Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1520644
MD5:0013399a6a9ab2e3fb25451ed658daa1
SHA1:77731500657e6658c6d1b4d09de3fae4f756efef
SHA256:0646980e8e68974948861e60bd4497d17464da101ec697241ba8ea96d86d22c6
Tags:exex64user-jstrosch
Infos:

Detection

CredGrabber, Meduza Stealer
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Suricata IDS alerts for network traffic
Yara detected CredGrabber
Yara detected Meduza Stealer
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Terminates after testing mutex exists (may check infected machine status)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6776 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 0013399A6A9AB2E3FB25451ED658DAA1)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 6776JoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
    Process Memory Space: file.exe PID: 6776JoeSecurity_CredGrabberYara detected CredGrabberJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-09-27T17:51:15.562012+020020494411A Network Trojan was detected192.168.2.449730176.124.204.20615666TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-09-27T17:51:15.562012+020020508061A Network Trojan was detected192.168.2.449730176.124.204.20615666TCP
      2024-09-27T17:51:15.571111+020020508061A Network Trojan was detected192.168.2.449730176.124.204.20615666TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-09-27T17:51:15.562012+020020508071A Network Trojan was detected192.168.2.449730176.124.204.20615666TCP
      2024-09-27T17:51:15.571111+020020508071A Network Trojan was detected192.168.2.449730176.124.204.20615666TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: file.exeJoe Sandbox ML: detected
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D1CF0 CryptUnprotectData,LocalFree,0_2_00007FF67A3D1CF0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A397C80 CryptUnprotectData,LocalFree,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A397C80
      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49731 version: TLS 1.2
      Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A41C088 FindClose,FindFirstFileExW,GetLastError,0_2_00007FF67A41C088
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A41C138 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,0_2_00007FF67A41C138
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3EAB00 GetLogicalDriveStringsW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A3EAB00
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\migration\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\migration\wtr\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2049441 - Severity 1 - ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt : 192.168.2.4:49730 -> 176.124.204.206:15666
      Source: Network trafficSuricata IDS: 2050806 - Severity 1 - ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M2 : 192.168.2.4:49730 -> 176.124.204.206:15666
      Source: Network trafficSuricata IDS: 2050807 - Severity 1 - ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP) : 192.168.2.4:49730 -> 176.124.204.206:15666
      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 176.124.204.206:15666
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
      Source: Joe Sandbox ViewASN Name: GULFSTREAMUA GULFSTREAMUA
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: unknownDNS query: name: api.ipify.org
      Source: unknownDNS query: name: api.ipify.org
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: unknownTCP traffic detected without corresponding DNS query: 176.124.204.206
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E8A50 InternetOpenA,InternetOpenUrlA,HttpQueryInfoW,HttpQueryInfoW,InternetQueryDataAvailable,InternetReadFile,InternetQueryDataAvailable,InternetCloseHandle,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,0_2_00007FF67A3E8A50
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
      Source: file.exe, 00000000.00000003.1959673962.000002653F684000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1807857552.000002653F671000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1959468011.000002653F680000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1959429528.000002653F680000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.microsoft.t/Regi
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/i
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org3S4
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgCSD
      Source: file.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
      Source: file.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
      Source: file.exe, 00000000.00000003.1811211841.000002653F9B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
      Source: file.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
      Source: file.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
      Source: file.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
      Source: file.exe, 00000000.00000003.1819856920.0000026540151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FA5B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817503166.000002653ECC8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817503166.000002653ECC0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FAC6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817293847.000002653FACE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FA53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
      Source: file.exe, 00000000.00000003.1816063856.000002653FA63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
      Source: file.exe, 00000000.00000003.1816063856.000002653FA63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
      Source: file.exe, 00000000.00000003.1812096057.000002653F95B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1812116653.000002653FA03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811041441.000002653FA03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811602481.000002653FA03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
      Source: file.exe, 00000000.00000003.1811041441.000002653F9DE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811211841.000002653F978000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811407388.000002653CE0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
      Source: file.exe, 00000000.00000003.1812096057.000002653F95B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1812116653.000002653FA03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811041441.000002653FA03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811602481.000002653FA03000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
      Source: file.exe, 00000000.00000003.1811041441.000002653F9DE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811211841.000002653F978000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811407388.000002653CE0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
      Source: file.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
      Source: file.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
      Source: file.exe, 00000000.00000003.1819856920.0000026540151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FA5B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817503166.000002653ECC8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817503166.000002653ECC0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FAC6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817293847.000002653FACE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FA53000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
      Source: file.exe, 00000000.00000003.1816063856.000002653FA63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
      Source: file.exe, 00000000.00000003.1816063856.000002653FA63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
      Source: file.exe, 00000000.00000003.1816063856.000002653FAD6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817815572.000002653FB98000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817503166.000002653ECCF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FA63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
      Source: file.exe, 00000000.00000003.1816063856.000002653FA63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
      Source: file.exe, 00000000.00000003.1816063856.000002653FAD6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817815572.000002653FB98000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817503166.000002653ECCF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FA63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49731 version: TLS 1.2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E9310 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,GetDeviceCaps,GetDeviceCaps,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SHCreateMemStream,SelectObject,DeleteDC,ReleaseDC,DeleteObject,EnterCriticalSection,LeaveCriticalSection,GetObjectW,IStream_Size,IStream_Reset,IStream_Read,SelectObject,DeleteDC,ReleaseDC,DeleteObject,DeleteObject,EnterCriticalSection,EnterCriticalSection,GdiplusShutdown,LeaveCriticalSection,LeaveCriticalSection,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A3E9310
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3EDD50 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,_invalid_parameter_noinfo_noreturn,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize,0_2_00007FF67A3EDD50
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3ED610 GetModuleHandleA,GetProcAddress,OpenProcess,NtQuerySystemInformation,NtQuerySystemInformation,GetCurrentProcess,NtQueryObject,GetFinalPathNameByHandleA,CloseHandle,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A3ED610
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A390BD00_2_00007FF67A390BD0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A39EC500_2_00007FF67A39EC50
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A409D080_2_00007FF67A409D08
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A39C9C00_2_00007FF67A39C9C0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3C1A800_2_00007FF67A3C1A80
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3F0A900_2_00007FF67A3F0A90
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E8A500_2_00007FF67A3E8A50
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3EBA600_2_00007FF67A3EBA60
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3BBAF00_2_00007FF67A3BBAF0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E9FB00_2_00007FF67A3E9FB0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3A40B00_2_00007FF67A3A40B0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3F00A80_2_00007FF67A3F00A8
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3EADB00_2_00007FF67A3EADB0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E1F200_2_00007FF67A3E1F20
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E33600_2_00007FF67A3E3360
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A4065040_2_00007FF67A406504
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A39D5100_2_00007FF67A39D510
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3BE4E00_2_00007FF67A3BE4E0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A41C1380_2_00007FF67A41C138
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3F21500_2_00007FF67A3F2150
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E82100_2_00007FF67A3E8210
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E93100_2_00007FF67A3E9310
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3912C00_2_00007FF67A3912C0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D77F00_2_00007FF67A3D77F0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A39E5A00_2_00007FF67A39E5A0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3ACB900_2_00007FF67A3ACB90
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A41EB500_2_00007FF67A41EB50
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A408C2C0_2_00007FF67A408C2C
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CDBD00_2_00007FF67A3CDBD0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A423BC00_2_00007FF67A423BC0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A407CAC0_2_00007FF67A407CAC
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D3CC00_2_00007FF67A3D3CC0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3FE9A40_2_00007FF67A3FE9A4
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3DF9C00_2_00007FF67A3DF9C0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3F49BA0_2_00007FF67A3F49BA
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A399A590_2_00007FF67A399A59
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A401B140_2_00007FF67A401B14
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3FDAC40_2_00007FF67A3FDAC4
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A409F840_2_00007FF67A409F84
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CCF600_2_00007FF67A3CCF60
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3B6F700_2_00007FF67A3B6F70
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A41EFD00_2_00007FF67A41EFD0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D8FD00_2_00007FF67A3D8FD0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3EE0A00_2_00007FF67A3EE0A0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3FE10C0_2_00007FF67A3FE10C
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3660C00_2_00007FF67A3660C0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3B00ED0_2_00007FF67A3B00ED
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A391D4E0_2_00007FF67A391D4E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3EDD500_2_00007FF67A3EDD50
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D6D700_2_00007FF67A3D6D70
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A39AE000_2_00007FF67A39AE00
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3FBE000_2_00007FF67A3FBE00
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CFE500_2_00007FF67A3CFE50
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A410E740_2_00007FF67A410E74
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3BAF000_2_00007FF67A3BAF00
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CDF000_2_00007FF67A3CDF00
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A397ED00_2_00007FF67A397ED0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A39BEE00_2_00007FF67A39BEE0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D4EF00_2_00007FF67A3D4EF0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3AE4190_2_00007FF67A3AE419
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A4083D80_2_00007FF67A4083D8
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3664800_2_00007FF67A366480
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3FE49C0_2_00007FF67A3FE49C
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A40A50C0_2_00007FF67A40A50C
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3AC4E00_2_00007FF67A3AC4E0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D01800_2_00007FF67A3D0180
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A40717C0_2_00007FF67A40717C
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3C52200_2_00007FF67A3C5220
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CD2600_2_00007FF67A3CD260
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D82700_2_00007FF67A3D8270
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E12F00_2_00007FF67A3E12F0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E67830_2_00007FF67A3E6783
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3877B00_2_00007FF67A3877B0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E27500_2_00007FF67A3E2750
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3897600_2_00007FF67A389760
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E67730_2_00007FF67A3E6773
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3867700_2_00007FF67A386770
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CF8200_2_00007FF67A3CF820
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CD8B00_2_00007FF67A3CD8B0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3669000_2_00007FF67A366900
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3FD8DC0_2_00007FF67A3FD8DC
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3918F00_2_00007FF67A3918F0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CD5900_2_00007FF67A3CD590
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3C96000_2_00007FF67A3C9600
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3DF6200_2_00007FF67A3DF620
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D06160_2_00007FF67A3D0616
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A40762C0_2_00007FF67A40762C
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E45D00_2_00007FF67A3E45D0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D66D00_2_00007FF67A3D66D0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3FD6F40_2_00007FF67A3FD6F4
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FF67A396990 appears 41 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FF67A38D510 appears 63 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00007FF67A391D20 appears 56 times
      Source: classification engineClassification label: mal88.troj.spyw.winEXE@1/0@1/2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A39E5A0 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A39E5A0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CF820 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,SysAllocStringByteLen,SysFreeString,SysAllocStringByteLen,SysFreeString,SysStringByteLen,SysFreeString,SysFreeString,SysStringByteLen,SysFreeString,SysFreeString,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A3CF820
      Source: C:\Users\user\Desktop\file.exeMutant created: \Sessions\1\BaseNamedObjects\Mmm-A33C734061CA11EE8C18806E6F6E69639C5D69E2
      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: file.exeString found in binary or memory: --help
      Source: file.exeString found in binary or memory: --help
      Source: file.exeString found in binary or memory: --help
      Source: file.exeString found in binary or memory: --help
      Source: file.exeString found in binary or memory: ipportgrabber_max_sizeextensionslinksbuild_nameself_destructtype must be boolean, but is type must be number, but is 0123456789ABCDEFntdll.dllFile DownloaderabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+=-&^%$#@!(){}[},.;'runasopen bad variant accessfalsetrueBad any_cast[VAR... , [default: [required][nargs: or more] ..[nargs= to or more provided. argument(s) expected. : required.: no value provided.-=--help-hshows help message and exits--version-vprints version information and exitsNo such argument:
      Source: file.exeString found in binary or memory: ipportgrabber_max_sizeextensionslinksbuild_nameself_destructtype must be boolean, but is type must be number, but is 0123456789ABCDEFntdll.dllFile DownloaderabcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+=-&^%$#@!(){}[},.;'runasopen bad variant accessfalsetrueBad any_cast[VAR... , [default: [required][nargs: or more] ..[nargs= to or more provided. argument(s) expected. : required.: no value provided.-=--help-hshows help message and exits--version-vprints version information and exitsNo such argument:
      Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: vaultcli.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
      Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: file.exeStatic file information: File size 1117696 > 1048576
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A39D510 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A39D510
      Source: file.exeStatic PE information: section name: _RDATA
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CCBB4 push rsp; retf 0_2_00007FF67A3CCBB5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CCBB0 push rsp; retf 0_2_00007FF67A3CCBB1
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CCBAC push rsp; retf 0_2_00007FF67A3CCBAD
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CCBC4 push rsp; retf 0_2_00007FF67A3CCBC5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CCBC0 push rsp; retf 0_2_00007FF67A3CCBC1
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CCBBC push rsp; retf 0_2_00007FF67A3CCBBD
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CCBB8 push rsp; retf 0_2_00007FF67A3CCBB9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3CCB00 push rsp; retf 0_2_00007FF67A3CCBA1
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3D77F0 _invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,ExitProcess,ExitProcess,OpenMutexA,ExitProcess,CreateMutexExA,ExitProcess,ReleaseMutex,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A3D77F0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A41C088 FindClose,FindFirstFileExW,GetLastError,0_2_00007FF67A41C088
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A41C138 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,0_2_00007FF67A41C138
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3EAB00 GetLogicalDriveStringsW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A3EAB00
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A400220 VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,0_2_00007FF67A400220
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\migration\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\migration\wtr\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
      Source: file.exe, 00000000.00000003.1808862334.000002653CDF8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1960242626.000002653CDDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: file.exe, 00000000.00000003.1808862334.000002653CDF8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1960242626.000002653CDDC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW&
      Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3EDD50 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,_invalid_parameter_noinfo_noreturn,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize,0_2_00007FF67A3EDD50
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3F8A38 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF67A3F8A38
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A41E2B0 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF67A41E2B0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A39D510 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF67A39D510
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3F8A38 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF67A3F8A38
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A415870 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF67A415870
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00007FF67A40FBB4
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00007FF67A404B68
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00007FF67A41BC84
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,0_2_00007FF67A40FAE4
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF67A40FFF0
      Source: C:\Users\user\Desktop\file.exeCode function: GetLocaleInfoW,0_2_00007FF67A4050AC
      Source: C:\Users\user\Desktop\file.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF67A4101CC
      Source: C:\Users\user\Desktop\file.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF67A40F798
      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation TimeZoneKeyNameJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A416328 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF67A416328
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A3E9A60 GetUserNameW,0_2_00007FF67A3E9A60
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF67A409D08 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF67A409D08

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6776, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6776, type: MEMORYSTR
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum\wallets
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ElectronCash\wallets
