • GetObjectW.GDI32(?,00000018,?), ref: 00419D3C
                                                            • CreateCompatibleBitmap.GDI32(?,00000200,00419EBD), ref: 00419D5E
                                                            • SelectObject.GDI32(00000000,?), ref: 00419D71
                                                            • SelectObject.GDI32(?,00000200), ref: 00419D7C
                                                            • StretchBlt.GDI32(?,00000000,00000000,00000200,00419EBD,00000000,00000000,00000000,?,?,00CC0020), ref: 00419D9A
                                                            • SelectObject.GDI32(00000000,?), ref: 00419DA4
                                                            • SelectObject.GDI32(?,00419EBD), ref: 00419DAC
                                                            • DeleteDC.GDI32(00000000), ref: 00419DB5
                                                            • DeleteDC.GDI32(?), ref: 00419DBA
                                                            • ReleaseDC.USER32(00000000,?), ref: 00419DC0
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Object$Select$CompatibleCreate$Delete$BitmapReleaseStretch
                                                            • String ID:
                                                            • API String ID: 3950507155-0
                                                            • Opcode ID: c5f4d7ef721d9f2cf6d28cde0393e927751e3943138dffdaa34ce4f2faff49d0
                                                            • Instruction ID: fe64683af8def945f8560e9c967618457674570685148338231d72a037962566
                                                            • Opcode Fuzzy Hash: c5f4d7ef721d9f2cf6d28cde0393e927751e3943138dffdaa34ce4f2faff49d0
                                                            • Instruction Fuzzy Hash: C021A076900218FFCF129FA1DC48DDEBFBAFB48350B104466F914A2120C7369A65EFA4
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0042D8A0,0000000C,0041E98F,00000000,00000000,?,0041FE78,0041A9BA,?,?,?,0041A9BA,00000000,?), ref: 0041E866
                                                            • __crt_waiting_on_module_handle.LIBCMT ref: 0041E871
                                                              • Part of subcall function 00421465: Sleep.KERNEL32(000003E8,00000000,?,0041E7B7,KERNEL32.DLL,?,0041E803,?,0041FE78,0041A9BA,?,?,?,0041A9BA,00000000,?), ref: 00421471
                                                              • Part of subcall function 00421465: GetModuleHandleW.KERNEL32(00000000,?,0041E7B7,KERNEL32.DLL,?,0041E803,?,0041FE78,0041A9BA,?,?,?,0041A9BA,00000000,?), ref: 0042147A
                                                            • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0041E89A
                                                            • GetProcAddress.KERNEL32(0041A9BA,DecodePointer), ref: 0041E8AA
                                                            • __lock.LIBCMT ref: 0041E8CC
                                                            • InterlockedIncrement.KERNEL32(?), ref: 0041E8D9
                                                            • __lock.LIBCMT ref: 0041E8ED
                                                            • ___addlocaleref.LIBCMT ref: 0041E90B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                            • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                            • API String ID: 1028249917-2843748187
                                                            • Opcode ID: d8a1d3b64ce03b740c9770e28a10d8a3d1cb693a8f1fd6d09f99049fe87b25f8
                                                            • Instruction ID: 28857185edf288c115030afddfc21b3ad53991f12277c54fa87cb1ac16e0dfb5
                                                            • Opcode Fuzzy Hash: d8a1d3b64ce03b740c9770e28a10d8a3d1cb693a8f1fd6d09f99049fe87b25f8
                                                            • Instruction Fuzzy Hash: 82119071A40701AFD720AF36D805B9EBBE0AF44314F60456FE8A997290CB78A981CF5D
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy$ChangeNotify_wcschr_wcsncpy
                                                            • String ID: "$.lnk
                                                            • API String ID: 1911921660-4024015082
                                                            • Opcode ID: bb3ca6cd81c2d3ad9077df71b8a1193f574709db9a1feafa84c70d00a6701fe0
                                                            • Instruction ID: e9d5912a6b4b3542aee3cadb88dbd3b5a863ff0206024957ce050cac0ef3000c
                                                            • Opcode Fuzzy Hash: bb3ca6cd81c2d3ad9077df71b8a1193f574709db9a1feafa84c70d00a6701fe0
                                                            • Instruction Fuzzy Hash: 5191227280022899DF35DBA5CC49EEEB37CBB44304F4405BBE509F7181EB789AD98B59
                                                            APIs
                                                            • GetTempPathW.KERNEL32(?,?), ref: 0040EEE6
                                                              • Part of subcall function 0040A116: _wcslen.LIBCMT ref: 0040A11C
                                                              • Part of subcall function 0040A116: _wcscat.LIBCMT ref: 0040A13B
                                                            • _swprintf.LIBCMT ref: 0040EF22
                                                              • Part of subcall function 0040BC16: __vswprintf_c_l.LIBCMT ref: 0040BC29
                                                            • SetDlgItemTextW.USER32(?,00000066,?), ref: 0040EF44
                                                            • _wcschr.LIBCMT ref: 0040EF77
                                                            • _wcscpy.LIBCMT ref: 0040EFBB
                                                            • _wcscpy.LIBCMT ref: 0040EFE4
                                                            • _wcscpy.LIBCMT ref: 0040EFF7
                                                            • MessageBoxW.USER32(?,00000000,00000000,00000024), ref: 0040F027
                                                            • EndDialog.USER32(?,00000001), ref: 0040F049
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy$DialogItemMessagePathTempText__vswprintf_c_l_swprintf_wcscat_wcschr_wcslen
                                                            • String ID: %s%s%d
                                                            • API String ID: 1897388972-1000756122
                                                            • Opcode ID: f75e7cfbeccc15e09081c60efc06442c44850a7c3c336a2ff36c1e07c701c860
                                                            • Instruction ID: 7c5ef0a1406295de31e953a15a9408ca88d5d0b5476cb7747de3243763a4baae
                                                            • Opcode Fuzzy Hash: f75e7cfbeccc15e09081c60efc06442c44850a7c3c336a2ff36c1e07c701c860
                                                            • Instruction Fuzzy Hash: 325176728001199BDB21DF61DC44BEE77B8FB04308F0445BBEA09E7191E7789AE98F59
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 004191E3
                                                            • _malloc.LIBCMT ref: 004191F1
                                                              • Part of subcall function 0041CF3E: __FF_MSGBANNER.LIBCMT ref: 0041CF61
                                                              • Part of subcall function 0041CF3E: __NMSG_WRITE.LIBCMT ref: 0041CF68
                                                              • Part of subcall function 0041CF3E: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,004212F4,00000000,00000001,00000000,?,0041EF2D,00000018,0042D930,0000000C,0041EFBE), ref: 0041CFB5
                                                            • _wcscpy.LIBCMT ref: 0041920F
                                                            • _wcslen.LIBCMT ref: 00419215
                                                            • _wcscpy.LIBCMT ref: 0041925D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy_wcslen$AllocateHeap_malloc
                                                            • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                            • API String ID: 2405444336-406990186
                                                            • Opcode ID: ef4270a2c62554232e7dcaf25c2b62ab2229b7f12839ff23f0a1ced700b27f0b
                                                            • Instruction ID: 0e02d37120f5dc5c9773bcbd7ae744d1444ccd80410fa70afd17435bf81929d8
                                                            • Opcode Fuzzy Hash: ef4270a2c62554232e7dcaf25c2b62ab2229b7f12839ff23f0a1ced700b27f0b
                                                            • Instruction Fuzzy Hash: BF21FB76904304BBDB20AB54DC41ADAB3B4EF45314B20445BE455A7390E7BC9ED1839E
                                                            APIs
                                                            • SendMessageW.USER32(?,00000080,00000001,?), ref: 0040F4E4
                                                            • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0040F4F9
                                                            • GetDlgItem.USER32(?,00000065), ref: 0040F508
                                                            • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0040F51D
                                                            • GetSysColor.USER32(0000000F), ref: 0040F521
                                                            • SendMessageW.USER32(?,00000443,00000000,00000000), ref: 0040F531
                                                            • SetForegroundWindow.USER32(?), ref: 0040F54B
                                                            • EndDialog.USER32(?,00000001), ref: 0040F57E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Item$ColorDialogForegroundWindow