      Source: file.exe, 00000000.00000003.1830214172.000002653CE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ny1aaXAgMjMuMDEgKHg2NCkgWzIzLjAxXQpNb3ppbGxhIEZpcmVmb3ggKHg2NCBlbi1VUykgWzExOC4wLjFdCk1vemlsbGEgTWFpbnRlbmFuY2UgU2VydmljZSBbMTE4LjAuMV0KTWljcm9zb2Z0IE9mZmljZSBQcm9mZXNzaW9uYWwgUGx1cyAyMDE5IC0gZW4tdXMgWzE2LjAuMTY4MjcuMjAxMzBdCk1pY3Jvc29mdCBWaXN1YWwgQysrIDIwMjIgWDY0IEFkZGl0aW9uYWwgUnVudGltZSAtIDE0LjM2LjMyNTMyIFsxNC4zNi4zMjUzMl0KT2ZmaWNlIDE2IENsaWNrLXRvLVJ1biBMaWNlbnNpbmcgQ29tcG9uZW50IFsxNi4wLjE2ODI3LjIwMTMwXQpPZmZpY2UgMTYgQ2xpY2stdG8tUnVuIEV4dGVuc2liaWxpdHkgQ29tcG9uZW50IDY0LWJpdCBSZWdpc3RyYXRpb24gWzE2LjAuMTY4MjcuMjAwNTZdCkFkb2JlIEFjcm9iYXQgKDY0LWJpdCkgWzIzLjAwNi4yMDMyMF0KTWljcm9zb2Z0IFZpc3VhbCBDKysgMjAyMiBYNjQgTWluaW11bSBSdW50aW1lIC0gMTQuMzYuMzI1MzIgWzE0LjM2LjMyNTMyXQpHb29nbGUgQ2hyb21lIFsxMTcuMC41OTM4LjEzMl0KTWljcm9zb2Z0IEVkZ2UgWzExNy4wLjIwNDUuNDddCk1pY3Jvc29mdCBFZGdlIFVwZGF0ZSBbMS4zLjE3Ny4xMV0KTWljcm9zb2Z0IEVkZ2UgV2ViVmlldzIgUnVudGltZSBbMTE3LjAuMjA0NS40N10KSmF2YSBBdXRvIFVwZGF0ZXIgWzIuOC4zODEuOV0KSmF2YSA4IFVwZGF0ZSAzODEgWzguMC4zODEwLjldCk1pY3Jvc29mdCBWaXN1YWwgQysrIDIwMTUtMjAyMiBSZWRpc3RyaWJ1dGFibGUgKHg2NCkgLSAxNC4zNi4zMjUzMiBbMTQuMzYuMzI1MzIuMF0KT2ZmaWNlIDE2IENsaWNrLXRvLVJ1biBFeHRlbnNpYmlsaXR5IENvbXBvbmVudCBbMTYuMC4xNjgyNy4yMDEzMF0K
      Source: file.exe, 00000000.00000003.1825279613.000002653CE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.walleta\
      Source: file.exe, 00000000.00000003.1825279613.000002653CE43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.walleta\
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
      Source: file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-coreJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOCKJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6776, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6776, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Command and Scripting Interpreter
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      1
      OS Credential Dumping
      12
      System Time Discovery
      Remote Services1
      Screen Capture
      21
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Native API
      Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
      Obfuscated Files or Information
      LSASS Memory21
      Security Software Discovery
      Remote Desktop Protocol1
      Email Collection
      1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      DLL Side-Loading
      Security Account Manager2
      Process Discovery
      SMB/Windows Admin Shares1
      Archive Collected Data
      2
      Ingress Tool Transfer
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
      Account Discovery
      Distributed Component Object Model2
      Data from Local System
      2
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
      System Owner/User Discovery
      SSHKeylogging3
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
      System Network Configuration Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync3
      File and Directory Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
      System Information Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      file.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://api.ipify.org/0%URL Reputationsafe
      https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF0%URL Reputationsafe
      https://api.ipify.org0%URL Reputationsafe
      https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg0%URL Reputationsafe
      https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg0%URL Reputationsafe
      https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%URL Reputationsafe
      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
      https://support.mozilla.org0%URL Reputationsafe
      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
      https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      api.ipify.org
      172.67.74.152
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://api.ipify.org/false
        • URL Reputation: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFfile.exe, 00000000.00000003.1816063856.000002653FA63000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://api.ipify.orgfile.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfile.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgfile.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYifile.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://api.ipify.org3S4file.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://api.ipify.orgCSDfile.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installfile.exe, 00000000.00000003.1811041441.000002653F9DE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811211841.000002653F978000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811407388.000002653CE0E000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.file.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafile.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=file.exe, 00000000.00000003.1811211841.000002653F9B3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.mozilla.orgfile.exe, 00000000.00000003.1819856920.0000026540151000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FA5B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817503166.000002653ECC8000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817503166.000002653ECC0000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FAC6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1817293847.000002653FACE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1816063856.000002653FA53000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016file.exe, 00000000.00000003.1812096057.000002653F95B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1812116653.000002653FA03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811041441.000002653FA03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811602481.000002653FA03000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesfile.exe, 00000000.00000003.1811041441.000002653F9DE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811211841.000002653F978000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811407388.000002653CE0E000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17file.exe, 00000000.00000003.1812096057.000002653F95B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1812116653.000002653FA03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811041441.000002653FA03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1811602481.000002653FA03000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.org/ifile.exe, 00000000.00000002.1960242626.000002653CD8A000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://ns.microsoft.t/Regifile.exe, 00000000.00000003.1959673962.000002653F684000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1807857552.000002653F671000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1959468011.000002653F680000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1959429528.000002653F680000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brfile.exe, 00000000.00000003.1816063856.000002653FA63000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94file.exe, 00000000.00000003.1822746717.000002653FA17000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          176.124.204.206
                          unknownRussian Federation
                          59652GULFSTREAMUAtrue
                          172.67.74.152
                          api.ipify.orgUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1520644
                          Start date and time:2024-09-27 17:50:06 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 14s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:4
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:file.exe
                          Detection:MAL
                          Classification:mal88.troj.spyw.winEXE@1/0@1/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 93%
                          • Number of executed functions: 86
                          • Number of non-executed functions: 110
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Stop behavior analysis, all processes terminated
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size exceeded maximum capacity and may have missing network information.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • VT rate limit hit for: file.exe
                          No simulations
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          176.124.204.206mSLEwIfTGL.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            172.67.74.152file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            api.ipify.orgSecuriteInfo.com.Trojan.PackedNET.3065.20099.26130.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            file.exeGet hashmaliciousUnknownBrowse
                            • 104.26.13.205
                            file.exeGet hashmaliciousUnknownBrowse
                            • 104.26.12.205
                            rQuotation3200025006.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.12.205
                            mSLEwIfTGL.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            • 172.67.74.152
                            RTGS-WB-ABS-240730-NEW.lnkGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            Purchase order.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            https://mzansibonds.com/dshk/tmpasdfghjklkjhgfdewertyuioiuytresdxcvbnmnbvfcdsew345678987654rewsdfvgbhnjhbgvfdesw23e45678uijdhgfcsvzbdncqasdcxw.phpGet hashmaliciousHTMLPhisherBrowse
                            • 104.26.13.205
                            http://correctingservicesalakks.pages.dev/Get hashmaliciousUnknownBrowse
                            • 104.26.12.205
                            file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                            • 104.26.12.205
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            GULFSTREAMUAmSLEwIfTGL.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            • 176.124.204.206
                            https://darlin.com.au/Get hashmaliciousUnknownBrowse
                            • 176.124.222.157
                            LisectAVT_2403002A_415.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                            • 176.124.220.79
                            qObijSd3Uj.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                            • 176.124.220.79
                            zqixOh6Ktr.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                            • 176.124.192.196
                            FaOty5cPp0.elfGet hashmaliciousUnknownBrowse
                            • 176.124.192.196
                            Xzia5WAjUb.elfGet hashmaliciousUnknownBrowse
                            • 176.124.192.196
                            a7GTGrV0u5.elfGet hashmaliciousUnknownBrowse
                            • 176.124.192.196
                            Jy730hXzc6.elfGet hashmaliciousUnknownBrowse
                            • 176.124.192.196
                            uWnjyWVnz5.elfGet hashmaliciousUnknownBrowse
                            • 176.124.192.196
                            CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, BitCoin Miner, SilentXMRMinerBrowse
                            • 172.67.187.100
                            SecuriteInfo.com.Trojan.PackedNET.3065.20099.26130.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            Quote #270924.exeGet hashmaliciousFormBookBrowse
                            • 172.67.165.25
                            https://effective-teammates-567500.framer.app/Get hashmaliciousHTMLPhisherBrowse
                            • 172.65.208.22
                            ATT71817.docxGet hashmaliciousHTMLPhisherBrowse
                            • 188.114.96.3
                            FoS5cjKhd3.exeGet hashmaliciousLummaCBrowse
                            • 104.21.4.136
                            file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
                            • 172.67.162.108
                            https://www.google.fr/url?q=38pQvvq6xRyj7Y00xDjnlx9kIHOSozurMOiaAkImPuQJnOIWtJjqJLi6stjtDz3yh&rct=tTPSrMOiaAkImPuQJnOIWtJjqJLi6stjtFX08pQvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp%2Fcasaderestauraciononline.com%2Fholy%2Findexsyn1.html%23cmltYS5hbWV1ckBjYXRhbGluYW1hcmtldGluZy5mcg==Get hashmaliciousHTMLPhisherBrowse
                            • 188.114.96.3
                            0225139776.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 188.114.96.3
                            https://changeofscene.ladesk.com/605425-Secure-Business-DocumenGet hashmaliciousHTMLPhisherBrowse
                            • 104.17.24.14
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
                            • 172.67.74.152
                            mSLEwIfTGL.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            • 172.67.74.152
                            #docs_8299010377388200191-pdf.jsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 172.67.74.152
                            175-33-26-24.HTA.htaGet hashmaliciousUnknownBrowse
                            • 172.67.74.152
                            zlsXub68El.exeGet hashmaliciousVidarBrowse
                            • 172.67.74.152
                            file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                            • 172.67.74.152
                            SecuriteInfo.com.Adware.DownwareNET.4.15389.24193.exeGet hashmaliciousUnknownBrowse
                            • 172.67.74.152
                            file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                            • 172.67.74.152
                            SecuriteInfo.com.Adware.DownwareNET.4.15389.24193.exeGet hashmaliciousUnknownBrowse
                            • 172.67.74.152
                            file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                            • 172.67.74.152
                            No context
                            No created / dropped files found
                            File type:PE32+ executable (GUI) x86-64, for MS Windows
                            Entropy (8bit):6.389101546656176
                            TrID:
                            • Win64 Executable GUI (202006/5) 92.65%
                            • Win64 Executable (generic) (12005/4) 5.51%
                            • Generic Win/DOS Executable (2004/3) 0.92%
                            • DOS Executable Generic (2002/1) 0.92%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:file.exe
                            File size:1'117'696 bytes
                            MD5:0013399a6a9ab2e3fb25451ed658daa1
                            SHA1:77731500657e6658c6d1b4d09de3fae4f756efef
                            SHA256:0646980e8e68974948861e60bd4497d17464da101ec697241ba8ea96d86d22c6
                            SHA512:3e5a3df2aa90b429fd0a37cc9a02140e3d2324d1291fbd32452260c9374afbaf7243dd59d4a2e1964bfb9ce7474eee89d349648ca80da35c24f52ec9664e18b4
                            SSDEEP:24576:7BZ3miL8zJa5e9AISUzOL9A5q9IbwQmzXrbv4nlxlGfGeIVuj:j3miL8Me9AISUzCDewQ0X4g+eIVu
                            TLSH:62354A15195D02EDD5BE817C8E5A9A13F63638460371A7EB16D187523FA3BE0AF3E320
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:%~.~D.R~D.R~D.R.6.S.D.R.6.S.D.R.:.S!D.R.:.SoD.R.:.SvD.R.6.S.D.R.6.SrD.R.6.ShD.R~D.RgE.R.6.ScD.Rj;.SqD.Rj;.R.D.Rj;.S.D.RRich~D.
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x1400b5d64
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x140000000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x66F5640C [Thu Sep 26 13:39:24 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:2c34752585cf27cdff9273031768b19e
                            Instruction
                            dec eax
                            sub esp, 28h
                            call 00007FB1DCF2F3D0h
                            dec eax
                            add esp, 28h
                            jmp 00007FB1DCF2EC8Fh
                            int3
                            int3
                            and dword ptr [000551E1h], 00000000h
                            ret
                            dec eax
                            mov dword ptr [esp+08h], ebx
                            push ebp
                            dec eax
                            lea ebp, dword ptr [esp-000004C0h]
                            dec eax
                            sub esp, 000005C0h
                            mov ebx, ecx
                            mov ecx, 00000017h
                            call dword ptr [0002250Eh]
                            test eax, eax
                            je 00007FB1DCF2EE16h
                            mov ecx, ebx
                            int 29h
                            mov ecx, 00000003h
                            call 00007FB1DCF2EDD9h
                            xor edx, edx
                            dec eax
                            lea ecx, dword ptr [ebp-10h]
                            inc ecx
                            mov eax, 000004D0h
                            call 00007FB1DCF30C40h
                            dec eax
                            lea ecx, dword ptr [ebp-10h]
                            call dword ptr [000224B1h]
                            dec eax
                            mov ebx, dword ptr [ebp+000000E8h]
                            dec eax
                            lea edx, dword ptr [ebp+000004D8h]
                            dec eax
                            mov ecx, ebx
                            inc ebp
                            xor eax, eax
                            call dword ptr [0002249Fh]
                            dec eax
                            test eax, eax
                            je 00007FB1DCF2EE4Eh
                            dec eax
                            and dword ptr [esp+38h], 00000000h
                            dec eax
                            lea ecx, dword ptr [ebp+000004E0h]
                            dec eax
                            mov edx, dword ptr [ebp+000004D8h]
                            dec esp
                            mov ecx, eax
                            dec eax
                            mov dword ptr [esp+30h], ecx
                            dec esp
                            mov eax, ebx
                            dec eax
                            lea ecx, dword ptr [ebp+000004E8h]
                            dec eax
                            mov dword ptr [esp+28h], ecx
                            dec eax
                            lea ecx, dword ptr [ebp-10h]
                            dec eax
                            mov dword ptr [esp+20h], ecx
                            xor ecx, ecx
                            call dword ptr [00022466h]
                            dec eax
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x101f280x12c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1150000x1e0.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x10d0000x6f90.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1160000xd64.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xeb6d00x38.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0xeb7800x28.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xeb5900x140.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0xd80000x728.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000xd6ecc0xd70002d955d3d3e0b4c30272ea1b69619e270False0.4291537972383721zlib compressed data6.324781390854175IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0xd80000x2b6c80x2b800441c1b3417c4a42c02c517e8c6d2e131False0.47393027119252873data5.694595476059849IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x1040000x85a40x60005fbcdd9847679f1c63be9c85e41b833eFalse0.08390299479166667data4.559223452785583IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0x10d0000x6f900x70009f28ea92727e464a67682730ecd8aeb3False0.48489815848214285data6.043376095189614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            _RDATA0x1140000x15c0x200b52e28908fd472740186bf885f303a5fFalse0.40625data3.345113144897087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x1150000x1e00x200da9e8769aa702da1ca0713d6a0336d18False0.529296875data4.7122981932940915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1160000xd640xe0036456480ce7be1ea5f3ce9804abc508fFalse0.48046875data5.354911204937075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_MANIFEST0x1150600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                            DLLImport
                            WS2_32.dllinet_pton, WSAStartup, send, socket, connect, recv, closesocket, htons, WSACleanup
                            CRYPT32.dllCryptUnprotectData
                            WININET.dllHttpQueryInfoW, InternetQueryDataAvailable, InternetReadFile, InternetCloseHandle, InternetOpenW, InternetOpenA, InternetOpenUrlA
                            ntdll.dllNtQuerySystemInformation, RtlInitUnicodeString, NtAllocateVirtualMemory, LdrEnumerateLoadedModules, RtlAcquirePebLock, RtlReleasePebLock, NtQueryObject
                            RstrtMgr.DLLRmGetList, RmStartSession, RmRegisterResources, RmEndSession
                            KERNEL32.dllCompareStringEx, LCMapStringEx, FindFirstFileW, FindNextFileW, FindClose, OpenProcess, CreateToolhelp32Snapshot, Process32NextW, LoadLibraryA, Process32FirstW, CloseHandle, GetSystemInfo, GetProcAddress, LocalFree, FreeLibrary, ExitProcess, MultiByteToWideChar, WideCharToMultiByte, TerminateProcess, GetModuleFileNameW, CreateMutexA, ReleaseMutex, OpenMutexA, ReadFile, GetModuleFileNameA, GetVolumeInformationW, SetHandleInformation, GetGeoInfoA, HeapFree, EnterCriticalSection, GetCurrentProcess, GetStdHandle, GetProcessId, LeaveCriticalSection, CreatePipe, SetFilePointer, InitializeCriticalSectionEx, FreeEnvironmentStringsW, GetModuleHandleA, HeapSize, GetLogicalDriveStringsW, GetFinalPathNameByHandleA, GetTimeZoneInformation, GetLastError, lstrcatW, HeapReAlloc, HeapAlloc, GetUserGeoID, DecodePointer, GetFileSize, DeleteCriticalSection, GetComputerNameW, GetProcessHeap, GlobalMemoryStatusEx, GetModuleHandleW, lstrcpyW, SetLastError, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, GetCurrentProcessId, GetSystemTimeAsFileTime, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, VirtualAlloc, VirtualProtect, VirtualQuery, GetFileSizeEx, SetFilePointerEx, GetCurrentThreadId, GetFileType, GetStartupInfoW, FlushFileBuffers, WriteFile, GetConsoleOutputCP, GetConsoleMode, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, InitializeCriticalSectionAndSpinCount, LoadLibraryExW, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, ReadConsoleW, RaiseException, SetStdHandle, IsValidCodePage, GetACP, SetEndOfFile, GetCPInfo, GetStringTypeW, CreateFileW, WriteConsoleW, OutputDebugStringW, SetEnvironmentVariableW, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, QueryPerformanceCounter, InitializeSListHead, RtlUnwindEx, RtlUnwind, RtlPcToFileHeader, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetNativeSystemInfo, GetFileInformationByHandleEx, GetEnvironmentStringsW, CreateProcessA, GetOEMCP, AreFileApisANSI, GetTempPathW, SetFileInformationByHandle, GetFileAttributesExW, GetFileAttributesW, FindFirstFileExW, GetCurrentDirectoryW, GetLocaleInfoEx, FormatMessageA
                            USER32.dllEnumDisplayDevicesW, GetDesktopWindow, GetWindowRect, ReleaseDC, GetSystemMetrics, GetDC
                            GDI32.dllCreateCompatibleBitmap, SelectObject, CreateCompatibleDC, BitBlt, DeleteDC, GetObjectW, DeleteObject, GetDeviceCaps
                            ADVAPI32.dllGetCurrentHwProfileW, RegCloseKey, RegGetValueA, RegQueryValueExA, OpenProcessToken, RegOpenKeyExA, GetUserNameW, RegEnumKeyExA, GetTokenInformation, CredEnumerateA, CredFree
                            SHELL32.dllSHGetKnownFolderPath, ShellExecuteW
                            ole32.dllCoInitializeSecurity, CoGetObject, CoTaskMemFree, CoUninitialize, CoCreateInstance, CoSetProxyBlanket, CoInitializeEx
                            OLEAUT32.dllSysAllocStringByteLen, SysFreeString, SysStringByteLen
                            SHLWAPI.dll
                            gdiplus.dllGdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdiplusStartup, GdiplusShutdown, GdipGetImageEncoders, GdipCloneImage, GdipAlloc, GdipCreateBitmapFromHBITMAP, GdipDisposeImage, GdipCreateBitmapFromScan0
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-09-27T17:51:15.562012+02002049441ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt1192.168.2.449730176.124.204.20615666TCP
                            2024-09-27T17:51:15.562012+02002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.449730176.124.204.20615666TCP
                            2024-09-27T17:51:15.562012+02002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.449730176.124.204.20615666TCP