                                                            • String ID: LICENSEDLG
                                                            • API String ID: 3794146707-2177901306
                                                            • Opcode ID: d29b6d15fe2784098a0e22a55afb32f4fb9deba78a5e36aabb146d1ab528ff85
                                                            • Instruction ID: 7fefae372e04e04a7da23b2667bfd905224a5402d39c62195e2e2b0091848963
                                                            • Opcode Fuzzy Hash: d29b6d15fe2784098a0e22a55afb32f4fb9deba78a5e36aabb146d1ab528ff85
                                                            • Instruction Fuzzy Hash: E521F9312002047BDB31AF61EC45E5B3B6DEB89B10F408436FE15B51E2D6798955CB2C
                                                            APIs
                                                            • GetWindow.USER32(?,00000005), ref: 0040DBE1
                                                            • GetClassNameW.USER32(00000000,?,00000800), ref: 0040DC1A
                                                              • Part of subcall function 00411E60: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,00000000,000000FF,00409CA8,?,00000000,?,00409DC2,00000000,-00000002,?,00000000,?), ref: 00411E76
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0040DC38
                                                            • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0040DC4F
                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 0040DC5E
                                                              • Part of subcall function 00419E13: GetDC.USER32(00000000), ref: 00419E1F
                                                              • Part of subcall function 00419E13: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00419E2E
                                                              • Part of subcall function 00419E13: ReleaseDC.USER32(00000000,00000000), ref: 00419E3C
                                                              • Part of subcall function 00419DD0: GetDC.USER32(00000000), ref: 00419DDC
                                                              • Part of subcall function 00419DD0: GetDeviceCaps.GDI32(00000000,00000058), ref: 00419DEB
                                                              • Part of subcall function 00419DD0: ReleaseDC.USER32(00000000,00000000), ref: 00419DF9
                                                            • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0040DC85
                                                            • DeleteObject.GDI32(00000000), ref: 0040DC90
                                                            • GetWindow.USER32(00000000,00000002), ref: 0040DC99
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                                                            • String ID: STATIC
                                                            • API String ID: 1444658586-1882779555
                                                            • Opcode ID: 9567939a25e22092ccbfb99d506bbc14daa15c8c25c728e04901b5a25124ff52
                                                            • Instruction ID: 65505d2462e9bd66d8f24c48bff8a2f322d46b7930d969d63ebb67ecbc3f0dac
                                                            • Opcode Fuzzy Hash: 9567939a25e22092ccbfb99d506bbc14daa15c8c25c728e04901b5a25124ff52
                                                            • Instruction Fuzzy Hash: B321F132A40204BBEB21AB90CC46FEF77B8AF41B50F404026FD04B61C1CBB89D86D66D
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _strlen$_swprintf_wcschr_wcscpy_wcsncpy_wcsrchr
                                                            • String ID: %08x
                                                            • API String ID: 3224783807-3682738293
                                                            • Opcode ID: 2200e9e523ffbcd5ccc4f85804e7305beb7f218704d283e0c38cbcae486b8257
                                                            • Instruction ID: 07d0537aec3a1dd66ebb0c57739ff8632de72c66deae5d09d2d4ff76284a4df6
                                                            • Opcode Fuzzy Hash: 2200e9e523ffbcd5ccc4f85804e7305beb7f218704d283e0c38cbcae486b8257
                                                            • Instruction Fuzzy Hash: 4841E832500219AADB24AB64CC85AFF32ACDF40754F54413BB915E71C1DB7DDD80C6AE
                                                            APIs
                                                              • Part of subcall function 0040A76A: _wcsrchr.LIBCMT ref: 0040A77E
                                                            • _wcslen.LIBCMT ref: 0040A8D7
                                                            • _wcscpy.LIBCMT ref: 0040A90C
                                                              • Part of subcall function 00410BC9: _wcslen.LIBCMT ref: 00410BCF
                                                              • Part of subcall function 00410BC9: _wcsncat.LIBCMT ref: 00410BE8
                                                            • _wcslen.LIBCMT ref: 0040A94C
                                                            • _wcscpy.LIBCMT ref: 0040A9BE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$_wcscpy$_wcsncat_wcsrchr
                                                            • String ID: .rar$exe$rar$sfx
                                                            • API String ID: 1023950463-630704357
                                                            • Opcode ID: 9e98728e43a4f5731da7381b6b017391db5884caad39c64eb22fb19538172cba
                                                            • Instruction ID: 29a0ca65efafee0ddffcc544de8f71498ac5d95f7ded716494b7ad5447c572c4
                                                            • Opcode Fuzzy Hash: 9e98728e43a4f5731da7381b6b017391db5884caad39c64eb22fb19538172cba
                                                            • Instruction Fuzzy Hash: 233106B170431056C3206B259C46A7B63A8DF05794B264C3BF882BB1E1E77C98E2925F
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00419654
                                                            • GetTickCount.KERNEL32 ref: 0041966F
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00419683
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00419694
                                                            • TranslateMessage.USER32(?), ref: 0041969E
                                                            • DispatchMessageW.USER32(?), ref: 004196A8
                                                            • SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000204,?), ref: 00419748
                                                            • ShowWindow.USER32(?,00000005), ref: 00419753
                                                            • SetWindowTextW.USER32(?,00000000), ref: 0041975D
                                                              • Part of subcall function 0041A506: __lock.LIBCMT ref: 0041A524
                                                              • Part of subcall function 0041A506: ___sbh_find_block.LIBCMT ref: 0041A52F
                                                              • Part of subcall function 0041A506: ___sbh_free_block.LIBCMT ref: 0041A53E
                                                              • Part of subcall function 0041A506: RtlFreeHeap.NTDLL(00000000,00000000,0042D658,0000000C,0041EF84,00000000,0042D930,0000000C,0041EFBE,00000000,0041A9AB,?,00425448,00000004,0042DB18,0000000C), ref: 0041A56E
                                                              • Part of subcall function 0041A506: GetLastError.KERNEL32(?,00425448,00000004,0042DB18,0000000C,0042133E,00000000,0041A9BA,00000000,00000000,00000000,?,0041E966,00000001,00000214), ref: 0041A57F
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Message$Window$CountTick$DispatchErrorFreeHeapLastPeekShowTextTranslate___sbh_find_block___sbh_free_block__lock
                                                            • String ID:
                                                            • API String ID: 1762286965-0
                                                            • Opcode ID: 748e2987246eabe4ea9cf9adf1aa4bbad94aab04b0c2a3b2d0d409a63cb1e23e
                                                            • Instruction ID: 0fcf3197ed2ac79a16e8f935243f891c0de6f754acb5965f6be033bd159a0870
                                                            • Opcode Fuzzy Hash: 748e2987246eabe4ea9cf9adf1aa4bbad94aab04b0c2a3b2d0d409a63cb1e23e
                                                            • Instruction Fuzzy Hash: F4412871A00219EFCB10EFA5C8989DEBB79FF49751B10846AF905D7250D738DE81CBA4
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 004084F3
                                                            • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00408516
                                                            • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00408535
                                                              • Part of subcall function 0040A5DB: _wcslen.LIBCMT ref: 0040A5E1
                                                              • Part of subcall function 00411E60: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,00000000,000000FF,00409CA8,?,00000000,?,00409DC2,00000000,-00000002,?,00000000,?), ref: 00411E76
                                                            • _swprintf.LIBCMT ref: 004085CD
                                                              • Part of subcall function 0040BC16: __vswprintf_c_l.LIBCMT ref: 0040BC29
                                                            • MoveFileW.KERNEL32(?,00000000), ref: 00408639
                                                            • MoveFileW.KERNEL32(00000000,?), ref: 0040867C