                            2024-09-27T17:51:15.571111+02002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.449730176.124.204.20615666TCP
                            2024-09-27T17:51:15.571111+02002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.449730176.124.204.20615666TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Sep 27, 2024 17:51:11.001513958 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:11.163161039 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:11.163274050 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:11.267786026 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:11.267829895 CEST44349731172.67.74.152192.168.2.4
                            Sep 27, 2024 17:51:11.267919064 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:11.306706905 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:11.306724072 CEST44349731172.67.74.152192.168.2.4
                            Sep 27, 2024 17:51:11.883683920 CEST44349731172.67.74.152192.168.2.4
                            Sep 27, 2024 17:51:11.883824110 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:11.959085941 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:11.959112883 CEST44349731172.67.74.152192.168.2.4
                            Sep 27, 2024 17:51:11.959580898 CEST44349731172.67.74.152192.168.2.4
                            Sep 27, 2024 17:51:11.959745884 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:11.961188078 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:12.003412962 CEST44349731172.67.74.152192.168.2.4
                            Sep 27, 2024 17:51:12.083928108 CEST44349731172.67.74.152192.168.2.4
                            Sep 27, 2024 17:51:12.084080935 CEST44349731172.67.74.152192.168.2.4
                            Sep 27, 2024 17:51:12.084079027 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:12.084157944 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:12.084319115 CEST49731443192.168.2.4172.67.74.152
                            Sep 27, 2024 17:51:12.084338903 CEST44349731172.67.74.152192.168.2.4
                            Sep 27, 2024 17:51:15.562011957 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.570960045 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.570972919 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.570981979 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.570986032 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.570990086 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.571110964 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.571156025 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.571166992 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.571175098 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.571183920 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.571192980 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.571224928 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.571254015 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.571269035 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.583844900 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.583865881 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.583880901 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.583897114 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.583951950 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.584630966 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.584647894 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.584664106 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.584696054 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.584760904 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.585325003 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.585340977 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.585355997 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.585381985 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.585412979 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.591931105 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.591998100 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.592216969 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.592310905 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.592881918 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.592995882 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.594671965 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.594799995 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.596854925 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.596932888 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.596950054 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597012997 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597089052 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597117901 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597148895 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597176075 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597178936 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597234011 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597316980 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597368956 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597426891 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597455978 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597482920 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597507954 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597524881 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597553015 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597579002 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597580910 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597605944 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597609043 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597625017 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597634077 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597661018 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597661972 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597686052 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597690105 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597714901 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597723007 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597747087 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597774982 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.597806931 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.597863913 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.598186970 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.598217010 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.598247051 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.598263025 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.598546028 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.598608971 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.598712921 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.598769903 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599317074 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599349976 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599375963 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599375963 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599411011 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599433899 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599627018 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599653959 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599679947 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599684954 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599709034 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599709988 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599729061 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599760056 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599792004 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599818945 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599845886 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599848032 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599874973 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599879026 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599896908 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599905968 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599930048 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599934101 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.599965096 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.599983931 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600020885 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600048065 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600080013 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600091934 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600337029 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600384951 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600399971 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600411892 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600438118 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600440025 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600464106 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600493908 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600500107 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600523949 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600548983 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600550890 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600579977 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600580931 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600596905 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600609064 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.600634098 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.600668907 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.601694107 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.601744890 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.601752996 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.601773024 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.601804972 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.601810932 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.601833105 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.601833105 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.601844072 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.601861000 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.601885080 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.601914883 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.601926088 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.601974010 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.601982117 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.602035999 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.603249073 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.603276968 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.603302956 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.603332043 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.603403091 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.603451967 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.603481054 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.603507996 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.603534937 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.603538990 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.603565931 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.603591919 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.603893042 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.603921890 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.603949070 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.603955030 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.603971958 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.603979111 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604001999 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.604007006 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604036093 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.604059935 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604063034 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.604114056 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.604772091 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604800940 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604826927 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604854107 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604866028 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.604887962 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.604902029 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604908943 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.604929924 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604945898 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.604958057 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604985952 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.604986906 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605012894 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605012894 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605026007 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605041027 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605065107 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605067015 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605094910 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605094910 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605120897 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605133057 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605143070 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605170965 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605196953 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605202913 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605226040 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605222940 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605240107 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605253935 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605278015 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605279922 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605308056 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605308056 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605329990 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605355978 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605357885 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605386972 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605412960 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605417013 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605438948 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605441093 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605452061 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605485916 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605513096 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605518103 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605536938 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605545998 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605561018 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605602026 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605679989 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605706930 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605732918 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605734110 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605760098 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605761051 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605786085 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605811119 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605813980 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605839968 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605866909 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605869055 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605895042 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.605899096 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605921984 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.605940104 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606031895 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606087923 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606115103 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606142998 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606172085 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606174946 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606199980 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606200933 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606221914 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606228113 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606252909 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606281042 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606432915 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606462002 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606487036 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606488943 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606514931 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606518984 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606529951 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606547117 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606571913 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606574059 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606601000 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606604099 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606627941 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606650114 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606654882 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606677055 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606704950 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606718063 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606731892 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606758118 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606759071 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606789112 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606791973 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606816053 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606842041 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606843948 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606868982 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606870890 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606888056 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606897116 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.606918097 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.606951952 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.607629061 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.607656956 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.607682943 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.607688904 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.607702017 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.607711077 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.607738972 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.607742071 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.607762098 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.607765913 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.607796907 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.607810020 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.607897043 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.607923985 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.607950926 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.607955933 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.607984066 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.607984066 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608011961 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608011961 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608040094 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608041048 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608066082 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608068943 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608097076 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608103037 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608125925 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608130932 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608159065 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608160973 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608186960 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608190060 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608201981 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608215094 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608242035 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608244896 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608269930 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608275890 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608288050 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608298063 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608319044 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608329058 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608345985 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608378887 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608500957 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608556032 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608767033 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608817101 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608839989 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608849049 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608856916 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608865023 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608896971 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608915091 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608922958 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608973980 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.608974934 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.608985901 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.609021902 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.609040022 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.609092951 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.609102964 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.609110117 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.609113932 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.609122038 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.609169006 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.609333992 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.609386921 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.610054970 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610105038 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.610110044 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610120058 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610130072 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610138893 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610146999 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610155106 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610169888 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.610203981 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.610349894 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610358953 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610367060 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610374928 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610383034 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610416889 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.610439062 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.610845089 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610853910 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610862017 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610910892 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610913038 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.610920906 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610929966 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610939026 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610946894 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610955000 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610963106 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.610964060 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610972881 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.610980034 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.610981941 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.611022949 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.611038923 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.611454964 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.611514091 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.611668110 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.611677885 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.611685038 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.611692905 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.611704111 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.611711025 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.611736059 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.611761093 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.611774921 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612111092 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612121105 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612128019 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612137079 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612181902 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612281084 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612289906 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612298965 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612343073 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612373114 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612381935 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612390041 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612399101 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612435102 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612447023 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612505913 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612514973 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612523079 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612530947 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612540007 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612550020 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612557888 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612565994 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612572908 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612575054 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612588882 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612621069 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612634897 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612747908 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612756968 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612766027 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612775087 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612783909 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612791061 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612798929 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.612808943 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612837076 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612849951 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.612955093 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613007069 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613569021 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613579035 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613589048 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613596916 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613605976 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613612890 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613620996 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613629103 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613637924 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613637924 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613646030 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613656044 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613663912 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613672018 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613677979 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613679886 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613689899 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613699913 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613707066 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613708019 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613722086 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613732100 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613734007 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613749027 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613759041 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613759995 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613768101 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613785028 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613792896 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613797903 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613802910 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613812923 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613820076 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613826036 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613831043 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613841057 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613850117 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613853931 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613859892 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613868952 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613871098 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613878965 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613898993 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613908052 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613918066 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613919020 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613925934 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613939047 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613945961 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613950014 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.613955975 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613965034 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.613976955 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614007950 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614034891 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614044905 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614053011 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614062071 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614070892 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614097118 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614110947 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614135981 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614178896 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614187956 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614196062 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614204884 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614213943 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614222050 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614231110 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614236116 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614238977 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614250898 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614259005 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614259958 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614269018 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614280939 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614289045 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614294052 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614296913 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614305973 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614314079 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614320993 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614322901 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614331961 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614339113 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614342928 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614360094 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614368916 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614375114 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614377022 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614394903 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614427090 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614581108 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614589930 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614598036 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614605904 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614614964 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614622116 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614629984 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614638090 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614646912 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614648104 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614655972 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614665031 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614665985 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614675045 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614686012 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614695072 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614695072 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614710093 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614716053 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614718914 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614728928 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614737034 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614744902 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614768028 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614785910 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614830971 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614840031 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614949942 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.614963055 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614972115 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614979982 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614988089 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.614996910 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615005016 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615012884 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615020990 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615024090 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615030050 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615039110 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615045071 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615046978 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615056038 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615067005 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615075111 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615082979 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615087032 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615092993 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615103960 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615104914 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615114927 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615123034 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615128994 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615130901 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615140915 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615147114 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615149975 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615159035 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615175962 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615178108 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615185022 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615195990 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615204096 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615205050 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615212917 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615222931 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615226984 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615232944 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615247011 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615250111 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615259886 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615267992 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615272045 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615278006 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615287066 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615294933 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615299940 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615304947 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615314960 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615314960 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615328074 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615336895 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615345955 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615353107 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615356922 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615367889 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615370989 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615376949 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615418911 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615422010 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615428925 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615437984 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615446091 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615454912 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615463972 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615473032 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615480900 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615483046 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615492105 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.615495920 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615505934 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.615546942 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.657979012 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.660192966 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.660629988 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.660702944 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.660767078 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.660842896 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.660907030 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.660969973 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.661019087 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.661077976 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.661129951 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.661206007 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.661254883 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.688292980 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.688391924 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.721888065 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.722120047 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.722208023 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.722264051 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.722327948 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.722392082 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.722455978 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.722507000 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.760761023 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.760875940 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.771131039 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.771511078 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.771599054 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.771647930 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.771701097 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.771759987 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.771811962 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.771863937 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.771925926 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.771977901 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.772030115 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.772082090 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.772145033 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.772171974 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.777594090 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.780078888 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.820749044 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.821911097 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.821995974 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.822031021 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.879190922 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.879277945 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.889034986 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.889297962 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.889386892 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.889442921 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.901577950 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.901787043 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.901865959 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.901907921 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924156904 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.924247026 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924297094 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.924308062 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.924559116 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924623966 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924704075 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924762011 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924818039 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924870968 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924918890 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924968958 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.924982071 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.931338072 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.931535006 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.972847939 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.972968102 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.999583960 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.999614000 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:15.999907970 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:15.999984980 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.000041962 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.000097036 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.000147104 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.000221014 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.000271082 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.000338078 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.000360966 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.006663084 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.010309935 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.010377884 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.010436058 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.010499954 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.010548115 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.010612011 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.010627985 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.050806046 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.050986052 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.059434891 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.059653997 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060010910 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060082912 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060133934 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060189009 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060239077 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060296059 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060344934 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060416937 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060468912 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060528994 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060583115 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060647011 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.060694933 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.064548016 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.064630985 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.064960957 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.064992905 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065020084 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065043926 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065135956 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065165043 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065193892 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065196991 