                                                              • Part of subcall function 00410B9C: _wcsncpy.LIBCMT ref: 00410BB3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen_wcsncpy
                                                            • String ID: rtmp%d
                                                            • API String ID: 506780119-3303766350
                                                            • Opcode ID: a91559be58acffd0dc5b452dff065d579de74766ff3e95af3a762548e6537785
                                                            • Instruction ID: 086441498323e4bc326e09acd5d1366d0aff3811eaae5beb392a373780c828d6
                                                            • Opcode Fuzzy Hash: a91559be58acffd0dc5b452dff065d579de74766ff3e95af3a762548e6537785
                                                            • Instruction Fuzzy Hash: DE415E71901218AACB20EB61CE45EDF777CAF00394F0008ABB585B7181EA7D9B959E68
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcschr$__vswprintf_c_l_swprintf_wcsncpy
                                                            • String ID: %c:\$%s.%d.tmp
                                                            • API String ID: 2474501127-1021493711
                                                            • Opcode ID: da4b65786035d2197ed7d49f53fcd311549ea47fe36f06ac93baee63d6beaa20
                                                            • Instruction ID: b4756b8e91951cb7d51e69898c9cc4431ccaeceaeab60524178106c8bdd82eb4
                                                            • Opcode Fuzzy Hash: da4b65786035d2197ed7d49f53fcd311549ea47fe36f06ac93baee63d6beaa20
                                                            • Instruction Fuzzy Hash: 8101042320431169DA20EB769C45C6B73ACDFD93A0B00883FF584E31C1EA78D4A0C27B
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 004192E2
                                                            • GetTickCount.KERNEL32 ref: 004192E7
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00419316
                                                            • TranslateMessage.USER32(?), ref: 00419324
                                                            • DispatchMessageW.USER32(?), ref: 0041932E
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0041933B
                                                            • GetTickCount.KERNEL32 ref: 00419341
                                                            • VariantInit.OLEAUT32(?), ref: 0041934E
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Message$CountTick$DispatchInitPeekTranslateVariant
                                                            • String ID:
                                                            • API String ID: 4242828014-0
                                                            • Opcode ID: 3739eaef324a12835188418d8e4db8062592f3b82a480bdb7c4c47042269d501
                                                            • Instruction ID: 9cb0af2a0f3e63d9aa0a53d062aebc77c377528e3d470f830326fa06e80cb38f
                                                            • Opcode Fuzzy Hash: 3739eaef324a12835188418d8e4db8062592f3b82a480bdb7c4c47042269d501
                                                            • Instruction Fuzzy Hash: C121F7B1E00208AFDB10DFE4D888EEEBBBCEF48305F504866F911E7250D6799E458B61
                                                            APIs
                                                              • Part of subcall function 00419E75: GetDC.USER32(00000000), ref: 00419E79
                                                              • Part of subcall function 00419E75: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00419E84
                                                              • Part of subcall function 00419E75: ReleaseDC.USER32(00000000,00000000), ref: 00419E8F
                                                            • GetObjectW.GDI32(00000200,00000018,?), ref: 00419ECD
                                                            • CoCreateInstance.OLE32(0042B208,00000000,00000001,0042B100,?,00000000,?), ref: 00419EFD
                                                              • Part of subcall function 00419D0B: GetDC.USER32(00000000), ref: 00419D17
                                                              • Part of subcall function 00419D0B: CreateCompatibleDC.GDI32(00000000), ref: 00419D27
                                                              • Part of subcall function 00419D0B: CreateCompatibleDC.GDI32(?), ref: 00419D2E
                                                              • Part of subcall function 00419D0B: GetObjectW.GDI32(?,00000018,?), ref: 00419D3C
                                                              • Part of subcall function 00419D0B: CreateCompatibleBitmap.GDI32(?,00000200,00419EBD), ref: 00419D5E
                                                              • Part of subcall function 00419D0B: SelectObject.GDI32(00000000,?), ref: 00419D71
                                                              • Part of subcall function 00419D0B: SelectObject.GDI32(?,00000200), ref: 00419D7C
                                                              • Part of subcall function 00419D0B: StretchBlt.GDI32(?,00000000,00000000,00000200,00419EBD,00000000,00000000,00000000,?,?,00CC0020), ref: 00419D9A
                                                              • Part of subcall function 00419D0B: SelectObject.GDI32(00000000,?), ref: 00419DA4
                                                              • Part of subcall function 00419D0B: SelectObject.GDI32(?,00419EBD), ref: 00419DAC
                                                              • Part of subcall function 00419D0B: DeleteDC.GDI32(00000000), ref: 00419DB5
                                                              • Part of subcall function 00419D0B: DeleteDC.GDI32(?), ref: 00419DBA
                                                              • Part of subcall function 00419D0B: ReleaseDC.USER32(00000000,?), ref: 00419DC0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Object$CreateSelect$Compatible$DeleteRelease$BitmapCapsDeviceInstanceStretch
                                                            • String ID: (
                                                            • API String ID: 189428636-3887548279
                                                            • Opcode ID: 2c95d850f981d7af9c5ed3b9bf4fae1c522e7595f6c5569b0b0a1ef1f992ee39
                                                            • Instruction ID: d8cf3f11634150c5eb1370622c6fe0712570af28e2ae67cdae83cea958a68594
                                                            • Opcode Fuzzy Hash: 2c95d850f981d7af9c5ed3b9bf4fae1c522e7595f6c5569b0b0a1ef1f992ee39
                                                            • Instruction Fuzzy Hash: 21610875A00209EFCB00DFA5D888EEEBBB9FF89704B10845AF815EB250D7759E51CB64
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 00419489
                                                            • _malloc.LIBCMT ref: 00419493
                                                              • Part of subcall function 0041CF3E: __FF_MSGBANNER.LIBCMT ref: 0041CF61
                                                              • Part of subcall function 0041CF3E: __NMSG_WRITE.LIBCMT ref: 0041CF68
                                                              • Part of subcall function 0041CF3E: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,004212F4,00000000,00000001,00000000,?,0041EF2D,00000018,0042D930,0000000C,0041EFBE), ref: 0041CFB5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap_malloc_wcslen
                                                            • String ID: </p>$</style>$<br>$<style>
                                                            • API String ID: 4208083856-1200123991
                                                            • Opcode ID: 84057df06bfe7753af8be449b5ed96cf61f8b1a65555f0712547b90151fa4e6f
                                                            • Instruction ID: 25e48dc46573b9320602deb0b34776bf62bfe2b29788b043e296d39cf0375d11
                                                            • Opcode Fuzzy Hash: 84057df06bfe7753af8be449b5ed96cf61f8b1a65555f0712547b90151fa4e6f
                                                            • Instruction Fuzzy Hash: 69412477645212B5DB315B1998217FA73A69F01754F68401BED81B32C0E76C8EC2C26D
                                                            APIs
                                                              • Part of subcall function 00409C06: GetVersionExW.KERNEL32(?), ref: 00409C2B
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?,?,?), ref: 00411425
                                                            • FileTimeToSystemTime.KERNEL32(?,?,?,?), ref: 00411435
                                                            • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00411441
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 0041144F
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00411459
                                                            • FileTimeToSystemTime.KERNEL32(?,?,?,00000000,00000000,00000001), ref: 004114A6
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00411523
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Time$File$System$Local$SpecificVersion
                                                            • String ID:
                                                            • API String ID: 2092733347-0
                                                            • Opcode ID: b334752188d409053c41308d043ef773f1ba1375d33674074c65fffa3be1e0d1
                                                            • Instruction ID: 2321c29e0176793db35fe244bdb3b2ca835dfa759224b44d16608c614d02fbda
                                                            • Opcode Fuzzy Hash: b334752188d409053c41308d043ef773f1ba1375d33674074c65fffa3be1e0d1