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065220118 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065221071 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065231085 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065252066 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065273046 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065279007 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065304041 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065305948 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065327883 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065335035 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065341949 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065361977 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065385103 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065388918 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065409899 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065417051 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065443039 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065443993 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065465927 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065478086 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065500975 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065505028 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065530062 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065532923 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065558910 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065562010 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065583944 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065587997 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065608025 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065615892 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065643072 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065644026 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065665007 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065692902 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065699100 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065726995 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065752983 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065754890 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065781116 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065784931 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065797091 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065809011 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065831900 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065835953 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065861940 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065865040 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065876961 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065891981 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065913916 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065920115 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065943003 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065949917 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.065974951 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.065979004 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066004992 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066005945 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066030979 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066034079 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066062927 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066066027 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066090107 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066107035 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066118002 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066143990 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066145897 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066164970 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066171885 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066195011 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066199064 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066226959 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066231012 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066245079 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066253901 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066274881 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066282034 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066308975 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066312075 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066333055 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066337109 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066360950 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066385031 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066448927 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066487074 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066513062 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066513062 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066534996 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066541910 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066565037 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066569090 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066591024 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066596031 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066615105 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066622019 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066648006 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066652060 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066663027 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066675901 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066700935 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066704035 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066730976 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066731930 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066756964 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066759109 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066768885 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066786051 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066813946 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066814899 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066842079 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066845894 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066857100 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066869974 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066895008 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066900015 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066922903 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066926956 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066953897 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.066956043 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066986084 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.066992998 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067008018 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067013025 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067039013 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067040920 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067061901 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067068100 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067089081 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067095995 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067122936 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067132950 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067145109 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067152977 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067173004 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067193985 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067198038 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067222118 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067249060 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067250013 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067274094 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067276955 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067306042 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067306042 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067334890 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067337036 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067348003 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067362070 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067404985 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067416906 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067454100 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067454100 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067487001 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067508936 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067514896 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067538977 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067543030 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067558050 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067570925 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067594051 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067600012 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067620039 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067627907 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067645073 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067655087 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067679882 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067681074 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067709923 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067709923 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067724943 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067738056 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067764044 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067764997 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067791939 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067791939 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067812920 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067821026 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067847967 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067856073 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067872047 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067876101 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067900896 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067908049 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067925930 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067960978 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.067962885 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.067991972 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068018913 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068021059 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068047047 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068048000 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068058968 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068075895 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068101883 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068103075 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068124056 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068130970 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068156004 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068159103 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068186045 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068186998 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068213940 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068214893 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068231106 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068243980 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068253994 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068270922 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068298101 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068298101 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068320990 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068325996 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068351984 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068351984 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068377018 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068380117 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068397045 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068408966 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068428993 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068435907 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068460941 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068464041 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068490982 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068491936 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068509102 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068511963 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068521023 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.068546057 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068557024 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.068567038 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.112943888 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.113163948 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.113895893 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.113965988 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114023924 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114073038 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114121914 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114167929 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114211082 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114269972 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114325047 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114382982 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114428043 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114481926 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114527941 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114574909 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114624023 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114677906 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.114698887 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.147425890 CEST1566649730176.124.204.206192.168.2.4
                            Sep 27, 2024 17:51:16.150501013 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.150574923 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.150619984 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.150666952 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.150722980 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.150778055 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.150834084 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.150895119 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.150955915 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.151005983 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.151061058 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.151127100 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.151175976 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.151226997 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.151276112 CEST4973015666192.168.2.4176.124.204.206
                            Sep 27, 2024 17:51:16.151325941 CEST4973015666192.168.2.4176.124.204.206
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Sep 27, 2024 17:51:11.252341986 CEST192.168.2.41.1.1.10xaf16Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Sep 27, 2024 17:51:11.260715008 CEST1.1.1.1192.168.2.40xaf16No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                            Sep 27, 2024 17:51:11.260715008 CEST1.1.1.1192.168.2.40xaf16No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                            Sep 27, 2024 17:51:11.260715008 CEST1.1.1.1192.168.2.40xaf16No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.449731172.67.74.1524436776C:\Users\user\Desktop\file.exe
                            TimestampBytes transferredDirectionData
                            2024-09-27 15:51:11 UTC100OUTGET / HTTP/1.1
                            Accept: text/html; text/plain; */*
                            Host: api.ipify.org
                            Cache-Control: no-cache
                            2024-09-27 15:51:12 UTC211INHTTP/1.1 200 OK
                            Date: Fri, 27 Sep 2024 15:51:12 GMT
                            Content-Type: text/plain
                            Content-Length: 11
                            Connection: close
                            Vary: Origin
                            CF-Cache-Status: DYNAMIC
                            Server: cloudflare
                            CF-RAY: 8c9ca75c1e3ac413-EWR
                            2024-09-27 15:51:12 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                            Data Ascii: 8.46.123.33


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:11:51:10
                            Start date:27/09/2024
                            Path:C:\Users\user\Desktop\file.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\file.exe"
                            Imagebase:0x7ff67a360000
                            File size:1'117'696 bytes
                            MD5 hash:0013399A6A9AB2E3FB25451ED658DAA1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:6.9%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:32.9%
                              Total number of Nodes:1834
                              Total number of Limit Nodes:79
                              execution_graph 68231 7ff67a3c1a80 68330 7ff67a3903b0 68231->68330 68234 7ff67a3903b0 107 API calls 68235 7ff67a3c2370 68234->68235 68248 7ff67a3c278c ISource 68235->68248 68336 7ff67a38f020 68235->68336 68247 7ff67a3c2753 68247->68248 68249 7ff67a3c27d3 68247->68249 68378 7ff67a415220 68248->68378 68373 7ff67a3f8d28 68249->68373 68331 7ff67a3903e1 68330->68331 68387 7ff67a41c138 68331->68387 68334 7ff67a415220 _Strxfrm 8 API calls 68335 7ff67a390482 68334->68335 68335->68234 68339 7ff67a38f040 68336->68339 68338 7ff67a38f0ca 68340 7ff67a38eeb0 68338->68340 68435 7ff67a396990 68339->68435 68341 7ff67a38eee0 68340->68341 68482 7ff67a41bde8 68341->68482 68344 7ff67a38ef77 68355 7ff67a3c4a50 68344->68355 68346 7ff67a38ef33 68347 7ff67a38efc4 68346->68347 68488 7ff67a3a18d0 68346->68488 68496 7ff67a38eaf0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 68347->68496 68350 7ff67a38ef50 68494 7ff67a41be58 WideCharToMultiByte WideCharToMultiByte GetLastError WideCharToMultiByte GetLastError 68350->68494 68353 7ff67a38ef6f 68353->68344 68495 7ff67a38eaf0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 68353->68495 68356 7ff67a3c4a76 68355->68356 68577 7ff67a3c65c0 68356->68577 68358 7ff67a3c23c9 68359 7ff67a3e2b90 68358->68359 68583 7ff67a3e1f20 68359->68583 68362 7ff67a3e2bea 68364 7ff67a392bb0 83 API calls 68362->68364 68365 7ff67a3e2c5d 68364->68365 68366 7ff67a415220 _Strxfrm 8 API calls 68365->68366 68367 7ff67a3c2483 68366->68367 68368 7ff67a392bb0 68367->68368 68369 7ff67a392bf2 ISource 68368->68369 68370 7ff67a392bc4 68368->68370 68369->68247 68370->68369 68371 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 68370->68371 68372 7ff67a392c18 68371->68372 69188 7ff67a3f8b9c 83 API calls 2 library calls 68373->69188 68375 7ff67a3f8d41 69189 7ff67a3f8d58 IsProcessorFeaturePresent 68375->69189 68379 7ff67a415229 68378->68379 68380 7ff67a3c27b7 68379->68380 68381 7ff67a4158a4 IsProcessorFeaturePresent 68379->68381 68382 7ff67a4158bc 68381->68382 69194 7ff67a415a98 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 68382->69194 68384 7ff67a4158cf 69195 7ff67a415870 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 68384->69195 68389 7ff67a41c17a 68387->68389 68388 7ff67a41c183 68391 7ff67a415220 _Strxfrm 8 API calls 68388->68391 68389->68388 68390 7ff67a41c295 68389->68390 68393 7ff67a41c1db GetFileAttributesExW 68389->68393 68430 7ff67a41c50c CreateFileW GetLastError 68390->68430 68394 7ff67a3903fd 68391->68394 68396 7ff67a41c1ef GetLastError 68393->68396 68397 7ff67a41c240 68393->68397 68394->68334 68395 7ff67a41c2b8 68398 7ff67a41c2de 68395->68398 68399 7ff67a41c2be 68395->68399 68396->68388 68400 7ff67a41c1fe FindFirstFileW 68396->68400 68397->68388 68397->68390 68403 7ff67a41c2ed GetFileInformationByHandleEx 68398->68403 68422 7ff67a41c38b 68398->68422 68401 7ff67a41c2d7 68399->68401 68402 7ff67a41c2c9 CloseHandle 68399->68402 68404 7ff67a41c21d FindClose 68400->68404 68405 7ff67a41c212 GetLastError 68400->68405 68401->68388 68402->68401 68406 7ff67a41c44d 68402->68406 68409 7ff67a41c307 GetLastError 68403->68409 68410 7ff67a41c32d 68403->68410 68404->68397 68405->68388 68431 7ff67a40876c 88 API calls 2 library calls 68406->68431 68407 7ff67a41c3a6 GetFileInformationByHandleEx 68408 7ff67a41c3e0 68407->68408 68412 7ff67a41c3bc GetLastError 68407->68412 68414 7ff67a41c3f7 68408->68414 68415 7ff67a41c433 68408->68415 68409->68401 68413 7ff67a41c315 CloseHandle 68409->68413 68420 7ff67a41c34e GetFileInformationByHandleEx 68410->68420 68410->68422 68412->68401 68418 7ff67a41c3ce CloseHandle 68412->68418 68413->68401 68429 7ff67a41c45e 68413->68429 68414->68388 68419 7ff67a41c3fd CloseHandle 68414->68419 68415->68401 68416 7ff67a41c439 CloseHandle 68415->68416 68416->68401 68416->68406 68417 7ff67a41c452 68432 7ff67a40876c 88 API calls 2 library calls 68417->68432 68418->68401 68428 7ff67a41c458 68418->68428 68419->68388 68419->68406 68420->68422 68423 7ff67a41c36a GetLastError 68420->68423 68422->68407 68422->68408 68423->68401 68427 7ff67a41c378 CloseHandle 68423->68427 68426 7ff67a41c464 68427->68401 68427->68417 68433 7ff67a40876c 88 API calls 2 library calls 68428->68433 68434 7ff67a40876c 88 API calls 2 library calls 68429->68434 68430->68395 68431->68417 68432->68428 68433->68429 68434->68426 68439 7ff67a3969b6 68435->68439 68446 7ff67a396ab1 68435->68446 68436 7ff67a3969c9 ctype 68436->68338 68438 7ff67a396a03 68440 7ff67a396aac 68438->68440 68442 7ff67a396a4a 68438->68442 68439->68436 68439->68438 68439->68440 68445 7ff67a396a65 68439->68445 68461 7ff67a38d390 86 API calls 2 library calls 68440->68461 68451 7ff67a4154e0 68442->68451 68443 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 68444 7ff67a396abd 68443->68444 68448 7ff67a4154e0 std::_Facet_Register 86 API calls 68445->68448 68450 7ff67a396a57 ctype 68445->68450 68462 7ff67a38d450 86 API calls 68446->68462 68448->68450 68450->68338 68455 7ff67a4154eb 68451->68455 68453 7ff67a396a52 68453->68443 68453->68450 68455->68453 68456 7ff67a41550a 68455->68456 68463 7ff67a4107a0 68455->68463 68466 7ff67a400aa4 68455->68466 68457 7ff67a415515 68456->68457 68473 7ff67a4162fc RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 68456->68473 68474 7ff67a38d390 86 API calls 2 library calls 68457->68474 68460 7ff67a41551b 68461->68446 68475 7ff67a4107dc 68463->68475 68471 7ff67a406df4 wcsftime 68466->68471 68467 7ff67a406e3f 68481 7ff67a3fd1cc 11 API calls memcpy_s 68467->68481 68468 7ff67a406e26 HeapAlloc 68470 7ff67a406e3d 68468->68470 68468->68471 68470->68455 68471->68467 68471->68468 68472 7ff67a4107a0 std::_Facet_Register 2 API calls 68471->68472 68472->68471 68473->68457 68474->68460 68480 7ff67a4035ac EnterCriticalSection 68475->68480 68481->68470 