                                                            • Instruction Fuzzy Hash: 40410AB1E00218AFCB14DFA9C8849EEB7F9FF48314B14852FE946E7240D778A945CB64
                                                            APIs
                                                            • _malloc.LIBCMT ref: 0040D941
                                                              • Part of subcall function 0041CF3E: __FF_MSGBANNER.LIBCMT ref: 0041CF61
                                                              • Part of subcall function 0041CF3E: __NMSG_WRITE.LIBCMT ref: 0041CF68
                                                              • Part of subcall function 0041CF3E: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,004212F4,00000000,00000001,00000000,?,0041EF2D,00000018,0042D930,0000000C,0041EFBE), ref: 0041CFB5
                                                            • _wcslen.LIBCMT ref: 0040D981
                                                            • _wcscat.LIBCMT ref: 0040D998
                                                            • _wcslen.LIBCMT ref: 0040D99E
                                                            • _wcscpy.LIBCMT ref: 0040D9CC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$AllocateHeap_malloc_wcscat_wcscpy
                                                            • String ID: }
                                                            • API String ID: 2020890722-4239843852
                                                            • Opcode ID: 87a1d4075c0fbabaaf42ee75a1288eb88e4c448287557cbd43c96a9187b86b14
                                                            • Instruction ID: a9b9a9eb170ff11f00d7125a4cd00596761e48c06437fb6caf1dcbb108c8f9f0
                                                            • Opcode Fuzzy Hash: 87a1d4075c0fbabaaf42ee75a1288eb88e4c448287557cbd43c96a9187b86b14
                                                            • Instruction Fuzzy Hash: 6111B771D0131A59EB25ABE08CC57DB72B8DF00354F10007BE645E22D1EBBC9A99C39D
                                                            APIs
                                                            • SystemTimeToFileTime.KERNEL32(?,004116A7,?,?), ref: 00411592
                                                            • LocalFileTimeToFileTime.KERNEL32(004116A7,?), ref: 004115BE
                                                            • FileTimeToSystemTime.KERNEL32(004116A7,?), ref: 004115D4
                                                            • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 004115E4
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 004115F2
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 004115FC
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Time$File$System$Local$Specific
                                                            • String ID:
                                                            • API String ID: 3144155402-0
                                                            • Opcode ID: f90245df41cc322dafe52bf530a12eef1bc8a67292351d8d3269b2ac88901438
                                                            • Instruction ID: daaaa78088cd12f13caf2716ff388f37494b9d87aa27411613d97d80370a29eb
                                                            • Opcode Fuzzy Hash: f90245df41cc322dafe52bf530a12eef1bc8a67292351d8d3269b2ac88901438
                                                            • Instruction Fuzzy Hash: 92313276D001199BCB14DFD4C840AEFB7B9FF48710F04452AE946E3250E634A945CBA9
                                                            APIs
                                                            • __CreateFrameInfo.LIBCMT ref: 0041DDAD
                                                              • Part of subcall function 0041A3D6: __getptd.LIBCMT ref: 0041A3E4
                                                              • Part of subcall function 0041A3D6: __getptd.LIBCMT ref: 0041A3F2
                                                            • __getptd.LIBCMT ref: 0041DDB7
                                                              • Part of subcall function 0041E9B4: __getptd_noexit.LIBCMT ref: 0041E9B7
                                                              • Part of subcall function 0041E9B4: __amsg_exit.LIBCMT ref: 0041E9C4
                                                            • __getptd.LIBCMT ref: 0041DDC5
                                                            • __getptd.LIBCMT ref: 0041DDD3
                                                            • __getptd.LIBCMT ref: 0041DDDE
                                                            • _CallCatchBlock2.LIBCMT ref: 0041DE04
                                                              • Part of subcall function 0041A47B: __CallSettingFrame@12.LIBCMT ref: 0041A4C7
                                                              • Part of subcall function 0041DEAB: __getptd.LIBCMT ref: 0041DEBA
                                                              • Part of subcall function 0041DEAB: __getptd.LIBCMT ref: 0041DEC8
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                            • String ID:
                                                            • API String ID: 1602911419-0
                                                            • Opcode ID: 5eb10d2cb4eb5e2da6c5453d1fe4c56248c4e16d68a7da2668f442ad0aab7930
                                                            • Instruction ID: e3df1943845817192d3dafa627097d3dc4affc0cfff12b6418408f9c93a4c95a
                                                            • Opcode Fuzzy Hash: 5eb10d2cb4eb5e2da6c5453d1fe4c56248c4e16d68a7da2668f442ad0aab7930
                                                            • Instruction Fuzzy Hash: 9E1126B1D00209DFDF00EFA1C445AED7BB0FF04318F10806AF854AB251DB389A519B59
                                                            APIs
                                                            • CharUpperW.USER32(?,?,?,?,00000400), ref: 0040D6AC
                                                            • CharUpperW.USER32(?,?,?,?,?,00000400), ref: 0040D6D3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CharUpper
                                                            • String ID: -$z8D
                                                            • API String ID: 9403516-4016828469
                                                            • Opcode ID: 6e6643a8c5453ab08bb62a8daeba662149a01c951e73f69a55f52de3d79d5015
                                                            • Instruction ID: 6cb870ea5eaa954c7fe556a8e422e29c236d8a0fbf71e72dd1f5d8a9bc66e192
                                                            • Opcode Fuzzy Hash: 6e6643a8c5453ab08bb62a8daeba662149a01c951e73f69a55f52de3d79d5015
                                                            • Instruction Fuzzy Hash: FE21A5B9C0011995DB60B7E98D48BBB66A8FB41304F144177E548B32D2EA7CDECC8B6D
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0040680F
                                                              • Part of subcall function 00402C8B: __EH_prolog.LIBCMT ref: 00402C90
                                                            • SetFileSecurityW.ADVAPI32(00000000,00000007,?,?,?,?,00000000,?,00406EF5,?,?,?,?,0040773A,?,?), ref: 00406897
                                                            • SetFileSecurityW.ADVAPI32(?,00000007,?,00000000,?,00000800,?,0040773A,?,?,?,?,?,00000000,0040839C,?), ref: 004068BE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: FileH_prologSecurity
                                                            • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                            • API String ID: 2167059215-639343689
                                                            • Opcode ID: 72cefa14781493d3ceb14cba897e291cfc2eee12fd1132a67d2d49c664862da8
                                                            • Instruction ID: e80266907105dbdc6ea336272c15ef3f26093cba4c1f52b7c6092cd65192489b
                                                            • Opcode Fuzzy Hash: 72cefa14781493d3ceb14cba897e291cfc2eee12fd1132a67d2d49c664862da8
                                                            • Instruction Fuzzy Hash: 8D219372901259BEDF21AF55DC01BAF77689B04758F00803BF802B62C1C7BC8A559BAD
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 0040E1E8
                                                            • DialogBoxParamW.USER32(GETPASSWORD1,?,0040D477,?,00000007), ref: 0040E22C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: DialogParamVisibleWindow
                                                            • String ID: GETPASSWORD1$z8D$z8D
                                                            • API String ID: 3157717868-3779298832
                                                            • Opcode ID: 8a5930b9f1bd4a7920270691445133db6bb9d1af5357342886f90841ecad1a96
                                                            • Instruction ID: 2ec29a5f94ea44b227bd1a9c17bea14e87d691145e51ce1093468d312523c58d
                                                            • Opcode Fuzzy Hash: 8a5930b9f1bd4a7920270691445133db6bb9d1af5357342886f90841ecad1a96
                                                            • Instruction Fuzzy Hash: B71159717002445BEB21DF62AC80B973B99AB08765F08007BFD446B2D1C7BC8CA0C76D
                                                            APIs
                                                            • EndDialog.USER32(?,00000001), ref: 0040D431
                                                            • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 0040D447
                                                            • SetDlgItemTextW.USER32(?,00000065,?), ref: 0040D461
                                                            • SetDlgItemTextW.USER32(?,00000066), ref: 0040D46C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ItemText$Dialog