68497 7ff67a40d4ec 68482->68497 68485 7ff67a38eeec 68485->68344 68485->68347 68487 7ff67a41be58 WideCharToMultiByte WideCharToMultiByte GetLastError WideCharToMultiByte GetLastError 68485->68487 68486 7ff67a41bdfa AreFileApisANSI 68486->68485 68487->68346 68489 7ff67a3a18e5 68488->68489 68490 7ff67a3a18fb 68488->68490 68489->68350 68491 7ff67a3a1915 memcpy_s 68490->68491 68560 7ff67a3a76b0 68490->68560 68491->68350 68493 7ff67a3a1961 68493->68350 68494->68353 68502 7ff67a4010dc GetLastError 68497->68502 68503 7ff67a401100 FlsGetValue 68502->68503 68504 7ff67a40111d FlsSetValue 68502->68504 68506 7ff67a40110d 68503->68506 68507 7ff67a401117 68503->68507 68505 7ff67a40112f 68504->68505 68504->68506 68549 7ff67a404abc 11 API calls 3 library calls 68505->68549 68508 7ff67a401189 SetLastError 68506->68508 68507->68504 68510 7ff67a4011a9 68508->68510 68511 7ff67a401196 68508->68511 68557 7ff67a400aac 83 API calls 2 library calls 68510->68557 68545 7ff67a403364 68511->68545 68512 7ff67a40113e 68514 7ff67a40115c FlsSetValue 68512->68514 68515 7ff67a40114c FlsSetValue 68512->68515 68518 7ff67a40117a 68514->68518 68519 7ff67a401168 FlsSetValue 68514->68519 68517 7ff67a401155 68515->68517 68550 7ff67a404454 68517->68550 68556 7ff67a400e8c 11 API calls _Strcoll 68518->68556 68519->68517 68528 7ff67a401182 68532 7ff67a404454 __free_lconv_num 11 API calls 68528->68532 68532->68508 68546 7ff67a40338c 68545->68546 68547 7ff67a403379 68545->68547 68546->68485 68546->68486 68547->68546 68559 7ff67a40c75c 83 API calls 3 library calls 68547->68559 68549->68512 68551 7ff67a404459 RtlFreeHeap 68550->68551 68555 7ff67a40115a 68550->68555 68552 7ff67a404474 GetLastError 68551->68552 68551->68555 68553 7ff67a404481 __free_lconv_num 68552->68553 68558 7ff67a3fd1cc 11 API calls memcpy_s 68553->68558 68555->68506 68556->68528 68558->68555 68559->68546 68561 7ff67a3a7842 68560->68561 68563 7ff67a3a76de 68560->68563 68575 7ff67a38d450 86 API calls 68561->68575 68565 7ff67a3a7774 68563->68565 68566 7ff67a3a7748 68563->68566 68564 7ff67a3a7847 68576 7ff67a38d390 86 API calls 2 library calls 68564->68576 68570 7ff67a4154e0 std::_Facet_Register 86 API calls 68565->68570 68573 7ff67a3a775d memcpy_s ctype 68565->68573 68566->68564 68567 7ff67a3a7755 68566->68567 68569 7ff67a4154e0 std::_Facet_Register 86 API calls 68567->68569 68569->68573 68570->68573 68571 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 68572 7ff67a3a7853 68571->68572 68573->68571 68574 7ff67a3a77f1 ISource memcpy_s ctype 68573->68574 68574->68493 68576->68573 68578 7ff67a3c6685 68577->68578 68581 7ff67a3c65f0 ctype 68577->68581 68582 7ff67a3ca790 92 API calls 5 library calls 68578->68582 68580 7ff67a3c669a 68580->68358 68581->68358 68582->68580 68584 7ff67a3903b0 107 API calls 68583->68584 68585 7ff67a3e1f71 68584->68585 68586 7ff67a3e265e 68585->68586 68591 7ff67a3e1fad memcpy_s 68585->68591 68587 7ff67a3e260e 68586->68587 68588 7ff67a3e269c 68586->68588 68590 7ff67a415220 _Strxfrm 8 API calls 68587->68590 68704 7ff67a38fbe0 91 API calls Concurrency::cancel_current_task 68588->68704 68592 7ff67a3e2680 68590->68592 68591->68587 68646 7ff67a3f0f30 68591->68646 68592->68362 68641 7ff67a3a40b0 68592->68641 68594 7ff67a3e26b2 68596 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 68594->68596 68605 7ff67a3e26b8 68596->68605 68597 7ff67a3e2014 68698 7ff67a3ed410 38 API calls 3 library calls 68597->68698 68598 7ff67a3e2459 68659 7ff67a3b6800 68598->68659 68603 7ff67a3e2026 68699 7ff67a3ed610 111 API calls 7 library calls 68603->68699 68705 7ff67a38e870 86 API calls 68605->68705 68607 7ff67a3e2487 68614 7ff67a3b6800 120 API calls 68607->68614 68609 7ff67a3e2037 68611 7ff67a3e213a GetFileSize 68609->68611 68612 7ff67a3e204a 68609->68612 68610 7ff67a3e26de 68706 7ff67a418404 68610->68706 68617 7ff67a3e217b 68611->68617 68619 7ff67a3e2156 memcpy_s 68611->68619 68612->68594 68615 7ff67a3e2091 ISource 68612->68615 68616 7ff67a3e24c0 68614->68616 68700 7ff67a3b3610 87 API calls 68615->68700 68678 7ff67a3f10d0 68616->68678 68617->68619 68622 7ff67a3a76b0 86 API calls 68617->68622 68618 7ff67a3e21e0 SetFilePointer ReadFile 68630 7ff67a3e235b 68618->68630 68632 7ff67a3e222f 68618->68632 68619->68618 68622->68618 68624 7ff67a3e26ef 68711 7ff67a38e870 86 API calls 68624->68711 68625 7ff67a3e2548 68692 7ff67a3b3e70 68625->68692 68627 7ff67a3e23b0 ISource 68702 7ff67a3b3610 87 API calls 68627->68702 68628 7ff67a3e22b2 ISource 68701 7ff67a3b3610 87 API calls 68628->68701 68630->68594 68630->68627 68632->68594 68632->68628 68635 7ff67a3e2583 68703 7ff67a3b3610 87 API calls 68635->68703 68636 7ff67a3e20e9 68636->68587 68638 7ff67a3e2734 68639 7ff67a418404 Concurrency::cancel_current_task 2 API calls 68638->68639 68640 7ff67a3e2745 68639->68640 68642 7ff67a3a18d0 86 API calls 68641->68642 68643 7ff67a3a411a 68642->68643 68644 7ff67a3a18d0 86 API calls 68643->68644 68645 7ff67a3a422d 68644->68645 68645->68362 68647 7ff67a3f0f56 68646->68647 68712 7ff67a3a36e0 68647->68712 68653 7ff67a3e1fd8 68653->68597 68653->68598 68654 7ff67a3f101a 68654->68653 68739 7ff67a38e870 86 API calls 68654->68739 68656 7ff67a3f10b8 68657 7ff67a418404 Concurrency::cancel_current_task 2 API calls 68656->68657 68658 7ff67a3f10c9 68657->68658 68660 7ff67a3b685d 68659->68660 68662 7ff67a3b6942 68659->68662 68928 7ff67a3b7080 68660->68928 68987 7ff67a38e870 86 API calls 68662->68987 68663 7ff67a3b6882 68668 7ff67a3b68b9 68663->68668 68977 7ff67a3b2bf0 68663->68977 68665 7ff67a3b690f 68674 7ff67a3b6720 68665->68674 68666 7ff67a3b6984 68667 7ff67a418404 Concurrency::cancel_current_task 2 API calls 68666->68667 68667->68668 68668->68665 68988 7ff67a38e870 86 API calls 68668->68988 68670 7ff67a3b69dd 68671 7ff67a418404 Concurrency::cancel_current_task 2 API calls 68670->68671 68672 7ff67a3b69f1 68671->68672 68676 7ff67a3b6750 68674->68676 68675 7ff67a3b7080 119 API calls 68677 7ff67a3b675f 68675->68677 68676->68675 68677->68607 68679 7ff67a3f1128 68678->68679 68680 7ff67a3f1146 68678->68680 68679->68680 69099 7ff67a3b2fd0 68679->69099 68681 7ff67a3f1206 68680->68681 69120 7ff67a3f6720 68680->69120 68685 7ff67a3f1211 68681->68685 69133 7ff67a3a33a0 68681->69133 68684 7ff67a3f1296 ISource 68686 7ff67a415220 _Strxfrm 8 API calls 68684->68686 68685->68684 68687 7ff67a3f12d5 68685->68687 68688 7ff67a3e2523 68686->68688 68689 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 68687->68689 68688->68605 68688->68625 68690 7ff67a3f12da 68689->68690 68693 7ff67a3b3e8f 68692->68693 68697 7ff67a3b3edb 68692->68697 68694 7ff67a3b3c80 84 API calls 68693->68694 68695 7ff67a3b3ec4 68694->68695 68696 7ff67a3f7680 86 API calls 68695->68696 68696->68697 68697->68624 68697->68635 68698->68603 68699->68609 68700->68636 68701->68636 68702->68636 68703->68587 68705->68610 68707 7ff67a418440 RtlPcToFileHeader 68706->68707 68708 7ff67a418423 68706->68708 68709 7ff67a418467 RaiseException 68707->68709 68710 7ff67a418458 68707->68710 68708->68707 68709->68624 68710->68709 68711->68638 68713 7ff67a4154e0 std::_Facet_Register 86 API calls 68712->68713 68714 7ff67a3a3740 68713->68714 68740 7ff67a41d090 68714->68740 68716 7ff67a3a3750 68749 7ff67a3a3bc0 68716->68749 68719 7ff67a3a37e0 68720 7ff67a3a37ed 68719->68720 68764 7ff67a41d35c 6 API calls std::_Lockit::_Lockit 68719->68764 68727 7ff67a3b4230 68720->68727 68722 7ff67a3a3808 68765 7ff67a38e870 86 API calls 68722->68765 68724 7ff67a3a3848 68725 7ff67a418404 Concurrency::cancel_current_task 2 API calls 68724->68725 68726 7ff67a3a3859 68725->68726 68776 7ff67a3a32f0 68727->68776 68730 7ff67a3c6460 68731 7ff67a3c6485 68730->68731 68732 7ff67a3c6514 68730->68732 68781 7ff67a41d5cc 68731->68781 68732->68654 68736 7ff67a3c64ab 68790 7ff67a3b5750 119 API calls 4 library calls 68736->68790 68738 7ff67a3c64d1 68738->68654 68739->68656 68766 7ff67a41ca6c 68740->68766 68742 7ff67a41d0b2 68748 7ff67a41d114 ctype 68742->68748 68770 7ff67a41d288 86 API calls std::_Facet_Register 68742->68770 68744 7ff67a41d0ca 68771 7ff67a41d2b8 84 API calls std::locale::_Setgloballocale 68744->68771 68746 7ff67a41d0d5 __std_exception_destroy 68747 7ff67a400aa4 __std_exception_copy 12 API calls 68746->68747 68746->68748 68747->68748 68748->68716 68750 7ff67a41ca6c std::_Lockit::_Lockit 6 API calls 68749->68750 68751 7ff67a3a3bf0 68750->68751 68752 7ff67a41ca6c std::_Lockit::_Lockit 6 API calls 68751->68752 68754 7ff67a3a3c15 68751->68754 68752->68754 68753 7ff67a3a3c8d 68755 7ff67a415220 _Strxfrm 8 API calls 68753->68755 68754->68753 68773 7ff67a38e510 126 API calls 7 library calls 68754->68773 68756 7ff67a3a3785 68755->68756 68756->68719 68756->68722 68758 7ff67a3a3c9f 68759 7ff67a3a3ca5 68758->68759 68760 7ff67a3a3d06 68758->68760 68774 7ff67a41d050 86 API calls std::_Facet_Register 68759->68774 68775 7ff67a38e050 86 API calls 2 library calls 68760->68775 68763 7ff67a3a3d0b 68764->68720 68765->68724 68767 7ff67a41ca7b 68766->68767 68768 7ff67a41ca80 68766->68768 68772 7ff67a40361c 6 API calls std::_Locinfo::_Locinfo_ctor 68767->68772 68768->68742 68770->68744 68771->68746 68773->68758 68774->68753 68775->68763 68777 7ff67a4154e0 std::_Facet_Register 86 API calls 68776->68777 68778 7ff67a3a3311 68777->68778 68779 7ff67a41d090 93 API calls 68778->68779 68780 7ff67a3a3321 68779->68780 68780->68730 68783 7ff67a41d60e 68781->68783 68784 7ff67a3c6495 68783->68784 68791 7ff67a41efc8 68783->68791 68784->68732 68789 7ff67a3b3d70 83 API calls _Strxfrm 68784->68789 68787 7ff67a41d65b 68787->68784 68811 7ff67a3f7680 68787->68811 68789->68736 68790->68738 68792 7ff67a41eef4 68791->68792 68793 7ff67a41ef1a 68792->68793 68795 7ff67a41ef4d 68792->68795 68831 7ff67a3fd1cc 11 API calls memcpy_s 68793->68831 68797 7ff67a41ef60 68795->68797 68798 7ff67a41ef53 68795->68798 68796 7ff67a41ef1f 68832 7ff67a3f8d08 83 API calls _invalid_parameter_noinfo 68796->68832 68819 7ff67a404734 68797->68819 68833 7ff67a3fd1cc 11 API calls memcpy_s 68798->68833 68802 7ff67a41d641 68802->68784 68810 7ff67a3f88e4 83 API calls ProcessCodePage 68802->68810 68810->68787 68812 7ff67a3f76b0 68811->68812 68914 7ff67a3f7560 68812->68914 68814 7ff67a3f76c9 68816 7ff67a3f76ee 68814->68816 68924 7ff67a3f6cc8 83 API calls 2 library calls 68814->68924 68818 7ff67a3f7703 68816->68818 68925 7ff67a3f6cc8 83 API calls 2 library calls 68816->68925 68818->68784 68836 7ff67a4035ac EnterCriticalSection 68819->68836 68831->68796 68832->68802 68833->68802 68915 7ff67a3f757b 68914->68915 68916 7ff67a3f75a9 68914->68916 68927 7ff67a3f8c38 83 API calls 2 library calls 68915->68927 68918 7ff67a3f759b 68916->68918 68926 7ff67a3f7a4c EnterCriticalSection 68916->68926 68918->68814 68924->68816 68925->68818 68927->68918 68929 7ff67a3b70c0 68928->68929 68933 7ff67a3b709d 68928->68933 68931 7ff67a3b70ce 68929->68931 68989 7ff67a3a8af0 68929->68989 68930 7ff67a3b70ba 68930->68663 68931->68663 68933->68930 69013 7ff67a38e870 86 API calls 68933->69013 68935 7ff67a3b7123 68936 7ff67a418404 Concurrency::cancel_current_task 2 API calls 68935->68936 68945 7ff67a3b7134 ISource 68936->68945 68937 7ff67a3b7295 68937->68663 68938 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 68939 7ff67a3b73e8 68938->68939 69014 7ff67a3b61f0 119 API calls 8 library calls 68939->69014 68941 7ff67a3b747d 69016 7ff67a3b61f0 119 API calls 8 library calls 68941->69016 68944 7ff67a3b749c 69017 7ff67a3ad090 86 API calls _Strxfrm 68944->69017 68945->68937 68945->68938 68945->68945 68946 7ff67a3b744a 68946->68941 68948 7ff67a3b7526 68946->68948 69015 7ff67a3ad090 86 API calls _Strxfrm 68946->69015 68949 7ff67a3b7551 68948->68949 69020 7ff67a3b6070 86 API calls 3 library calls 68948->69020 68955 7ff67a3b757a 68949->68955 69021 7ff67a3b5c00 119 API calls 3 library calls 68949->69021 68952 7ff67a3b776b ISource 69026 7ff67a3a7d00 83 API calls 2 library calls 68952->69026 68953 7ff67a3b74f3 68974 7ff67a3b7520 68953->68974 69019 7ff67a3b5c00 119 API calls 3 library calls 68953->69019 68954 7ff67a3b74b5 68954->68953 68963 7ff67a3b7676 ISource 68954->68963 68954->68974 69018 7ff67a3b6070 86 API calls 3 library calls 68954->69018 68955->68952 68961 7ff67a3b77b3 68955->68961 68957 7ff67a3b767a 68960 7ff67a3b76b2 68957->68960 69023 7ff67a3b6070 86 API calls 3 library calls 68957->69023 68960->68963 69024 7ff67a3b5c00 119 API calls 3 library calls 68960->69024 68968 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 68961->68968 68962 7ff67a3b7789 68966 7ff67a415220 _Strxfrm 8 API calls 68962->68966 68967 7ff67a3b77b8 68963->68967 69025 7ff67a3a7d00 83 API calls 2 library calls 68963->69025 68971 7ff67a3b7798 68966->68971 68969 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 68967->68969 68968->68967 68973 7ff67a3b77be 68969->68973 68971->68663 68972 7ff67a3ad090 86 API calls 68972->68974 68974->68957 68974->68963 68974->68972 68975 7ff67a3b6070 86 API calls 68974->68975 69022 7ff67a3b5c00 119 API calls 3 library calls 68974->69022 68975->68974 68978 7ff67a3b2c23 68977->68978 68986 7ff67a3b2c7b 68978->68986 69032 7ff67a3b3c80 68978->69032 68980 7ff67a415220 _Strxfrm 8 API calls 68981 7ff67a3b2ce9 68980->68981 68981->68668 68982 7ff67a3b2c46 68983 7ff67a3b2c66 68982->68983 68982->68986 69042 7ff67a3f884c 68982->69042 68983->68986 69050 7ff67a3f7e64 68983->69050 68986->68980 68987->68666 68988->68670 68990 7ff67a3a8b2e 68989->68990 68991 7ff67a3a8bae 68989->68991 69027 7ff67a3a85f0 86 API calls 68990->69027 68993 7ff67a415220 _Strxfrm 8 API calls 68991->68993 68995 7ff67a3a8bdb 68993->68995 68994 7ff67a3a8b3b 68996 7ff67a3a8b9b 68994->68996 68998 7ff67a3a8bf0 68994->68998 68995->68931 68996->68991 69028 7ff67a3a95d0 86 API calls 2 library calls 68996->69028 69029 7ff67a38e870 86 API calls 68998->69029 69000 7ff67a3a8c32 69001 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69000->69001 69002 7ff67a3a8c43 69001->69002 69003 7ff67a3a8c9b 69002->69003 69004 7ff67a3a8af0 86 API calls 69002->69004 69005 7ff67a3a8da0 69003->69005 69007 7ff67a3a8d62 69003->69007 69004->69003 69031 7ff67a38e870 86 API calls 69005->69031 69006 7ff67a3a8d73 69006->68931 69007->69006 69030 7ff67a3a95d0 86 API calls 2 library calls 69007->69030 69010 7ff67a3a8de2 69011 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69010->69011 69012 7ff67a3a8df3 69011->69012 69012->68931 69013->68935 69014->68946 69015->68946 69016->68944 69017->68954 69018->68953 69019->68974 69020->68949 69021->68955 69022->68974 69023->68960 69024->68963 69025->68955 69026->68962 69027->68994 69028->68991 69029->69000 69030->69006 69031->69010 69033 7ff67a3b3d52 69032->69033 69034 7ff67a3b3ca3 69032->69034 69035 7ff67a415220 _Strxfrm 8 API calls 69033->69035 69034->69033 69040 7ff67a3b3cad 69034->69040 69036 7ff67a3b3d61 69035->69036 69036->68982 69037 7ff67a3b3cf1 69038 7ff67a415220 _Strxfrm 8 API calls 69037->69038 69039 7ff67a3b3d0e 69038->69039 69039->68982 69040->69037 69059 7ff67a3f7dc0 84 API calls ProcessCodePage 69040->69059 69043 7ff67a3f887c 69042->69043 69060 7ff67a3f85fc 69043->69060 69046 7ff67a3f88ba 69048 7ff67a3f88cf 69046->69048 69072 7ff67a3f6cc8 83 API calls 2 library calls 69046->69072 69048->68983 69051 7ff67a3f7e8d 69050->69051 69052 7ff67a3f7e78 69050->69052 69051->69052 69054 7ff67a3f7e92 69051->69054 69083 7ff67a3fd1cc 11 API calls memcpy_s 69052->69083 69075 7ff67a405e2c 69054->69075 69055 7ff67a3f7e7d 69084 7ff67a3f8d08 83 API calls _invalid_parameter_noinfo 69055->69084 69057 7ff67a3f7e88 69057->68986 69059->69037 69061 7ff67a3f8666 69060->69061 69062 7ff67a3f8626 69060->69062 69061->69062 69064 7ff67a3f866b 69061->69064 69074 7ff67a3f8c38 83 API calls 2 library calls 69062->69074 69073 7ff67a3f7a4c EnterCriticalSection 69064->69073 69065 7ff67a3f864d 69065->69046 69071 7ff67a3f6cc8 83 API calls 2 library calls 69065->69071 69071->69046 69072->69048 69074->69065 69076 7ff67a405e5c 69075->69076 69085 7ff67a405940 69076->69085 69079 7ff67a405e9b 69082 7ff67a405eb0 69079->69082 69096 7ff67a3f6cc8 83 API calls 2 library calls 69079->69096 69082->69057 69083->69055 69084->69057 69086 7ff67a40595b 69085->69086 69087 7ff67a40598a 69085->69087 69098 7ff67a3f8c38 83 API calls 2 library calls 69086->69098 69097 7ff67a3f7a4c EnterCriticalSection 69087->69097 69091 7ff67a40597b 69091->69079 69095 7ff67a3f6cc8 83 API calls 2 library calls 69091->69095 69095->69079 69096->69082 69098->69091 69100 7ff67a3b300d 69099->69100 69102 7ff67a3b3081 69100->69102 69103 7ff67a3b30a3 69100->69103 69109 7ff67a3b301d ISource 69100->69109 69101 7ff67a415220 _Strxfrm 8 API calls 69104 7ff67a3b324f 69101->69104 69139 7ff67a3f7764 69102->69139 69106 7ff67a3f7764 83 API calls 69103->69106 69104->68680 69110 7ff67a3b30d1 ctype 69106->69110 69108 7ff67a3b31f1 69108->69109 69111 7ff67a3b32d7 69108->69111 69109->69101 69110->69108 69116 7ff67a3f7764 83 API calls 69110->69116 69118 7ff67a3b3287 69110->69118 69160 7ff67a3a7540 69110->69160 69112 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69111->69112 69113 7ff67a3b32dc 69112->69113 69114 7ff67a3b3304 69113->69114 69119 7ff67a3b2fd0 86 API calls 69113->69119 69114->68680 69115 7ff67a3b331b 69115->68680 69116->69110 69118->69108 69175 7ff67a3f8244 83 API calls 3 library calls 69118->69175 69119->69115 69181 7ff67a3f6650 69120->69181 69122 7ff67a3f692d 69122->68681 69123 7ff67a3f6960 69185 7ff67a38d450 86 API calls 69123->69185 69125 7ff67a3f6966 69186 7ff67a38d390 86 API calls 2 library calls 69125->69186 69127 7ff67a3f6650 86 API calls 69130 7ff67a3f675e ISource ctype 69127->69130 69128 7ff67a3f696c 69129 7ff67a4154e0 86 API calls std::_Facet_Register 69129->69130 69130->69122 69130->69123 69130->69125 69130->69127 69130->69129 69131 7ff67a3f695b 69130->69131 69132 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69131->69132 69132->69123 69134 7ff67a3a33ea 69133->69134 69187 7ff67a38d450 86 API calls 69134->69187 69140 7ff67a3f7780 69139->69140 69141 7ff67a3f779e 69139->69141 69177 7ff67a3fd1cc 11 API calls memcpy_s 69140->69177 69176 7ff67a3f7a4c EnterCriticalSection 69141->69176 69144 7ff67a3f7785 69178 7ff67a3f8d08 83 API calls _invalid_parameter_noinfo 69144->69178 69159 7ff67a3f7790 69159->69109 69161 7ff67a3a756f 69160->69161 69162 7ff67a3a7693 69160->69162 69165 7ff67a3a75f8 69161->69165 69166 7ff67a3a75cc 69161->69166 69179 7ff67a38d450 86 API calls 69162->69179 69164 7ff67a3a7698 69180 7ff67a38d390 86 API calls 2 library calls 69164->69180 69168 7ff67a4154e0 std::_Facet_Register 86 API calls 69165->69168 69171 7ff67a3a75e1 ctype 69165->69171 69166->69164 69167 7ff67a3a75d9 69166->69167 69170 7ff67a4154e0 std::_Facet_Register 86 API calls 69167->69170 69168->69171 69170->69171 69172 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69171->69172 69173 7ff67a3a7654 ISource ctype 69171->69173 69174 7ff67a3a76a4 69172->69174 69173->69110 69175->69118 69177->69144 69178->69159 69180->69171 69182 7ff67a3f6666 69181->69182 69183 7ff67a3f6683 69181->69183 69182->69183 69184 7ff67a3b2fd0 86 API calls 69182->69184 69183->69130 69184->69183 69186->69128 69188->68375 69190 7ff67a3f8d6b 69189->69190 69193 7ff67a3f8a38 14 API calls 3 library calls 69190->69193 69192 7ff67a3f8d86 GetCurrentProcess TerminateProcess 69193->69192 69194->68384 69196 7ff67a3be4e0 69381 7ff67a3e3360 69196->69381 69199 7ff67a3be54c memcpy_s 69202 7ff67a3be560 GetModuleFileNameW 69199->69202 69200 7ff67a3be53b 69201 7ff67a392bb0 83 API calls 69200->69201 69203 7ff67a3c0a99 69201->69203 69204 7ff67a3be5a0 69202->69204 69205 7ff67a415220 _Strxfrm 8 API calls 69203->69205 69204->69204 69207 7ff67a396990 86 API calls 69204->69207 69206 7ff67a3c0aab 69205->69206 69208 7ff67a3be5be 69207->69208 69209 7ff67a396990 86 API calls 69208->69209 69210 7ff67a3be7cb 69209->69210 69461 7ff67a396c10 69210->69461 69212 7ff67a3be7db 69476 7ff67a3a4980 90 API calls 69212->69476 69214 7ff67a3be7f9 ISource 69215 7ff67a3be8ca ISource 69214->69215 69216 7ff67a3c0add 69214->69216 69218 7ff67a3c0ae3 69214->69218 69221 7ff67a396990 86 API calls 69214->69221 69258 7ff67a3bf9c4 ISource 69215->69258 69270 7ff67a3c0b0d 69215->69270 69282 7ff67a3c0b13 69215->69282 69483 7ff67a3e2c80 88 API calls 69215->69483 69217 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69216->69217 69217->69218 69219 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69218->69219 69222 7ff67a3c0ae9 69219->69222 69223 7ff67a3bea70 69221->69223 69225 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69222->69225 69224 7ff67a396c10 86 API calls 69223->69224 69226 7ff67a3bea80 69224->69226 69227 7ff67a3c0aef 69225->69227 69477 7ff67a3a4980 90 API calls 69226->69477 69230 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69227->69230 69229 7ff67a3903b0 107 API calls 69251 7ff67a3bf99a ISource 69229->69251 69232 7ff67a3c0af5 69230->69232 69231 7ff67a3bf31f ISource 69231->69229 69239 7ff67a3c0b19 69231->69239 69243 7ff67a3c0ad7 69231->69243 69247 7ff67a3c0ad1 69231->69247 69254 7ff67a3c0acb 69231->69254 69233 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69232->69233 69235 7ff67a3c0afb 69233->69235 69234 7ff67a3c0b1f 69522 7ff67a38fb70 69234->69522 69240 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69235->69240 69236 7ff67a3bea9f ISource 69236->69215 69236->69222 69236->69227 69236->69236 69242 7ff67a396990 86 API calls 69236->69242 69238 7ff67a3c0b33 69250 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69238->69250 69241 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69239->69241 69244 7ff67a3c0b01 69240->69244 69241->69234 69249 7ff67a3bed0b 69242->69249 69246 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69243->69246 69259 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69244->69259 69245 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69252 7ff67a3c0c1e 69245->69252 69246->69216 69255 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69247->69255 69248 7ff67a3c0ac6 69253 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69248->69253 69478 7ff67a38efe0 86 API calls 69249->69478 69257 7ff67a3c0b39 69250->69257 69251->69234 69251->69238 69251->69258 69262 7ff67a3e1f20 214 API calls 69251->69262 69253->69254 69260 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69254->69260 69255->69243 69265 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69257->69265 69258->69248 69269 7ff67a3bfa6e ISource 69258->69269 69356 7ff67a3c0c18 69258->69356 69263 7ff67a3c0b07 69259->69263 69260->69247 69261 7ff67a3bed26 69479 7ff67a3a4980 90 API calls 69261->69479 69275 7ff67a3bfb69 memcpy_s 69262->69275 69268 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69263->69268 69266 7ff67a3c0b3f 69265->69266 69272 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69266->69272 69267 7ff67a3c08ee 69271 7ff67a392bb0 83 API calls 69267->69271 69268->69270 69269->69200 69278 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69270->69278 69271->69258 69274 7ff67a3c0b45 69272->69274 69273 7ff67a3bed3d 69276 7ff67a396990 86 API calls 69273->69276 69294 7ff67a3bef22 ISource 69273->69294 69528 7ff67a38ea20 69274->69528 69275->69267 69484 7ff67a3c4cb0 153 API calls Concurrency::cancel_current_task 69275->69484 69279 7ff67a3beef0 69276->69279 69278->69282 69480 7ff67a38efe0 86 API calls 69279->69480 69281 7ff67a3bfba4 69284 7ff67a3bfbb3 69281->69284 69285 7ff67a3bfd3a 69281->69285 69288 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69282->69288 69485 7ff67a3b3610 87 API calls 69284->69485 69285->69274 69486 7ff67a3c47b0 69285->69486 69286 7ff67a3bef0b 69481 7ff67a3a4980 90 API calls 69286->69481 69288->69239 69291 7ff67a3bfc07 69299 7ff67a392bb0 83 API calls 69291->69299 69293 7ff67a3c0b4b 69532 7ff67a38e870 86 API calls 69293->69532 69294->69215 69294->69232 69294->69235 69294->69244 69294->69263 69296 7ff67a396990 86 API calls 69294->69296 69295 7ff67a3a8af0 86 API calls 69297 7ff67a3bfd7d 69295->69297 69298 7ff67a3bf210 69296->69298 69300 7ff67a3b3e70 87 API calls 69297->69300 69302 7ff67a396c10 86 API calls 69298->69302 69303 7ff67a3bfc78 69299->69303 69311 7ff67a3bfd89 69300->69311 69305 7ff67a3bf220 69302->69305 69303->69257 69308 7ff67a3bfcba ISource 69303->69308 69304 7ff67a3c0b8f 69306 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69304->69306 69482 7ff67a3a4980 90 API calls 69305->69482 69309 7ff67a3c0ba2 69306->69309 69308->69266 69308->69269 69310 7ff67a38ea20 2 API calls 69309->69310 69313 7ff67a3c0ba8 69310->69313 69311->69293 69311->69309 69312 7ff67a41bde8 84 API calls 69311->69312 69314 7ff67a3bfe94 69312->69314 69533 7ff67a38eaf0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 69313->69533 69314->69313 69315 7ff67a3bff27 69314->69315 69500 7ff67a41be58 WideCharToMultiByte WideCharToMultiByte GetLastError WideCharToMultiByte GetLastError 69314->69500 69317 7ff67a3c0bb6 69315->69317 69318 7ff67a3c65c0 92 API calls 69315->69318 69534 7ff67a38eaf0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 69317->69534 69320 7ff67a3bff79 69318->69320 69502 7ff67a3c5890 69320->69502 69321 7ff67a3bfee9 69321->69313 69324 7ff67a3a18d0 86 API calls 69321->69324 69323 7ff67a3c0bbe 69327 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69323->69327 69326 7ff67a3bff07 69324->69326 69501 7ff67a41be58 WideCharToMultiByte WideCharToMultiByte GetLastError WideCharToMultiByte GetLastError 69326->69501 69329 7ff67a3c0bc4 69327->69329 69330 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69329->69330 69331 7ff67a3c0bca 69330->69331 69332 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69331->69332 69333 7ff67a3c0bd0 69332->69333 69334 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69333->69334 69335 7ff67a3c0bd6 69334->69335 69336 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69335->69336 69338 7ff67a3c0bdc 69336->69338 69337 7ff67a3c0022 ISource 69337->69323 69337->69329 69337->69331 69337->69333 69337->69335 69337->69338 69340 7ff67a3c0be2 69337->69340 69516 7ff67a3e2750 98 API calls 6 library calls 69337->69516 69341 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69338->69341 69343 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69340->69343 69341->69340 69342 7ff67a3c0823 69520 7ff67a41c564 103 API calls 3 library calls 69342->69520 69349 7ff67a3c0be8 69343->69349 69345 7ff67a3c083f 69347 7ff67a392bb0 83 API calls 69345->69347 69346 7ff67a3c03a3 69346->69342 69353 7ff67a3c03fb 69346->69353 69348 7ff67a3c084c ISource 69347->69348 69352 7ff67a3c0c12 69348->69352 69521 7ff67a3b3610 87 API calls 69348->69521 69351 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69349->69351 69354 7ff67a3c0bf4 69351->69354 69355 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69352->69355 69353->69349 69517 7ff67a3d1fc0 86 API calls memcpy_s 69353->69517 69357 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69354->69357 69355->69356 69356->69245 69359 7ff67a3c0bfa 69357->69359 69361 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69359->69361 69360 7ff67a3c04da ISource 69360->69354 69363 7ff67a3c0558 ISource 69360->69363 69362 7ff67a3c0c00 69361->69362 69367 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69362->69367 69363->69359 69364 7ff67a3c05b8 ISource 69363->69364 69518 7ff67a41c564 103 API calls 3 library calls 69364->69518 69365 7ff67a3c048f 69365->69349 69365->69360 69369 7ff67a3c0c06 69367->69369 69368 7ff67a3c05f0 69370 7ff67a392bb0 83 API calls 69368->69370 69372 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69369->69372 69371 7ff67a3c064e 69370->69371 69371->69362 69374 7ff67a3c068b ISource 69371->69374 69373 7ff67a3c0c0c 69372->69373 69376 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69373->69376 69519 7ff67a3b3610 87 API calls 69374->69519 69376->69352 69377 7ff67a3c06f0 69378 7ff67a392bb0 83 API calls 69377->69378 69379 7ff67a3c0761 69378->69379 69379->69369 69380 7ff67a3c07a3 ISource 69379->69380 69380->69269 69380->69373 69382 7ff67a3e33be 69381->69382 69383 7ff67a3e34a4 69381->69383 69566 7ff67a4153d0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 69382->69566 69385 7ff67a3e3639 69383->69385 69567 7ff67a4153d0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 69383->69567 69535 7ff67a38f320 69385->69535 69389 7ff67a3e36a8 ISource 69392 7ff67a3903b0 107 API calls 69389->69392 69394 7ff67a3e3bb3 69389->69394 69403 7ff67a3e3719 memcpy_s 69392->69403 69396 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69394->69396 69408 7ff67a3e3bb9 69396->69408 69398 7ff67a3e3c72 69611 7ff67a38fbe0 91 API calls Concurrency::cancel_current_task 69398->69611 69401 7ff67a3e386a ISource 69407 7ff67a415220 _Strxfrm 8 API calls 69401->69407 69405 7ff67a3f0f30 153 API calls 69403->69405 69419 7ff67a3e3a58 69403->69419 69409 7ff67a3e3791 69405->69409 69406 7ff67a3e3bae 69410 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69406->69410 69411 7ff67a3be531 69407->69411 69608 7ff67a38e870 86 API calls 69408->69608 69413 7ff67a3e39ec 69409->69413 69538 7ff67a3f12e0 69409->69538 69410->69394 69411->69199 69411->69200 69413->69401 69607 7ff67a3b3610 87 API calls 69413->69607 69414 7ff67a3e3be3 69417 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69414->69417 69418 7ff67a3e3bf7 69417->69418 69609 7ff67a38e870 86 API calls 69418->69609 69419->69398 69419->69401 69419->69406 69425 7ff67a3e3c20 69428 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69425->69428 69435 7ff67a3e3c34 69428->69435 69610 7ff67a38e870 86 API calls 69435->69610 69444 7ff67a3e3c5e 69446 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69444->69446 69446->69398 69467 7ff67a396c3e 69461->69467 69463 7ff67a396c62 69463->69212 69465 7ff67a396c8a 69466 7ff67a396d2d 69465->69466 69471 7ff67a4154e0 std::_Facet_Register 86 API calls 69465->69471 70007 7ff67a38d390 86 API calls 2 library calls 69466->70007 69467->69463 69467->69465 69467->69466 69469 7ff67a396cef 69467->69469 69470 7ff67a396d33 69467->69470 69472 7ff67a396ce1 ctype 69469->69472 69474 7ff67a4154e0 std::_Facet_Register 86 API calls 69469->69474 70008 7ff67a38d450 86 API calls 69470->70008 69473 7ff67a396cd9 69471->69473 69472->69212 69473->69472 69475 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69473->69475 69474->69472 69475->69466 69476->69214 69477->69236 69478->69261 69479->69273 69480->69286 69481->69294 69482->69215 69483->69231 69484->69281 69485->69291 69487 7ff67a3c47ef 69486->69487 69489 7ff67a3a8af0 86 API calls 69487->69489 69490 7ff67a3c4804 69487->69490 69488 7ff67a3c4837 69491 7ff67a3c48e5 69488->69491 69493 7ff67a3c48a3 69488->69493 69489->69490 69490->69488 70009 7ff67a3a13e0 69490->70009 70014 7ff67a38e870 86 API calls 69491->70014 69492 7ff67a3bfd71 69492->69295 69493->69492 70013 7ff67a3a95d0 86 API calls 2 library calls 69493->70013 69496 7ff67a3c4927 69497 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69496->69497 69498 7ff67a3c4938 69497->69498 69500->69321 69501->69315 69504 7ff67a3c58dd 69502->69504 69505 7ff67a3c5a05 69504->69505 69506 7ff67a3c59dd 69504->69506 69513 7ff67a3c58e2 ctype 69504->69513 69515 7ff67a3c5a6d 69504->69515 69509 7ff67a4154e0 std::_Facet_Register 86 API calls 69505->69509 69505->69513 69507 7ff67a3c5a73 69506->69507 69508 7ff67a4154e0 std::_Facet_Register 86 API calls 69506->69508 70033 7ff67a38d390 86 API calls 2 library calls 69507->70033 69511 7ff67a3c59f2 69508->69511 69509->69513 69511->69513 69514 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69511->69514 69512 7ff67a3c5a79 69513->69337 69514->69515 70032 7ff67a38d450 86 API calls 69515->70032 69516->69346 69517->69365 69518->69368 69519->69377 69520->69345 69521->69267 69523 7ff67a38fb89 69522->69523 70034 7ff67a38f520 91 API calls 2 library calls 69523->70034 69525 7ff67a38fbc0 69526 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69525->69526 69527 7ff67a38fbd1 69526->69527 69529 7ff67a38ea3d 69528->69529 69530 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69529->69530 69531 7ff67a38ea4e 69530->69531 69532->69304 69536 7ff67a396c10 86 API calls 69535->69536 69537 7ff67a38f342 69536->69537 69537->69389 69612 7ff67a3a2620 69538->69612 69540 7ff67a3f1316 69622 7ff67a3f4050 69540->69622 69544 7ff67a3f1385 69696 7ff67a3f2080 69544->69696 69607->69419 69608->69414 69609->69425 69610->69444 69613 7ff67a3a2653 69612->69613 69614 7ff67a3a2776 69612->69614 69615 7ff67a415220 _Strxfrm 8 API calls 69613->69615 69614->69613 69617 7ff67a3a2783 69614->69617 69616 7ff67a3a2682 69615->69616 69616->69540 69702 7ff67a3a6f90 86 API calls 4 library calls 69617->69702 69619 7ff67a3a27a4 69620 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69619->69620 69621 7ff67a3a27b5 69620->69621 69623 7ff67a3f40a4 69622->69623 69703 7ff67a3fd0c4 69623->69703 69627 7ff67a3f41af 69726 7ff67a3e0fe0 69627->69726 69630 7ff67a415220 _Strxfrm 8 API calls 69631 7ff67a3f1379 69630->69631 69632 7ff67a3f2150 69631->69632 69633 7ff67a3f246d 69632->69633 69636 7ff67a3f2197 memcpy_s 69632->69636 69753 7ff67a3f57d0 69633->69753 69817 7ff67a3c5c60 86 API calls 69636->69817 69637 7ff67a3f27f0 86 API calls 69643 7ff67a3f24ac 69637->69643 69639 7ff67a3f21e7 69818 7ff67a3f4930 89 API calls 2 library calls 69639->69818 69641 7ff67a3f21f7 69647 7ff67a3f27f0 86 API calls 69641->69647 69642 7ff67a3a2620 86 API calls 69653 7ff67a3f2674 69642->69653 69644 7ff67a3c5dc0 89 API calls 69643->69644 69684 7ff67a3f2637 ISource 69643->69684 69648 7ff67a3f24f5 69644->69648 69645 7ff67a415220 _Strxfrm 8 API calls 69649 7ff67a3f2704 69645->69649 69646 7ff67a3f2468 ISource 69646->69645 69650 7ff67a3f2203 69647->69650 69652 7ff67a3c9600 89 API calls 69648->69652 69649->69544 69695 7ff67a3f2398 ISource 69650->69695 69819 7ff67a3c5dc0 69650->69819 69651 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69654 7ff67a3f275e 69651->69654 69655 7ff67a3f251b 69652->69655 69653->69646 69693 7ff67a3f2758 69653->69693 69930 7ff67a3c4a10 84 API calls 69654->69930 69657 7ff67a3c6340 89 API calls 69655->69657 69656 7ff67a3f23b9 69658 7ff67a3a2620 86 API calls 69656->69658 69683 7ff67a3f252a ISource __std_exception_destroy 69657->69683 69672 7ff67a3f23d4 69658->69672 69659 7ff67a3f2401 69660 7ff67a3a2620 86 API calls 69659->69660 69659->69672 69660->69672 69664 7ff67a3f224f 69838 7ff67a3c9600 69664->69838 69665 7ff67a3f276b 69669 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69665->69669 69666 7ff67a3f278d 69931 7ff67a3c4a10 84 API calls 69666->69931 69673 7ff67a3f277b 69669->69673 69670 7ff67a3f279a 69674 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69670->69674 69671 7ff67a3f2275 69922 7ff67a3c6340 69671->69922 69929 7ff67a3c5a80 83 API calls 2 library calls 69672->69929 69679 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69673->69679 69676 7ff67a3f27aa 69674->69676 69678 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69676->69678 69681 7ff67a3f27b0 69678->69681 69682 7ff67a3f2781 69679->69682 69680 7ff67a3f229a 69680->69673 69694 7ff67a3f22d1 ISource __std_exception_destroy 69680->69694 69685 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69681->69685 69686 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69682->69686 69683->69666 69683->69676 69683->69681 69683->69684 69689 7ff67a3f2753 69683->69689 69684->69642 69684->69653 69687 7ff67a3f27b6 ISource 69685->69687 69688 7ff67a3f2787 69686->69688 69687->69544 69691 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69688->69691 69690 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69689->69690 69690->69693 69691->69666 69692 7ff67a3f234a ISource 69692->69688 69692->69695 69693->69651 69694->69682 69694->69692 69695->69656 69695->69659 69699 7ff67a3f209c ISource 69696->69699 69697 7ff67a3f2134 69700 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69697->69700 69698 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69698->69697 69699->69697 69699->69698 69701 7ff67a3f213a 69700->69701 69702->69619 69704 7ff67a4010dc _Strcoll 83 API calls 69703->69704 69705 7ff67a3fd0cd 69704->69705 69706 7ff67a403364 _Strcoll 83 API calls 69705->69706 69707 7ff67a3f418a 69706->69707 69708 7ff67a3f27f0 69707->69708 69709 7ff67a3f2813 69708->69709 69713 7ff67a3f2860 69708->69713 69733 7ff67a3f3d60 69709->69733 69711 7ff67a3f3d60 86 API calls 69711->69713 69712 7ff67a3f2818 69712->69713 69714 7ff67a3f3d60 86 API calls 69712->69714 69713->69711 69724 7ff67a3f28b3 69713->69724 69715 7ff67a3f2827 69714->69715 69716 7ff67a3f283d 69715->69716 69717 7ff67a3f3d60 86 API calls 69715->69717 69718 7ff67a415220 _Strxfrm 8 API calls 69716->69718 69720 7ff67a3f2836 69717->69720 69721 7ff67a3f285a 69718->69721 69719 7ff67a3f29b8 69722 7ff67a415220 _Strxfrm 8 API calls 69719->69722 69720->69713 69720->69716 69721->69627 69723 7ff67a3f2b0b 69722->69723 69723->69627 69724->69719 69725 7ff67a3f3d60 86 API calls 69724->69725 69725->69724 69727 7ff67a3e1017 69726->69727 69728 7ff67a3e0fee 69726->69728 69727->69630 69728->69727 69752 7ff67a38e870 86 API calls 69728->69752 69730 7ff67a3e104e 69731 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69730->69731 69732 7ff67a3e105f 69731->69732 69734 7ff67a3f3d83 69733->69734 69737 7ff67a3f3d7d 69733->69737 69735 7ff67a3f3d9a 69734->69735 69749 7ff67a3b2fd0 86 API calls 69734->69749 69735->69737 69739 7ff67a3f3e34 69735->69739 69736 7ff67a3f3e07 69736->69712 69737->69736 69750 7ff67a3cbc80 86 API calls 5 library calls 69737->69750 69751 7ff67a38e870 86 API calls 69739->69751 69741 7ff67a3f3e76 69742 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69741->69742 69743 7ff67a3f3e87 69742->69743 69744 7ff67a3a7540 86 API calls 69743->69744 69747 7ff67a3f3eb5 69743->69747 69744->69747 69745 7ff67a3f3f60 69745->69712 69746 7ff67a3f3d60 86 API calls 69746->69747 69747->69745 69747->69746 69748 7ff67a3a7540 86 API calls 69747->69748 69748->69747 69749->69735 69750->69736 69751->69741 69752->69730 69754 7ff67a3f584e 69753->69754 69755 7ff67a3c5dc0 89 API calls 69754->69755 69756 7ff67a3f641f 69755->69756 69757 7ff67a3c9600 89 API calls 69756->69757 69758 7ff67a3f6445 69757->69758 69759 7ff67a3c6340 89 API calls 69758->69759 69760 7ff67a3f6455 69759->69760 69761 7ff67a3f6460 69760->69761 69762 7ff67a3f64c8 69760->69762 69763 7ff67a3a1990 83 API calls 69761->69763 69937 7ff67a3c4a10 84 API calls 69762->69937 69765 7ff67a3f646a 69763->69765 69770 7ff67a3a1990 83 API calls 69765->69770 69766 7ff67a3f64d4 69767 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69766->69767 69768 7ff67a3f64e4 69767->69768 69938 7ff67a3c4a10 84 API calls 69768->69938 69772 7ff67a3f647e 69770->69772 69771 7ff67a3f64f1 69773 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69771->69773 69774 7ff67a3a1990 83 API calls 69772->69774 69775 7ff67a3f6501 69773->69775 69776 7ff67a3f6489 69774->69776 69939 7ff67a3c4a10 84 API calls 69775->69939 69932 7ff67a3a9570 69776->69932 69778 7ff67a3f650e 69779 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69778->69779 69781 7ff67a3f651e 69779->69781 69940 7ff67a3cb370 84 API calls 69781->69940 69782 7ff67a3f6497 69784 7ff67a415220 _Strxfrm 8 API calls 69782->69784 69786 7ff67a3f24a0 69784->69786 69785 7ff67a3f652b 69787 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69785->69787 69786->69637 69788 7ff67a3f653b 69787->69788 69941 7ff67a3c4a10 84 API calls 69788->69941 69790 7ff67a3f6548 69791 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69790->69791 69792 7ff67a3f6558 69791->69792 69942 7ff67a3c4a10 84 API calls 69792->69942 69794 7ff67a3f6565 69795 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69794->69795 69796 7ff67a3f6575 69795->69796 69943 7ff67a3c4a10 84 API calls 69796->69943 69798 7ff67a3f6582 69799 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69798->69799 69800 7ff67a3f6592 69799->69800 69944 7ff67a3c4a10 84 API calls 69800->69944 69802 7ff67a3f659f 69803 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69802->69803 69804 7ff67a3f65af 69803->69804 69945 7ff67a3c4a10 84 API calls 69804->69945 69806 7ff67a3f65bc 69807 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69806->69807 69808 7ff67a3f65cc 69807->69808 69946 7ff67a3c4a10 84 API calls 69808->69946 69810 7ff67a3f65d9 69811 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69810->69811 69812 7ff67a3f65e9 69811->69812 69947 7ff67a3c4a10 84 API calls 69812->69947 69814 7ff67a3f65f6 69815 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69814->69815 69816 7ff67a3f6606 69815->69816 69817->69639 69818->69641 69821 7ff67a3c5e0c 69819->69821 69820 7ff67a3c6340 89 API calls 69827 7ff67a3c5f69 69820->69827 69822 7ff67a3a7540 86 API calls 69821->69822 69823 7ff67a3c5e9d ISource 69821->69823 69822->69823 69823->69820 69824 7ff67a3c631f 69823->69824 69835 7ff67a3c6023 ISource 69823->69835 69825 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69824->69825 69826 7ff67a3c6325 69825->69826 69828 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69826->69828 69830 7ff67a3a7540 86 API calls 69827->69830 69827->69835 69829 7ff67a3c632b 69828->69829 69832 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69829->69832 69830->69835 69831 7ff67a3c6331 69833 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69831->69833 69832->69831 69834 7ff67a3c6337 69833->69834 69835->69826 69835->69829 69835->69831 69836 7ff67a3c62f1 ISource 69835->69836 69837 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69835->69837 69836->69664 69837->69824 69839 7ff67a3c965f 69838->69839 69948 7ff67a3bb300 83 API calls 3 library calls 69839->69948 69841 7ff67a3c9676 69949 7ff67a3904b0 69841->69949 69843 7ff67a3c98f4 69846 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69843->69846 69844 7ff67a3c98fa 69848 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69844->69848 69845 7ff67a3c96ae ISource 69845->69843 69845->69844 69847 7ff67a3c9900 69845->69847 69851 7ff67a3c9906 69845->69851 69959 7ff67a417164 69845->69959 69846->69844 69850 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69847->69850 69848->69847 69850->69851 69853 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69851->69853 69852 7ff67a3c985f 69854 7ff67a3c98b3 ISource 69852->69854 69856 7ff67a3c98ef 69852->69856 69859 7ff67a3c990c 69853->69859 69855 7ff67a415220 _Strxfrm 8 API calls 69854->69855 69857 7ff67a3c98d8 69855->69857 69858 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69856->69858 69857->69671 69858->69843 69860 7ff67a3c5dc0 89 API calls 69859->69860 69861 7ff67a3ca55f 69860->69861 69862 7ff67a3c9600 89 API calls 69861->69862 69863 7ff67a3ca585 69862->69863 69864 7ff67a3c6340 89 API calls 69863->69864 69865 7ff67a3ca595 69864->69865 69866 7ff67a3ca5a0 69865->69866 69867 7ff67a3ca608 69865->69867 69868 7ff67a3a1990 83 API calls 69866->69868 69965 7ff67a3c4a10 84 API calls 69867->69965 69870 7ff67a3ca5aa 69868->69870 69874 7ff67a3a1990 83 API calls 69870->69874 69871 7ff67a3ca614 69872 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69871->69872 69873 7ff67a3ca624 69872->69873 69966 7ff67a3c4a10 84 API calls 69873->69966 69876 7ff67a3ca5be 69874->69876 69880 7ff67a3a1990 83 API calls 69876->69880 69877 7ff67a3ca631 69878 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69877->69878 69879 7ff67a3ca641 69878->69879 69967 7ff67a3c4a10 84 API calls 69879->69967 69882 7ff67a3ca5c9 69880->69882 69885 7ff67a3a9570 83 API calls 69882->69885 69883 7ff67a3ca64e 69884 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69883->69884 69886 7ff67a3ca65e 69884->69886 69887 7ff67a3ca5d7 69885->69887 69968 7ff67a3cb370 84 API calls 69886->69968 69889 7ff67a415220 _Strxfrm 8 API calls 69887->69889 69891 7ff67a3ca5e9 69889->69891 69890 7ff67a3ca66b 69892 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69890->69892 69891->69671 69893 7ff67a3ca67b 69892->69893 69969 7ff67a3c4a10 84 API calls 69893->69969 69895 7ff67a3ca688 69896 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69895->69896 69897 7ff67a3ca698 69896->69897 69970 7ff67a3c4a10 84 API calls 69897->69970 69899 7ff67a3ca6a5 69900 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69899->69900 69901 7ff67a3ca6b5 69900->69901 69971 7ff67a3c4a10 84 API calls 69901->69971 69903 7ff67a3ca6c2 69904 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69903->69904 69905 7ff67a3ca6d2 69904->69905 69972 7ff67a3c4a10 84 API calls 69905->69972 69907 7ff67a3ca6df 69908 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69907->69908 69909 7ff67a3ca6ef 69908->69909 69973 7ff67a3c4a10 84 API calls 69909->69973 69911 7ff67a3ca6fc 69912 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69911->69912 69913 7ff67a3ca70c 69912->69913 69974 7ff67a3c4a10 84 API calls 69913->69974 69915 7ff67a3ca719 69916 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69915->69916 69917 7ff67a3ca729 69916->69917 69975 7ff67a3c4a10 84 API calls 69917->69975 69919 7ff67a3ca736 69920 7ff67a418404 Concurrency::cancel_current_task 2 API calls 69919->69920 69921 7ff67a3ca746 69920->69921 69923 7ff67a3c6437 69922->69923 69928 7ff67a3c6396 69922->69928 69924 7ff67a415220 _Strxfrm 8 API calls 69923->69924 69925 7ff67a3c6447 69924->69925 69925->69654 69925->69680 69927 7ff67a3a7540 86 API calls 69927->69928 69928->69923 69928->69927 69977 7ff67a3badc0 86 API calls 69928->69977 69929->69646 69930->69665 69931->69670 69933 7ff67a3a9586 69932->69933 69934 7ff67a3a95af ISource 69932->69934 69933->69934 69935 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69933->69935 69934->69782 69936 7ff67a3a95cf 69935->69936 69937->69766 69938->69771 69939->69778 69940->69785 69941->69790 69942->69794 69943->69798 69944->69802 69945->69806 69946->69810 69947->69814 69948->69841 69950 7ff67a3904eb 69949->69950 69951 7ff67a3a7540 86 API calls 69950->69951 69952 7ff67a390620 69950->69952 69951->69952 69953 7ff67a3906c3 ISource 69952->69953 69955 7ff67a3906fc 69952->69955 69954 7ff67a415220 _Strxfrm 8 API calls 69953->69954 69956 7ff67a3906e8 69954->69956 69957 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 69955->69957 69956->69845 69958 7ff67a390701 ISource __std_exception_destroy 69957->69958 69958->69845 69960 7ff67a417185 69959->69960 69964 7ff67a4171ba __std_exception_destroy 69959->69964 69961 7ff67a400aa4 __std_exception_copy 12 API calls 69960->69961 69960->69964 69962 7ff67a4171a3 69961->69962 69962->69964 69976 7ff67a3ff6ec 83 API calls 2 library calls 69962->69976 69964->69852 69965->69871 69966->69877 69967->69883 69968->69890 69969->69895 69970->69899 69971->69903 69972->69907 69973->69911 69974->69915 69975->69919 69976->69964 69977->69928 70007->69470 70010 7ff67a3a1406 ctype 70009->70010 70011 7ff67a3a146f 70009->70011 70010->70011 70015 7ff67a3a1020 70010->70015 70011->69488 70013->69492 70014->69496 70016 7ff67a3a1046 70015->70016 70030 7ff67a3a104b ISource 70015->70030 70017 7ff67a3a10be 70016->70017 70018 7ff67a3a10ad 70016->70018 70016->70030 70020 7ff67a3a10d7 70017->70020 70021 7ff67a3a10e6 70017->70021 70023 7ff67a3a10e4 70017->70023 70019 7ff67a4154e0 std::_Facet_Register 86 API calls 70018->70019 70027 7ff67a3a10b9 ctype 70019->70027 70022 7ff67a3a120f 70020->70022 70020->70023 70026 7ff67a4154e0 std::_Facet_Register 86 API calls 70021->70026 70021->70027 70031 7ff67a38d390 86 API calls 2 library calls 70022->70031 70024 7ff67a4154e0 std::_Facet_Register 86 API calls 70023->70024 70023->70030 70024->70027 70026->70027 70028 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70027->70028 70027->70030 70029 7ff67a3a121a 70028->70029 70030->70010 70031->70027 70033->69512 70034->69525 70035 7ff67a3f3902 70036 7ff67a3f391c 70035->70036 70037 7ff67a3f3d60 86 API calls 70036->70037 70038 7ff67a3f34e0 70036->70038 70037->70038 70039 7ff67a3f3803 70040 7ff67a3f3555 70039->70040 70042 7ff67a3f3568 70039->70042 70041 7ff67a3a7540 86 API calls 70040->70041 70041->70042 70043 7ff67a3f3d60 86 API calls 70042->70043 70044 7ff67a3f34e0 70043->70044 70045 7ff67a3ea380 GetCurrentHwProfileW 70046 7ff67a3ea3c8 70045->70046 70048 7ff67a3ea428 70045->70048 70053 7ff67a3d1a40 70046->70053 70049 7ff67a415220 _Strxfrm 8 API calls 70048->70049 70051 7ff67a3ea4a0 70049->70051 70052 7ff67a3ea3d7 70052->70048 70065 7ff67a3f6f98 90 API calls 70052->70065 70054 7ff67a3d1a8e 70053->70054 70061 7ff67a3d1a6f ISource 70053->70061 70057 7ff67a396990 86 API calls 70054->70057 70055 7ff67a415220 _Strxfrm 8 API calls 70056 7ff67a3d1b2e 70055->70056 70056->70052 70058 7ff67a3d1ab7 70057->70058 70066 7ff67a3d1b50 88 API calls _Strxfrm 70058->70066 70060 7ff67a3d1ac5 70060->70061 70062 7ff67a3d1b3c 70060->70062 70061->70055 70063 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70062->70063 70064 7ff67a3d1b41 70063->70064 70065->70052 70066->70060 70067 7ff67a3e9ba0 70088 7ff67a3e2cc0 70067->70088 70069 7ff67a3e9be8 GetVolumeInformationW 70071 7ff67a3e9c44 70069->70071 70076 7ff67a3e9c76 ISource memcpy_s 70069->70076 70073 7ff67a3e9e0e 70071->70073 70071->70076 70072 7ff67a3e9c93 70074 7ff67a415220 _Strxfrm 8 API calls 70072->70074 70075 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70073->70075 70077 7ff67a3e9df5 70074->70077 70078 7ff67a3e9e13 70075->70078 70076->70072 70101 7ff67a3a2230 70076->70101 70081 7ff67a3a32f0 93 API calls 70082 7ff67a3e9d63 70081->70082 70104 7ff67a3dd900 70082->70104 70125 7ff67a3a1620 70088->70125 70091 7ff67a3e2d1f 70095 7ff67a3e2dcb 70091->70095 70131 7ff67a41c0fc GetCurrentDirectoryW 70091->70131 70135 7ff67a3a7380 86 API calls 5 library calls 70091->70135 70094 7ff67a3e2eec 70096 7ff67a396990 86 API calls 70095->70096 70100 7ff67a3e2edf 70095->70100 70098 7ff67a3e2e3f 70096->70098 