                                                            • String ID: RENAMEDLG
                                                            • API String ID: 1770891597-3299779563
                                                            • Opcode ID: 762bcebfea9f2beca08e3ffb6bbc5115bfac0753acb3b7587415e25b8287d6f5
                                                            • Instruction ID: a809f9c23db95260371581c6ee5cd384337b37eb9584205a8113e0e6bfd29c9a
                                                            • Opcode Fuzzy Hash: 762bcebfea9f2beca08e3ffb6bbc5115bfac0753acb3b7587415e25b8287d6f5
                                                            • Instruction Fuzzy Hash: 6F01D836A4421877DB205F949C41FBB3B69E705F50F544036FA01B61D0C6BAA8269BAE
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset$H_prolog
                                                            • String ID: r
                                                            • API String ID: 3013590873-3291565091
                                                            • Opcode ID: adb95f05f7a194937a5df8f484bb6bf36145664ded8c6b0a2324601c3f7e7fd4
                                                            • Instruction ID: fcb346f71e1c6521d09fa93fcec7134e0802dca7d1a5d7d76298086db4932847
                                                            • Opcode Fuzzy Hash: adb95f05f7a194937a5df8f484bb6bf36145664ded8c6b0a2324601c3f7e7fd4
                                                            • Instruction Fuzzy Hash: 880144B17417407AD220EB669C46FEBBAA8DB85B18F00041FB255661C2C7FC5941CA9D
                                                            APIs
                                                            • __getptd.LIBCMT ref: 0041DAEE
                                                              • Part of subcall function 0041E9B4: __getptd_noexit.LIBCMT ref: 0041E9B7
                                                              • Part of subcall function 0041E9B4: __amsg_exit.LIBCMT ref: 0041E9C4
                                                            • __getptd.LIBCMT ref: 0041DAFF
                                                            • __getptd.LIBCMT ref: 0041DB0D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: __getptd$__amsg_exit__getptd_noexit
                                                            • String ID: MOC$csm
                                                            • API String ID: 803148776-1389381023
                                                            • Opcode ID: ff76af2ab1f2bc655f60c8d28124db9f091a0a07b538bc98cf4441336e04e070
                                                            • Instruction ID: 7ce874268d128f0e9cc5e4e4439fd54cca852ebc00a18d755191ea46e2ae681e
                                                            • Opcode Fuzzy Hash: ff76af2ab1f2bc655f60c8d28124db9f091a0a07b538bc98cf4441336e04e070
                                                            • Instruction Fuzzy Hash: 8EE048755141048FDB50976AC445FA93394EB48318F1504A7E80CC7353D77CE8C0558B
                                                            APIs
                                                            • __getptd.LIBCMT ref: 00421BB3
                                                              • Part of subcall function 0041E9B4: __getptd_noexit.LIBCMT ref: 0041E9B7
                                                              • Part of subcall function 0041E9B4: __amsg_exit.LIBCMT ref: 0041E9C4
                                                            • __amsg_exit.LIBCMT ref: 00421BD3
                                                            • __lock.LIBCMT ref: 00421BE3
                                                            • InterlockedDecrement.KERNEL32(?), ref: 00421C00
                                                            • InterlockedIncrement.KERNEL32(023216A0), ref: 00421C2B
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                            • String ID:
                                                            • API String ID: 4271482742-0
                                                            • Opcode ID: c07a23924f397adfee97157b358641d3c25638586169e8846753b2e06e7a59ec
                                                            • Instruction ID: 6d4d6cab2ca80c9586acdc371c3e58b42f7918e3e726cea937426c24952e9619
                                                            • Opcode Fuzzy Hash: c07a23924f397adfee97157b358641d3c25638586169e8846753b2e06e7a59ec
                                                            • Instruction Fuzzy Hash: 8401C439B40731ABC728AF56A40679E7760BF10724F94012BE804AB3A1CB3C6991DBDD
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 00411E89
                                                            • _wcslen.LIBCMT ref: 00411E9A
                                                            • _wcslen.LIBCMT ref: 00411EAA
                                                            • _wcslen.LIBCMT ref: 00411EB8
                                                            • CompareStringW.KERNEL32(00000400,00001001,?,?,00000000,?,?,00000000,?,00409F60,__rar_,00000000,00000006,00000000,?,00000800), ref: 00411ED5
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$CompareString
                                                            • String ID:
                                                            • API String ID: 3397213944-0
                                                            • Opcode ID: a78696411e0fb58170a85e42f91a72465e9b1cb7d1a352a10a0ff52bf1fcbbb8
                                                            • Instruction ID: fd224344e63f22d7e065bf6fa160c6ce473b51916626f6dd2966927fcf662de7
                                                            • Opcode Fuzzy Hash: a78696411e0fb58170a85e42f91a72465e9b1cb7d1a352a10a0ff52bf1fcbbb8
                                                            • Instruction Fuzzy Hash: 5FF02436148148BFDF126F92EC01CDE3F26DB81375B244027FE298A0A0D635C9A29789
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _swprintf
                                                            • String ID: ;%u
                                                            • API String ID: 589789837-535004727
                                                            • Opcode ID: 8d6632be75e15c05decfb529c35803f2aea70f16b1fc9be6edc689b65e1f5e46
                                                            • Instruction ID: 268b90de5ef8301e543b0e1450f18e5b796866e9caf2f0e9a7a428077d8a2ebb
                                                            • Opcode Fuzzy Hash: 8d6632be75e15c05decfb529c35803f2aea70f16b1fc9be6edc689b65e1f5e46
                                                            • Instruction Fuzzy Hash: ADE114702007445ADB24EF75C699BEE77E5AF40304F04053FE996A72C2DBBCA984CB5A
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 00416795
                                                              • Part of subcall function 004129F9: _realloc.LIBCMT ref: 00412A51
                                                              • Part of subcall function 0041A89A: _malloc.LIBCMT ref: 0041A8B4
                                                            • _memset.LIBCMT ref: 004169F6
                                                            • _memset.LIBCMT ref: 00416BB0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset$H_prolog_malloc_realloc
                                                            • String ID:
                                                            • API String ID: 1826288403-3916222277
                                                            • Opcode ID: e5527970fedf9361396c35484b990f069b2c3a7e4f541cdd1bc40a5546d77403
                                                            • Instruction ID: b2eea235d821e150737843ebb12b5e68f22e0a3d12c725fcd3f3b3fef6346f43
                                                            • Opcode Fuzzy Hash: e5527970fedf9361396c35484b990f069b2c3a7e4f541cdd1bc40a5546d77403
                                                            • Instruction Fuzzy Hash: 92E1BF71A007499FCB10EF65C980BEEB7B1FF14304F11482EE956A7281DB39E991CB59
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy
                                                            • String ID: T
                                                            • API String ID: 3048848545-3187964512
                                                            • Opcode ID: 7b9b9af83664cc87fe2d3df4d2851bf5f64a8acbd8ca5ef161931a2b21923617
                                                            • Instruction ID: 08ee224434b4342d1c159c2c22343cdeaadf414e9d08c0d11a019e9d32988bbe
                                                            • Opcode Fuzzy Hash: 7b9b9af83664cc87fe2d3df4d2851bf5f64a8acbd8ca5ef161931a2b21923617
                                                            • Instruction Fuzzy Hash: 99910871600744AFDF24DF64C884BEAB7F8AF15304F0445AFE95997282CB78AAC4CB65
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 00406D07
                                                            • _wcscpy.LIBCMT ref: 00406D3A
                                                              • Part of subcall function 00410BC9: _wcslen.LIBCMT ref: 00410BCF
                                                              • Part of subcall function 00410BC9: _wcsncat.LIBCMT ref: 00410BE8
                                                            • SetFileTime.KERNEL32(?,?,?,?,00000000,00000005,?,00000011,00000000,?,00000000,?,0000003A,00000802,?,00000000), ref: 00406E78
                                                              • Part of subcall function 0040908D: SetFileAttributesW.KERNEL32(00000000,00000000,76F93110,00000001,?,0040933D,00000000,?,?,0040941E,?,00000001,00000000,?,?), ref: 004090A8
                                                              • Part of subcall function 0040908D: SetFileAttributesW.KERNEL32(?,00000000,00000000,?,00000800,?,0040933D,00000000,?,?,0040941E,?,00000001,00000000,?,?), ref: 004090D5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: File$Attributes$H_prologTime_wcscpy_wcslen_wcsncat
                                                            • String ID: :
                                                            • API String ID: 326910402-336475711
                                                            • Opcode ID: 5e0e7d49851dca55c4deade094d134f4ea512213999111766949daa2ff960fa4
                                                            • Instruction ID: 6639f4f99703ce1112f5787d69d8c123706ab186ca62756c3ad703d048bc38cc
                                                            • Opcode Fuzzy Hash: 5e0e7d49851dca55c4deade094d134f4ea512213999111766949daa2ff960fa4
                                                            • Instruction Fuzzy Hash: D0417F71905258AAEB20EB64CC55EEE737CAF04344F0040ABB556B71C2DB78AF94CF69
                                                            APIs
                                                            • EndDialog.USER32(?,00000001), ref: 0040D5BE
                                                            • GetDlgItemTextW.USER32(?,00000065,?,?), ref: 0040D5D3
                                                            • SetDlgItemTextW.USER32(?,00000065,?), ref: 0040D5E8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ItemText$Dialog
                                                            • String ID: ASKNEXTVOL
                                                            • API String ID: 1770891597-3402441367
                                                            • Opcode ID: a8a6f44b6775d0cd3294368f2a4b23b4347bfb04fbb05bfaf2c83a68a4392c99
                                                            • Instruction ID: 7c41b1936654f57e10877f1e9afce92132798bffb5e44c1de30f76ec9c95968c
                                                            • Opcode Fuzzy Hash: a8a6f44b6775d0cd3294368f2a4b23b4347bfb04fbb05bfaf2c83a68a4392c99
                                                            • Instruction Fuzzy Hash: 23118135600104BBDB219FA49C45F663775EB0A718F044036FE01FA1E0D77AD825AB59
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Exception@8Throw_memset
                                                            • String ID:
                                                            • API String ID: 3963884845-3916222277
                                                            • Opcode ID: 653566bfccebebc550ca30b6af37db387d4266e4fa5bc9fcb69beb97700c845e
                                                            • Instruction ID: ba4e6bc0ef6041dd665025fb65f45a384477b48ee7e133f8ed84bbd0a598a512
                                                            • Opcode Fuzzy Hash: 653566bfccebebc550ca30b6af37db387d4266e4fa5bc9fcb69beb97700c845e
                                                            • Instruction Fuzzy Hash: 60110671E01218BACB14EFA9CAD55DEB776FF54344F10406BE405E7241D6B85BD2CB88
                                                            APIs
                                                            • EndDialog.USER32(?,00000001), ref: 0040D4BE
                                                            • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 0040D4D6
                                                            • SetDlgItemTextW.USER32(?,00000066,?), ref: 0040D504
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ItemText$Dialog
                                                            • String ID: GETPASSWORD1
                                                            • API String ID: 1770891597-3292211884
                                                            • Opcode ID: 2c39065e7e84a8441d2400259efe6a077f35be0b7a0eee454e8495a0c984ab02
                                                            • Instruction ID: 3eed9e1ab7e5d8a1da33783b11a95132ac7616313df89bdc2d2bc64375715bf5
                                                            • Opcode Fuzzy Hash: 2c39065e7e84a8441d2400259efe6a077f35be0b7a0eee454e8495a0c984ab02
                                                            • Instruction Fuzzy Hash: 4F11CE329001187ADB219FA1AC44EFB3A6DEF59754F404036FD05B20D0C67CD96A96AA
                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(000001A0,?,000001B8,0044F590,004110EE,00000020,?,00409901,?,?,?,0040BB60,?,?,00000000,?), ref: 00410F62
                                                            • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,00409901,?,?,?,0040BB60,?,?,00000000,?,?,004124ED), ref: 00410F6C
                                                            • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,00409901,?,?,?,0040BB60,?,?,00000000,?,?,004124ED), ref: 00410F7E
                                                            Strings
                                                            • Thread pool initialization failed., xrefs: 00410F96
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                            • String ID: Thread pool initialization failed.
                                                            • API String ID: 3340455307-2182114853
                                                            • Opcode ID: 5d2de00027b14f6e07390935bc826641c20494178e34cc3b56ee4834533d8747
                                                            • Instruction ID: 3f206ddc5264aa259e24750db78c3e6b08f6c9018291aa2998b68a3e9789e537
                                                            • Opcode Fuzzy Hash: 5d2de00027b14f6e07390935bc826641c20494178e34cc3b56ee4834533d8747
                                                            • Instruction Fuzzy Hash: FF115EB1600301AFD3305F659886BE7BBE8FB55315F60482FF6DAC6240D6B458C1CB18
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RENAMEDLG$REPLACEFILEDLG
                                                            • API String ID: 0-56093855
                                                            • Opcode ID: 9dc2c4e2a994375845b1e54b9a4a57574d7f38f83bee2a11927b5ffac3eaf025
                                                            • Instruction ID: 0892b1485419df81b4422e2148389c4265d0283c5dc75372e36aae0ff2247616
                                                            • Opcode Fuzzy Hash: 9dc2c4e2a994375845b1e54b9a4a57574d7f38f83bee2a11927b5ffac3eaf025
                                                            • Instruction Fuzzy Hash: AF017576604204BFC712AB55EC44A167BD5E74A751F040837F901E32B0D3764865DB6E
                                                            APIs
                                                            • ___BuildCatchObject.LIBCMT ref: 0041E145
                                                              • Part of subcall function 0041E0A0: ___BuildCatchObjectHelper.LIBCMT ref: 0041E0D6
                                                            • _UnwindNestedFrames.LIBCMT ref: 0041E15C
                                                            • ___FrameUnwindToState.LIBCMT ref: 0041E16A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                            • String ID: csm
                                                            • API String ID: 2163707966-1018135373
                                                            • Opcode ID: ffb5442ac62a4f85a48ef68d244cd4b92cff39c7c80ea712eb3c4bba393a9d17
                                                            • Instruction ID: 59b9ad28f981bea14fd5052789bebdc6dccf333051ec123e92fb5a6599f75b08
                                                            • Opcode Fuzzy Hash: ffb5442ac62a4f85a48ef68d244cd4b92cff39c7c80ea712eb3c4bba393a9d17
                                                            • Instruction Fuzzy Hash: 14012479401109BBDF126E52CC45EEB3F6AEF09398F044016FD1815261DB3AA8B1EBA9
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040C105
                                                            • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 0040C114
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: FindHandleModuleResource
                                                            • String ID: LTR$RTL
                                                            • API String ID: 3537982541-719208805
                                                            • Opcode ID: f2852aa2e9ae8da3690023ec4cfec567c4dc869793b37f459442400b2d93c3ba
                                                            • Instruction ID: 3bee6f5c2cd76a6cf6446ed83b6680fa0d6a216d229c8f919e909fc3329ffe0a
                                                            • Opcode Fuzzy Hash: f2852aa2e9ae8da3690023ec4cfec567c4dc869793b37f459442400b2d93c3ba
                                                            • Instruction Fuzzy Hash: 69F0243238026467DA2067756C4AFE72B7CAB81310F44057AB605E71C1CFA8D499CBEE
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(KERNEL32,0041D860), ref: 00423468
                                                            • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00423478
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: IsProcessorFeaturePresent$KERNEL32
                                                            • API String ID: 1646373207-3105848591
                                                            • Opcode ID: 7ab99d9e72488d8bf21e4bf78f78cc33f843bd022a3d825351adfd90e0f12518
                                                            • Instruction ID: 925bd1e911d968a2cf7935e923f91739ef174afc765d351c528eb22c7f6e48fa
                                                            • Opcode Fuzzy Hash: 7ab99d9e72488d8bf21e4bf78f78cc33f843bd022a3d825351adfd90e0f12518
                                                            • Instruction Fuzzy Hash: C7F03060B00A1AD2DB116FA1BC1A67F7B78FB80742FD105D1D6D5E0084DF7885B1D38A
                                                            APIs
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00419A6D
                                                            • RegisterClassExW.USER32(00000030), ref: 00419A8E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ClassCursorLoadRegister
                                                            • String ID: 0$RarHtmlClassName
                                                            • API String ID: 1693014935-3342523147
                                                            • Opcode ID: 191bbc33d2b33050640957ba9683b50acfea39c34108bf4aa43fc12e5a7eb183
                                                            • Instruction ID: b9ed7023dc6f3226d58ddf2044dfc6b29f2317d5cd4a011e6e0fd8f9270d308a
                                                            • Opcode Fuzzy Hash: 191bbc33d2b33050640957ba9683b50acfea39c34108bf4aa43fc12e5a7eb183
                                                            • Instruction Fuzzy Hash: 81F0F2B1D00228ABCB019F9AD844AEEFBF8FF98304F10805BE500B6250D7B916018FA9
                                                            APIs
                                                            • SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 0040D610
                                                            • SetEnvironmentVariableW.KERNEL32(sfxpar,00000002,00000000,00000000,?,?,00000400), ref: 0040D643
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: EnvironmentVariable
                                                            • String ID: sfxcmd$sfxpar
                                                            • API String ID: 1431749950-3493335439
                                                            • Opcode ID: bac05ca2e549dd4e556f3ae34e89e1e7b45a97b9d2e2d38533528fd9b5159ab4
                                                            • Instruction ID: 209d7830a902f923c059ddcb8ccd8c76eadbb62e41e0a08ffeb6939b57d6bf06
                                                            • Opcode Fuzzy Hash: bac05ca2e549dd4e556f3ae34e89e1e7b45a97b9d2e2d38533528fd9b5159ab4
                                                            • Instruction Fuzzy Hash: 29E0EC3660011437CA102A969C01EBB7A6CDBC1744F1000337E48A2080E979D89E8BED
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(kernel32,0040FF03,00000001), ref: 00410E21
                                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00410E31
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: SetDllDirectoryW$kernel32
                                                            • API String ID: 1646373207-2052158636
                                                            • Opcode ID: 613fa81eedf6cfefe4bb79f79fd7d80da4da150b27e50d1fb967e6d6e35de1a2
                                                            • Instruction ID: d1dc000951ac042e8af12af71ac4f40d64c7c6d3e89629ddd7054994e9706fe8
                                                            • Opcode Fuzzy Hash: 613fa81eedf6cfefe4bb79f79fd7d80da4da150b27e50d1fb967e6d6e35de1a2
                                                            • Instruction Fuzzy Hash: 2BD0A7B03243215797282B729C1AB2B65584B50F027944D3E7E0AC0080CA6DC0A0853F
                                                            APIs
                                                            • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,?,?,00407536,?,?,?), ref: 004091CD
                                                            • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00407536,?,?,?,?), ref: 00409204
                                                            • SetFileTime.KERNEL32(?,00000000,00000000,00000000,?,00407536,?,?,?,?), ref: 00409275
                                                            • CloseHandle.KERNEL32(?,?,00407536,?,?,?,?), ref: 0040927E
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: File$Create$CloseHandleTime
                                                            • String ID:
                                                            • API String ID: 2287278272-0
                                                            • Opcode ID: 6a8276f57ee53cdbc91cc020f39a17d418f5c9fb0df3296a94224ec9e042af11
                                                            • Instruction ID: 149005b1c5d3a5dbb79089aff48ec9cca0dae1d541df05bff41c4f18bd56acf5
                                                            • Opcode Fuzzy Hash: 6a8276f57ee53cdbc91cc020f39a17d418f5c9fb0df3296a94224ec9e042af11
                                                            • Instruction Fuzzy Hash: 1141A131A00248BEEF12DBA4CC49FEE7BB89F05304F1445AAF851BB2D2C6789E45D755
                                                            APIs
                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00425002
                                                            • __isleadbyte_l.LIBCMT ref: 00425036
                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,0041A9BA,?,00000000,00000000,?,?,?,?,0041A9BA,00000000,?), ref: 00425067
                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,0041A9BA,00000001,00000000,00000000,?,?,?,?,0041A9BA,00000000,?), ref: 004250D5
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                            • String ID:
                                                            • API String ID: 3058430110-0
                                                            • Opcode ID: 5ede48c89caf3767bd10844c4e2adb50473344288511d083f5bbcd5d287f352f
                                                            • Instruction ID: 432046cfce088e341913eb2016d1b5e66f5b1b0e2666f0ac1bd271c546b36d2c
                                                            • Opcode Fuzzy Hash: 5ede48c89caf3767bd10844c4e2adb50473344288511d083f5bbcd5d287f352f
                                                            • Instruction Fuzzy Hash: C831D131B00265EFDB20DF64EC809BA7BA0EF41310F5685AAE4618B2D1D735D981DB99
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: 0d338722b2e3e51696f4e1a05dd7a6835afd7bcab5979c6f78e2f817af711592
                                                            • Instruction ID: dbb621f027503421eccd8689c294ebf88999011181a54c0115c225b35bd7b5a3
                                                            • Opcode Fuzzy Hash: 0d338722b2e3e51696f4e1a05dd7a6835afd7bcab5979c6f78e2f817af711592
                                                            • Instruction Fuzzy Hash: 9811487164478069E220EA7A4C46FE3B6DD9B1931CF44883FF2DEC7183C6AA6846C756
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 00411077
                                                            • EnterCriticalSection.KERNEL32(0044F590,?,?,?,00409901,?,?,?,0040BB60,?,?,00000000,?,?,004124ED,?), ref: 00411085
                                                            • LeaveCriticalSection.KERNEL32(0044F590,?,00409901,?,?,?,0040BB60,?,?,00000000,?,?,004124ED,?,?,?), ref: 004110F5
                                                              • Part of subcall function 0041A89A: _malloc.LIBCMT ref: 0041A8B4
                                                            • LeaveCriticalSection.KERNEL32(0044F590,?,00409901,?,?,?,0040BB60,?,?,00000000,?,?,004124ED,?,?,?), ref: 00411100
                                                              • Part of subcall function 00410F29: InitializeCriticalSection.KERNEL32(000001A0,?,000001B8,0044F590,004110EE,00000020,?,00409901,?,?,?,0040BB60,?,?,00000000,?), ref: 00410F62
                                                              • Part of subcall function 00410F29: CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,00409901,?,?,?,0040BB60,?,?,00000000,?,?,004124ED), ref: 00410F6C
                                                              • Part of subcall function 00410F29: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,00409901,?,?,?,0040BB60,?,?,00000000,?,?,004124ED), ref: 00410F7E
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection$CreateLeave$EnterEventH_prologInitializeSemaphore_malloc
                                                            • String ID:
                                                            • API String ID: 1405584564-0
                                                            • Opcode ID: 3f0bec743d3c3e54beb4ca038bcc84bad5a4a530a73f67f15a7eea00e341295c
                                                            • Instruction ID: 491e5497db774d6ab3e78c5f78b9db4af1dc916e288055147b814ae628d52a75
                                                            • Opcode Fuzzy Hash: 3f0bec743d3c3e54beb4ca038bcc84bad5a4a530a73f67f15a7eea00e341295c
                                                            • Instruction Fuzzy Hash: 1A118234A01321EBD724AF74AC457EABBA4AB0C355F10453BE902E3692DBBC89D1865D
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                            • String ID:
                                                            • API String ID: 3016257755-0
                                                            • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                            • Instruction ID: 44ddc5ebc1807cb1f8dbc3b2ce9dd0a677749795dee404b17e6a32e81244ff51
                                                            • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                            • Instruction Fuzzy Hash: AE11723250015EFBCF125E85EC418EE3F32BB48355B988456FE1859130CA3ACAB2AB85
                                                            APIs
                                                              • Part of subcall function 0040C3BF: LoadStringW.USER32(?,-004335D5,00000200), ref: 0040C410
                                                              • Part of subcall function 0040C3BF: LoadStringW.USER32(?,-004335D5,00000200), ref: 0040C422
                                                            • _swprintf.LIBCMT ref: 00411AB8
                                                              • Part of subcall function 0040BC16: __vswprintf_c_l.LIBCMT ref: 0040BC29
                                                            • GetLastError.KERNEL32(?), ref: 00411AC0
                                                            • MessageBoxW.USER32(?,00000000,00000096,00000035), ref: 00411AE2
                                                            • SetLastError.KERNEL32(00000000), ref: 00411AEF
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastLoadString$Message__vswprintf_c_l_swprintf
                                                            • String ID:
                                                            • API String ID: 2205000856-0
                                                            • Opcode ID: 68bc4feaeb3ec1ded5fc4cddc0e8f758a38e28cbc6004bdae2a7d7facef01b9c
                                                            • Instruction ID: 7f3341f69499fe42e6dffd8e50f304e55c87ac1a4f55305a7eb793650ce5b90b
                                                            • Opcode Fuzzy Hash: 68bc4feaeb3ec1ded5fc4cddc0e8f758a38e28cbc6004bdae2a7d7facef01b9c
                                                            • Instruction Fuzzy Hash: 74F02732140114ABF71137E08C4AECA379CFB087C5F000277FA01F21A2EA79996487BD
                                                            APIs
                                                            • __getptd.LIBCMT ref: 0042231F
                                                              • Part of subcall function 0041E9B4: __getptd_noexit.LIBCMT ref: 0041E9B7
                                                              • Part of subcall function 0041E9B4: __amsg_exit.LIBCMT ref: 0041E9C4
                                                            • __getptd.LIBCMT ref: 00422336
                                                            • __amsg_exit.LIBCMT ref: 00422344
                                                            • __lock.LIBCMT ref: 00422354
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                            • String ID:
                                                            • API String ID: 3521780317-0
                                                            • Opcode ID: 2067aca802aea6c84e1c6e0627a9ce2a9215c14d0a893de0c815b7a1e0d9c920
                                                            • Instruction ID: ac1e04e8c31356b773b53a495aea9e08dc5a2d3a98daccf88dafce2968103349
                                                            • Opcode Fuzzy Hash: 2067aca802aea6c84e1c6e0627a9ce2a9215c14d0a893de0c815b7a1e0d9c920
                                                            • Instruction Fuzzy Hash: D2F09631B00720EBDB60FBB6A50279D73A07F44724F54416FE844AB2D1CBBC9942DA5E
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: __rar_
                                                            • API String ID: 176396367-2561138058
                                                            • Opcode ID: cc00e60038d7e5b00a294da67532c8ff9d8da0984a3b6968a0dc5b622ff721b3
                                                            • Instruction ID: 2f22db44ea277558b4e0ddbd7bf004989f9b0852302f55cc0e1d63be076b661c
                                                            • Opcode Fuzzy Hash: cc00e60038d7e5b00a294da67532c8ff9d8da0984a3b6968a0dc5b622ff721b3
                                                            • Instruction Fuzzy Hash: 2E41A176A0021966DF21AA65CC81BEF336DAF54384F08087BF905B31D3D63DCD9187A9
                                                            APIs
                                                              • Part of subcall function 0040CEB6: LoadLibraryW.KERNEL32(Crypt32.dll,00000020,0040CF0E,00000020,?,?,00405D3C,?,00000020,00000001,00000000,?,00000010,?,?,?), ref: 0040CEC4
                                                              • Part of subcall function 0040CEB6: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0040CEDD
                                                              • Part of subcall function 0040CEB6: GetProcAddress.KERNEL32(00438800,CryptUnprotectMemory), ref: 0040CEE9
                                                            • GetCurrentProcessId.KERNEL32(00000020,?,?,00405D3C,?,00000020,00000001,00000000,?,00000010,?,?,?,00000001,?,?), ref: 0040CF7C
                                                            Strings
                                                            • CryptUnprotectMemory failed, xrefs: 0040CF75
                                                            • CryptProtectMemory failed, xrefs: 0040CF3C
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$CurrentLibraryLoadProcess
                                                            • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                            • API String ID: 137661620-396321323
                                                            • Opcode ID: fe221cb1f1ebd7538222251a67e743d79676efd4ab4d459fbc5578979eb1af3c
                                                            • Instruction ID: d47b55f9d8946329b2d763cf1c5c736fe64ad30a662938a08eea1033a11e378d
                                                            • Opcode Fuzzy Hash: fe221cb1f1ebd7538222251a67e743d79676efd4ab4d459fbc5578979eb1af3c
                                                            • Instruction Fuzzy Hash: C411C171304213AFDB09AF349CD197F6756CB41B14724423FF902AA2C2DA388C41529E
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: _wcschr_wcspbrk
                                                            • String ID: ?*<>|"
                                                            • API String ID: 3305141221-226352099
                                                            • Opcode ID: 7f6a6c1d5428e83731d2b65d13748a0e82632fc7d37b167bce2bcb03fdaf0a03
                                                            • Instruction ID: fc4717308da4314e5704a136f2044a521342e33b833bb001f63317f55d448289
                                                            • Opcode Fuzzy Hash: 7f6a6c1d5428e83731d2b65d13748a0e82632fc7d37b167bce2bcb03fdaf0a03
                                                            • Instruction Fuzzy Hash: 1DF0F42912832254DE38A6659805AB333D49F15784F60447FE8D2BA2C2EA3D8CE3C16F
                                                            APIs
                                                              • Part of subcall function 0041A429: __getptd.LIBCMT ref: 0041A42F
                                                              • Part of subcall function 0041A429: __getptd.LIBCMT ref: 0041A43F
                                                            • __getptd.LIBCMT ref: 0041DEBA
                                                              • Part of subcall function 0041E9B4: __getptd_noexit.LIBCMT ref: 0041E9B7
                                                              • Part of subcall function 0041E9B4: __amsg_exit.LIBCMT ref: 0041E9C4
                                                            • __getptd.LIBCMT ref: 0041DEC8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: __getptd$__amsg_exit__getptd_noexit
                                                            • String ID: csm
                                                            • API String ID: 803148776-1018135373
                                                            • Opcode ID: 2d55cb122b51988d1cc7e6481490fc99cbdc11bcbdbc1298bbf42470784b3229
                                                            • Instruction ID: 7c6b91792d137033b66a9eec197cc920f164d7126653d302a3e0d72df4157e21
                                                            • Opcode Fuzzy Hash: 2d55cb122b51988d1cc7e6481490fc99cbdc11bcbdbc1298bbf42470784b3229
                                                            • Instruction Fuzzy Hash: 040162B5C013148ACF389F25D444AEEB3B6AF14315F24441FE44156791DB38DED1DB49
                                                            APIs
                                                            • WaitForSingleObject.KERNEL32(?,000000FF,00410FD9,?,?,00411197,?,?,?,?,?,004111E6), ref: 00410EA6
                                                            • GetLastError.KERNEL32(?,?,?,?,?,004111E6), ref: 00410EB2
                                                              • Part of subcall function 00406423: __vswprintf_c_l.LIBCMT ref: 00406441
                                                            Strings
                                                            • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00410EBB
                                                            Memory Dump Source
                                                            • Source File: 0000000B.00000002.2589002771.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 0000000B.00000002.2588978613.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589033974.000000000042A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000430000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.0000000000435000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589062788.000000000044F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                            • Associated: 0000000B.00000002.2589140790.0000000000452000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_11_2_400000_tasksche.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                            • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                            • API String ID: 1091760877-2248577382
                                                            • Opcode ID: ac3bcd71a64bb110093b5bec46156cf20680403487952e12d0601c5134127ac2
                                                            • Instruction ID: 79dccacb4fa0009262a18c3e3c709d5502c54047c68cfd859e09497cac206ec9
                                                            • Opcode Fuzzy Hash: ac3bcd71a64bb110093b5bec46156cf20680403487952e12d0601c5134127ac2
                                                            • Instruction Fuzzy Hash: 13D0C23260402037C5013B245C05EAE36116B11331BA00722F831602F1CB6909A2429F