70097 7ff67a3e2ea8 ISource 70097->70069 70098->70097 70099 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70098->70099 70099->70100 70136 7ff67a38fa60 86 API calls 2 library calls 70100->70136 70102 7ff67a3a36e0 127 API calls 70101->70102 70103 7ff67a3a2277 70102->70103 70103->70081 70105 7ff67a3dd943 70104->70105 70106 7ff67a3a8af0 86 API calls 70105->70106 70107 7ff67a3dd958 70105->70107 70106->70107 70114 7ff67a3dd9bc 70107->70114 70138 7ff67a3dc5a0 119 API calls 4 library calls 70107->70138 70109 7ff67a3ddac3 70140 7ff67a38e870 86 API calls 70109->70140 70110 7ff67a3dda8f 70118 7ff67a39fee0 70110->70118 70111 7ff67a3dda7e 70111->70110 70139 7ff67a3a95d0 86 API calls 2 library calls 70111->70139 70114->70109 70114->70111 70115 7ff67a3ddb05 70116 7ff67a418404 Concurrency::cancel_current_task 2 API calls 70115->70116 70117 7ff67a3ddb16 70116->70117 70119 7ff67a39ff28 70118->70119 70120 7ff67a39ff99 70119->70120 70121 7ff67a3a33a0 86 API calls 70119->70121 70122 7ff67a39eb50 70120->70122 70121->70120 70141 7ff67a3a1220 70122->70141 70124 7ff67a39eb9d 70124->70072 70126 7ff67a3a1650 70125->70126 70127 7ff67a3a1635 70125->70127 70129 7ff67a3a1662 70126->70129 70137 7ff67a3a7380 86 API calls 5 library calls 70126->70137 70127->70091 70129->70091 70130 7ff67a3a16a3 70130->70091 70132 7ff67a41c11d GetLastError 70131->70132 70133 7ff67a41c10e 70131->70133 70134 7ff67a41c112 70132->70134 70133->70132 70133->70134 70134->70091 70135->70091 70136->70094 70137->70130 70138->70114 70139->70110 70140->70115 70144 7ff67a3a2b20 70141->70144 70143 7ff67a3a123c 70143->70124 70145 7ff67a3a2b2f 70144->70145 70146 7ff67a3a2b7d ISource 70144->70146 70145->70146 70147 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70145->70147 70146->70143 70148 7ff67a3a2bc2 70147->70148 70149 7ff67a3f0381 70150 7ff67a3f03ac 70149->70150 70162 7ff67a3f0397 70149->70162 70152 7ff67a3f057c 70150->70152 70154 7ff67a3f03b5 70150->70154 70151 7ff67a3f05e9 70155 7ff67a3f0050 8 API calls 70151->70155 70152->70151 70157 7ff67a3f0050 8 API calls 70152->70157 70153 7ff67a3f050e 70160 7ff67a3f0050 8 API calls 70153->70160 70159 7ff67a3a76b0 86 API calls 70154->70159 70161 7ff67a3f0416 memcpy_s 70154->70161 70155->70162 70156 7ff67a415220 _Strxfrm 8 API calls 70158 7ff67a3f093b 70156->70158 70157->70152 70159->70161 70160->70162 70161->70153 70164 7ff67a3f0050 70161->70164 70162->70156 70165 7ff67a3f007d 70164->70165 70166 7ff67a415220 _Strxfrm 8 API calls 70165->70166 70167 7ff67a3f093b 70166->70167 70167->70161 70168 7ff67a400ca0 70179 7ff67a400b04 70168->70179 70171 7ff67a400cfd 70173 7ff67a400d3d 70171->70173 70177 7ff67a400cc6 70171->70177 70197 7ff67a4057f4 83 API calls 2 library calls 70171->70197 70185 7ff67a400b2c 70173->70185 70176 7ff67a400d31 70176->70173 70198 7ff67a405ed0 11 API calls 2 library calls 70176->70198 70180 7ff67a400b1d 70179->70180 70181 7ff67a400b0d 70179->70181 70180->70171 70180->70177 70196 7ff67a400c24 83 API calls ProcessCodePage 70180->70196 70199 7ff67a3fd1cc 11 API calls memcpy_s 70181->70199 70183 7ff67a400b12 70200 7ff67a3f8d08 83 API calls _invalid_parameter_noinfo 70183->70200 70186 7ff67a400b04 _fread_nolock 83 API calls 70185->70186 70187 7ff67a400b51 70186->70187 70188 7ff67a400bf1 70187->70188 70189 7ff67a400b60 70187->70189 70210 7ff67a40401c 83 API calls 3 library calls 70188->70210 70191 7ff67a400b7e 70189->70191 70194 7ff67a400b9c 70189->70194 70209 7ff67a40401c 83 API calls 3 library calls 70191->70209 70193 7ff67a400b8c 70193->70177 70194->70193 70201 7ff67a406b24 70194->70201 70196->70171 70197->70176 70198->70173 70199->70183 70200->70180 70202 7ff67a406b54 70201->70202 70211 7ff67a406950 70202->70211 70205 7ff67a406b93 70207 7ff67a406ba8 70205->70207 70223 7ff67a3f6cc8 83 API calls 2 library calls 70205->70223 70207->70193 70209->70193 70210->70193 70213 7ff67a406999 70211->70213 70215 7ff67a40697d 70211->70215 70212 7ff67a406a27 70225 7ff67a3f8c38 83 API calls 2 library calls 70212->70225 70213->70212 70216 7ff67a4069d1 70213->70216 70215->70205 70222 7ff67a3f6cc8 83 API calls 2 library calls 70215->70222 70224 7ff67a40c0a4 EnterCriticalSection 70216->70224 70222->70205 70223->70207 70225->70215 70226 7ff67a3e2fa0 70227 7ff67a3e2fd0 70226->70227 70228 7ff67a41c138 107 API calls 70227->70228 70229 7ff67a3e2fe9 70228->70229 70230 7ff67a415220 _Strxfrm 8 API calls 70229->70230 70231 7ff67a3e3026 70230->70231 70232 7ff67a3a6d59 70233 7ff67a3a6d77 70232->70233 70234 7ff67a3a6de2 70233->70234 70235 7ff67a3a6db6 70233->70235 70240 7ff67a4154e0 std::_Facet_Register 86 API calls 70234->70240 70241 7ff67a3a6dcb ctype 70234->70241 70236 7ff67a3a6e6e 70235->70236 70237 7ff67a3a6dc3 70235->70237 70245 7ff67a38d390 86 API calls 2 library calls 70236->70245 70238 7ff67a4154e0 std::_Facet_Register 86 API calls 70237->70238 70238->70241 70240->70241 70242 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70241->70242 70243 7ff67a3a6e35 ISource ctype 70241->70243 70244 7ff67a3a6e79 70242->70244 70245->70241 70246 7ff67a3eb136 70250 7ff67a3eb148 ISource 70246->70250 70247 7ff67a3eb705 70248 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70247->70248 70249 7ff67a3eb70b 70248->70249 70251 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70249->70251 70250->70247 70250->70249 70278 7ff67a3ddb20 70250->70278 70253 7ff67a3eb711 70251->70253 70256 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70253->70256 70254 7ff67a3eb25a 70255 7ff67a3a7540 86 API calls 70254->70255 70270 7ff67a3eb26a ISource 70254->70270 70255->70270 70257 7ff67a3eb717 70256->70257 70258 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70257->70258 70259 7ff67a3eb71d 70258->70259 70260 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70259->70260 70261 7ff67a3eb723 70260->70261 70262 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70261->70262 70263 7ff67a3eb729 70262->70263 70264 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70263->70264 70265 7ff67a3eb72f 70264->70265 70266 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70265->70266 70267 7ff67a3eb735 70266->70267 70268 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70267->70268 70269 7ff67a3eb73b 70268->70269 70273 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70269->70273 70270->70253 70270->70257 70270->70259 70270->70261 70270->70263 70270->70265 70270->70267 70270->70269 70271 7ff67a3eb6b6 ISource 70270->70271 70274 7ff67a3eb700 70270->70274 70272 7ff67a415220 _Strxfrm 8 API calls 70271->70272 70275 7ff67a3eb6e4 70272->70275 70276 7ff67a3eb741 70273->70276 70277 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70274->70277 70277->70247 70279 7ff67a3ddb53 ctype 70278->70279 70280 7ff67a3ddb7b 70278->70280 70279->70254 70282 7ff67a3dc840 86 API calls 6 library calls 70280->70282 70282->70279 70283 7ff67a3f5d56 70284 7ff67a3f27f0 86 API calls 70283->70284 70285 7ff67a3f5d5e 70284->70285 70286 7ff67a3a33fd 70287 7ff67a3a3409 70286->70287 70288 7ff67a3a3474 70287->70288 70289 7ff67a3a3448 70287->70289 70290 7ff67a4154e0 std::_Facet_Register 86 API calls 70288->70290 70294 7ff67a3a345d ctype 70288->70294 70292 7ff67a4154e0 std::_Facet_Register 86 API calls 70289->70292 70299 7ff67a3a34f5 70289->70299 70290->70294 70292->70294 70293 7ff67a3a34fb 70295 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70294->70295 70296 7ff67a3a34cb ISource 70294->70296 70297 7ff67a3a34ef 70295->70297 70300 7ff67a38d450 86 API calls 70297->70300 70301 7ff67a38d390 86 API calls 2 library calls 70299->70301 70301->70293 70302 7ff67a3f0617 70303 7ff67a3f0621 70302->70303 70308 7ff67a3f0a90 70303->70308 70306 7ff67a415220 _Strxfrm 8 API calls 70307 7ff67a3f093b 70306->70307 70311 7ff67a3f0acf 70308->70311 70314 7ff67a3f0630 70308->70314 70309 7ff67a3f0d4f 70324 7ff67a3bae20 8 API calls _Strxfrm 70309->70324 70311->70309 70317 7ff67a3f0cce 70311->70317 70323 7ff67a3badc0 86 API calls 70311->70323 70313 7ff67a3f0d70 70315 7ff67a3a63e0 86 API calls 70313->70315 70314->70306 70316 7ff67a3f0d99 70315->70316 70318 7ff67a418404 Concurrency::cancel_current_task 2 API calls 70316->70318 70317->70314 70319 7ff67a3a63e0 86 API calls 70317->70319 70318->70317 70320 7ff67a3f0de4 70319->70320 70321 7ff67a418404 Concurrency::cancel_current_task 2 API calls 70320->70321 70322 7ff67a3f0df5 70321->70322 70323->70311 70324->70313 70325 7ff67a3b2e30 70326 7ff67a3b2e47 70325->70326 70327 7ff67a3b2e52 ctype 70325->70327 70328 7ff67a3b2f8d 70327->70328 70331 7ff67a3b2e63 ctype 70327->70331 70332 7ff67a3f8534 70327->70332 70330 7ff67a3f8534 _fread_nolock 92 API calls 70328->70330 70328->70331 70330->70331 70335 7ff67a3f8554 70332->70335 70336 7ff67a3f857e 70335->70336 70337 7ff67a3f854c 70335->70337 70336->70337 70338 7ff67a3f858d memcpy_s 70336->70338 70339 7ff67a3f85ca 70336->70339 70337->70327 70349 7ff67a3fd1cc 11 API calls memcpy_s 70338->70349 70348 7ff67a3f7a4c EnterCriticalSection 70339->70348 70344 7ff67a3f85a2 70350 7ff67a3f8d08 83 API calls _invalid_parameter_noinfo 70344->70350 70349->70344 70350->70337 70351 7ff67a3bb750 70368 7ff67a3e3c90 70351->70368 70355 7ff67a392bb0 83 API calls 70356 7ff67a3bb8af 70355->70356 70357 7ff67a415220 _Strxfrm 8 API calls 70356->70357 70359 7ff67a3bb8c2 70357->70359 70358 7ff67a3bb7a3 70455 7ff67a3d1cf0 CryptUnprotectData 70358->70455 70361 7ff67a3bb87f ISource 70361->70355 70362 7ff67a3bb7d6 ISource 70362->70361 70363 7ff67a3bb8d0 70362->70363 70365 7ff67a3bb8cb 70362->70365 70364 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70363->70364 70366 7ff67a3bb8d6 70364->70366 70367 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70365->70367 70367->70363 70369 7ff67a3e3cee 70368->70369 70370 7ff67a3e3dd4 70368->70370 70463 7ff67a4153d0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 70369->70463 70372 7ff67a3e3ed6 70370->70372 70464 7ff67a4153d0 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 70370->70464 70374 7ff67a38f320 86 API calls 70372->70374 70376 7ff67a3e3f4e ISource 70374->70376 70379 7ff67a3903b0 107 API calls 70376->70379 70381 7ff67a3e445f 70376->70381 70386 7ff67a3e3fc5 memcpy_s 70379->70386 70384 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70381->70384 70391 7ff67a3e4465 70384->70391 70393 7ff67a3f0f30 153 API calls 70386->70393 70407 7ff67a3e4304 70386->70407 70390 7ff67a3e4116 ISource 70392 7ff67a415220 _Strxfrm 8 API calls 70390->70392 70469 7ff67a38e870 86 API calls 70391->70469 70396 7ff67a3bb785 70392->70396 70397 7ff67a3e403d 70393->70397 70394 7ff67a3e445a 70398 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70394->70398 70396->70361 70450 7ff67a3a50b0 70396->70450 70400 7ff67a3e42ab 70397->70400 70401 7ff67a3e404d 70397->70401 70398->70381 70399 7ff67a3e448f 70402 7ff67a418404 Concurrency::cancel_current_task 2 API calls 70399->70402 70468 7ff67a3b3610 87 API calls 70400->70468 70403 7ff67a3f12e0 89 API calls 70401->70403 70405 7ff67a3e44a3 70402->70405 70406 7ff67a3e407f 70403->70406 70470 7ff67a38e870 86 API calls 70405->70470 70409 7ff67a3e411e 70406->70409 70410 7ff67a3e409c 70406->70410 70407->70390 70407->70394 70434 7ff67a3e451e 70407->70434 70411 7ff67a3efb90 86 API calls 70409->70411 70410->70391 70413 7ff67a3e40cd 70410->70413 70417 7ff67a3e4132 70411->70417 70412 7ff67a3e44cc 70414 7ff67a418404 Concurrency::cancel_current_task 2 API calls 70412->70414 70415 7ff67a3ef9d0 90 API calls 70413->70415 70418 7ff67a3e44e0 70414->70418 70416 7ff67a3e40da 70415->70416 70465 7ff67a3b27f0 87 API calls 70416->70465 70419 7ff67a3e41cb 70417->70419 70420 7ff67a3e4149 70417->70420 70471 7ff67a38e870 86 API calls 70418->70471 70422 7ff67a3efb90 86 API calls 70419->70422 70420->70405 70423 7ff67a3e417a 70420->70423 70425 7ff67a3e41df 70422->70425 70426 7ff67a3ef9d0 90 API calls 70423->70426 70424 7ff67a3e4108 70428 7ff67a38f3f0 83 API calls 70424->70428 70429 7ff67a3efb90 86 API calls 70425->70429 70430 7ff67a3e4187 70426->70430 70428->70390 70433 7ff67a3e41ee 70429->70433 70466 7ff67a3b27f0 87 API calls 70430->70466 70431 7ff67a3e450a 70432 7ff67a418404 Concurrency::cancel_current_task 2 API calls 70431->70432 70432->70434 70435 7ff67a3c5010 92 API calls 70433->70435 70472 7ff67a38fbe0 91 API calls Concurrency::cancel_current_task 70434->70472 70436 7ff67a3e41fe 70435->70436 70436->70418 70439 7ff67a3e4230 70436->70439 70438 7ff67a3e41b5 70440 7ff67a38f3f0 83 API calls 70438->70440 70441 7ff67a3ef9d0 90 API calls 70439->70441 70440->70390 70442 7ff67a3e423d 70441->70442 70443 7ff67a3a1a80 86 API calls 70442->70443 70444 7ff67a3e424d 70443->70444 70445 7ff67a3a1990 83 API calls 70444->70445 70446 7ff67a3e4266 70445->70446 70467 7ff67a3b27f0 87 API calls 70446->70467 70448 7ff67a3e428a 70449 7ff67a38f3f0 83 API calls 70448->70449 70449->70390 70451 7ff67a3a18d0 86 API calls 70450->70451 70452 7ff67a3a5108 ctype 70451->70452 70453 7ff67a3a18d0 86 API calls 70452->70453 70454 7ff67a3a5249 70453->70454 70454->70358 70456 7ff67a3d1d56 70455->70456 70457 7ff67a3d1e1c 70455->70457 70459 7ff67a3d1d7d memcpy_s ctype 70456->70459 70460 7ff67a3a76b0 86 API calls 70456->70460 70458 7ff67a415220 _Strxfrm 8 API calls 70457->70458 70461 7ff67a3d1e36 70458->70461 70462 7ff67a3d1dd6 LocalFree 70459->70462 70460->70459 70461->70362 70462->70457 70465->70424 70466->70438 70467->70448 70468->70407 70469->70399 70470->70412 70471->70431 70473 7ff67a3bbaf0 70474 7ff67a38f020 86 API calls 70473->70474 70475 7ff67a3bbb50 70474->70475 70476 7ff67a38eeb0 92 API calls 70475->70476 70477 7ff67a3bbb61 70476->70477 70478 7ff67a3be288 70477->70478 70479 7ff67a3bbba5 ISource 70477->70479 70480 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70478->70480 70481 7ff67a3a33a0 86 API calls 70479->70481 70573 7ff67a3bbc7f ISource 70479->70573 70482 7ff67a3be28d 70480->70482 70481->70573 70484 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70482->70484 70483 7ff67a3bc006 70486 7ff67a38f320 86 API calls 70483->70486 70487 7ff67a3be293 70484->70487 70485 7ff67a396c10 86 API calls 70485->70573 70488 7ff67a3bc195 70486->70488 70489 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70487->70489 70490 7ff67a3bc1d9 ISource 70488->70490 70491 7ff67a3be299 70488->70491 70489->70491 70492 7ff67a3903b0 107 API calls 70490->70492 70494 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70491->70494 70493 7ff67a3bc20c 70492->70493 70628 7ff67a3bc85c ISource ctype 70493->70628 70636 7ff67a3a3ef0 70493->70636 70496 7ff67a3be29f 70494->70496 70495 7ff67a3903b0 107 API calls 70495->70573 70704 7ff67a38fbe0 91 API calls Concurrency::cancel_current_task 70496->70704 70497 7ff67a3be2ef 70705 7ff67a38fbe0 91 API calls Concurrency::cancel_current_task 70497->70705 70501 7ff67a3be30c 70505 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70501->70505 70503 7ff67a3be2bc 70506 7ff67a38fb70 91 API calls 70503->70506 70504 7ff67a3be19d 70507 7ff67a3be1e0 ISource 70504->70507 70512 7ff67a3be4c6 70504->70512 70511 7ff67a3be312 70505->70511 70509 7ff67a3be2d3 70506->70509 70510 7ff67a3be23c ISource 70507->70510 70518 7ff67a3be4cc 70507->70518 70508 7ff67a3e2b90 214 API calls 70508->70573 70516 7ff67a38fb70 91 API calls 70509->70516 70513 7ff67a415220 _Strxfrm 8 API calls 70510->70513 70521 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70511->70521 70520 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70512->70520 70519 7ff67a3be26d 70513->70519 70514 7ff67a3903b0 107 API calls 70514->70628 70515 7ff67a392bb0 83 API calls 70515->70573 70522 7ff67a3be2e3 70516->70522 70524 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70518->70524 70520->70518 70523 7ff67a3be318 70521->70523 70527 7ff67a38ea20 2 API calls 70522->70527 70528 7ff67a38fb70 91 API calls 70523->70528 70525 7ff67a3be4d2 70524->70525 70526 7ff67a3be3c9 70709 7ff67a38fbe0 91 API calls Concurrency::cancel_current_task 70526->70709 70531 7ff67a3be2e9 70527->70531 70529 7ff67a3be328 70528->70529 70536 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70529->70536 70537 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70531->70537 70532 7ff67a3be3e6 70542 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70532->70542 70533 7ff67a3903b0 107 API calls 70619 7ff67a3bc298 70533->70619 70535 7ff67a396c10 86 API calls 70535->70628 70540 7ff67a3be32e 70536->70540 70537->70497 70538 7ff67a396c10 86 API calls 70633 7ff67a3bd5b1 ISource ctype 70538->70633 70539 7ff67a3a1a80 86 API calls 70539->70573 70547 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70540->70547 70541 7ff67a3be391 70546 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70541->70546 70545 7ff67a3be3ec 70542->70545 70543 7ff67a3be3b2 70544 7ff67a38fb70 91 API calls 70543->70544 70544->70526 70552 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70545->70552 70550 7ff67a3be397 70546->70550 70551 7ff67a3be334 70547->70551 70549 7ff67a3e2b90 214 API calls 70549->70619 70707 7ff67a38d450 86 API calls 70550->70707 70706 7ff67a38d390 86 API calls 2 library calls 70551->70706 70553 7ff67a3be3f2 70552->70553 70559 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70553->70559 70554 7ff67a38f020 86 API calls 70554->70619 70557 7ff67a3be39d 70562 7ff67a38ea20 2 API calls 70557->70562 70558 7ff67a3903b0 107 API calls 70558->70633 70561 7ff67a3be3f8 70559->70561 70560 7ff67a38eeb0 92 API calls 70560->70619 70568 7ff67a38fb70 91 API calls 70561->70568 70564 7ff67a3be3a3 70562->70564 70563 7ff67a38f3f0 83 API calls 70563->70619 70708 7ff67a38fa60 86 API calls 2 library calls 70564->70708 70565 7ff67a3a0ac0 86 API calls 70565->70573 70566 7ff67a3be33a 70576 7ff67a3a63e0 86 API calls 70566->70576 70567 7ff67a3be4a9 70713 7ff67a38fbe0 91 API calls Concurrency::cancel_current_task 70567->70713 70570 7ff67a3be408 70568->70570 70577 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70570->70577 70572 7ff67a3a1990 83 API calls 70572->70619 70573->70482 70573->70483 70573->70485 70573->70487 70573->70495 70573->70496 70573->70508 70573->70515 70573->70539 70573->70565 70660 7ff67a3b42c0 70573->70660 70581 7ff67a3be377 70576->70581 70583 7ff67a3be40e 70577->70583 70578 7ff67a392bb0 83 API calls 70578->70619 70580 7ff67a3be471 70585 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70580->70585 70586 7ff67a418404 Concurrency::cancel_current_task 2 API calls 70581->70586 70582 7ff67a3be492 70587 7ff67a38fb70 91 API calls 70582->70587 70590 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70583->70590 70584 7ff67a3e2b90 214 API calls 70584->70628 70588 7ff67a3be477 70585->70588 70589 7ff67a3be38b 70586->70589 70587->70567 70711 7ff67a38d450 86 API calls 70588->70711 70594 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70589->70594 70592 7ff67a3be414 70590->70592 70591 7ff67a392bb0 83 API calls 70591->70628 70710 7ff67a38d390 86 API calls 2 library calls 70592->70710 70594->70541 70595 7ff67a3be47d 70598 7ff67a38ea20 2 API calls 70595->70598 70597 7ff67a396990 86 API calls 70597->70628 70599 7ff67a3be483 70598->70599 70712 7ff67a38fa60 86 API calls 2 library calls 70599->70712 70600 7ff67a3b42c0 86 API calls 70600->70619 70601 7ff67a38eeb0 92 API calls 70601->70628 70602 7ff67a3be41a 70605 7ff67a3a63e0 86 API calls 70602->70605 70604 7ff67a3e2b90 214 API calls 70604->70633 70608 7ff67a3be457 70605->70608 70609 7ff67a418404 Concurrency::cancel_current_task 2 API calls 70608->70609 70611 7ff67a3be46b 70609->70611 70610 7ff67a3b42c0 86 API calls 70610->70628 70613 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70611->70613 70612 7ff67a392bb0 83 API calls 70612->70633 70613->70580 70614 7ff67a3a1a80 86 API calls 70614->70619 70615 7ff67a396990 86 API calls 70615->70633 70616 7ff67a38eeb0 92 API calls 70616->70633 70618 7ff67a3a0ac0 86 API calls 70618->70619 70619->70509 70619->70522 70619->70533 70619->70549 70619->70554 70619->70560 70619->70563 70619->70572 70619->70578 70619->70600 70619->70614 70619->70618 70619->70628 70651 7ff67a390070 70619->70651 70668 7ff67a3a2870 86 API calls 3 library calls 70619->70668 70669 7ff67a3a09e0 86 API calls 3 library calls 70619->70669 70620 7ff67a3a0ac0 86 API calls 70620->70628 70621 7ff67a3b42c0 86 API calls 70621->70633 70623 7ff67a3a0ac0 86 API calls 70623->70633 70624 7ff67a3a1a80 86 API calls 70624->70633 70625 7ff67a3a1a80 86 API calls 70625->70628 70626 7ff67a4154e0 86 API calls std::_Facet_Register 70626->70628 70627 7ff67a3a2620 86 API calls 70627->70628 70628->70497 70628->70501 70628->70511 70628->70514 70628->70523 70628->70526 70628->70529 70628->70531 70628->70535 70628->70540 70628->70541 70628->70543 70628->70550 70628->70551 70628->70557 70628->70564 70628->70566 70628->70584 70628->70589 70628->70591 70628->70597 70628->70601 70628->70610 70628->70620 70628->70625 70628->70626 70628->70627 70628->70633 70670 7ff67a3c4ad0 97 API calls 2 library calls 70628->70670 70671 7ff67a3a0c60 86 API calls 70628->70671 70672 7ff67a3a3510 70628->70672 70676 7ff67a3ab9d0 70628->70676 70700 7ff67a3baf00 116 API calls _Strxfrm 70628->70700 70631 7ff67a4154e0 86 API calls std::_Facet_Register 70631->70633 70632 7ff67a3a2620 86 API calls 70632->70633 70633->70504 70633->70532 70633->70538 70633->70545 70633->70553 70633->70558 70633->70561 70633->70567 70633->70570 70633->70580 70633->70582 70633->70583 70633->70588 70633->70592 70633->70595 70633->70599 70633->70602 70633->70604 70633->70611 70633->70612 70633->70615 70633->70616 70633->70621 70633->70623 70633->70624 70633->70631 70633->70632 70634 7ff67a3a3510 8 API calls 70633->70634 70635 7ff67a3ab9d0 86 API calls 70633->70635 70701 7ff67a3c4ad0 97 API calls 2 library calls 70633->70701 70702 7ff67a3a0c60 86 API calls 70633->70702 70703 7ff67a3baf00 116 API calls _Strxfrm 70633->70703 70634->70633 70635->70633 70637 7ff67a396c10 86 API calls 70636->70637 70638 7ff67a3a3f3c 70637->70638 70714 7ff67a38fc40 70638->70714 70641 7ff67a4154e0 std::_Facet_Register 86 API calls 70643 7ff67a3a3f9f 70641->70643 70642 7ff67a41c068 89 API calls 70644 7ff67a3a406e 70642->70644 70726 7ff67a38ff80 83 API calls 70643->70726 70646 7ff67a38f3f0 83 API calls 70644->70646 70647 7ff67a3a4079 70646->70647 70648 7ff67a415220 _Strxfrm 8 API calls 70647->70648 70649 7ff67a3a408a 70648->70649 70649->70503 70649->70619 70650 7ff67a3a3fd6 70650->70642 70653 7ff67a3900a0 70651->70653 70652 7ff67a41c048 2 API calls 70652->70653 70653->70652 70654 7ff67a39016e 70653->70654 70656 7ff67a3900db 70653->70656 70739 7ff67a38fa60 86 API calls 2 library calls 70654->70739 70655 7ff67a415220 _Strxfrm 8 API calls 70659 7ff67a390159 70655->70659 70656->70655 70658 7ff67a39017c 70659->70619 70661 7ff67a3b42f3 70660->70661 70662 7ff67a4154e0 std::_Facet_Register 86 API calls 70661->70662 70663 7ff67a3b4308 70662->70663 70664 7ff67a3a1a80 86 API calls 70663->70664 70665 7ff67a3b4325 70664->70665 70666 7ff67a415220 _Strxfrm 8 API calls 70665->70666 70667 7ff67a3b433e 70666->70667 70667->70573 70668->70619 70669->70619 70670->70628 70671->70628 70673 7ff67a3a3556 70672->70673 70674 7ff67a415220 _Strxfrm 8 API calls 70673->70674 70675 7ff67a3a36a4 70674->70675 70675->70628 70677 7ff67a3aba11 70676->70677 70678 7ff67a3abb41 70676->70678 70680 7ff67a3abb3c 70677->70680 70683 7ff67a3aba61 70677->70683 70684 7ff67a3aba95 70677->70684 70744 7ff67a3a0670 86 API calls 70678->70744 70743 7ff67a38d390 86 API calls 2 library calls 70680->70743 70682 7ff67a3abb47 70686 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70682->70686 70683->70680 70685 7ff67a3aba6e 70683->70685 70689 7ff67a4154e0 std::_Facet_Register 86 API calls 70684->70689 70691 7ff67a3aba7f 70684->70691 70688 7ff67a4154e0 std::_Facet_Register 86 API calls 70685->70688 70687 7ff67a3abb4d 70686->70687 70690 7ff67a3aba76 70688->70690 70689->70691 70690->70682 70690->70691 70692 7ff67a3a3510 8 API calls 70691->70692 70693 7ff67a3abadc 70692->70693 70694 7ff67a3abaed 70693->70694 70740 7ff67a3a7b50 8 API calls _Strxfrm 70693->70740 70741 7ff67a3a7b50 8 API calls _Strxfrm 70694->70741 70697 7ff67a3abb17 70742 7ff67a3a3ab0 83 API calls 2 library calls 70697->70742 70699 7ff67a3abb29 70699->70628 70700->70628 70701->70633 70702->70633 70703->70633 70706->70566 70708->70543 70710->70602 70712->70582 70715 7ff67a38fc63 70714->70715 70716 7ff67a396990 86 API calls 70715->70716 70723 7ff67a38fd8b 70715->70723 70717 7ff67a38fcbf 70716->70717 70719 7ff67a38fdc6 70717->70719 70720 7ff67a38fd28 ISource 70717->70720 70721 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70719->70721 70727 7ff67a41c088 70720->70727 70722 7ff67a38fdcb 70721->70722 70723->70641 70723->70650 70725 7ff67a38fd58 70725->70723 70735 7ff67a41c048 FindNextFileW 70725->70735 70728 7ff67a41c0a6 FindClose 70727->70728 70729 7ff67a41c0b3 FindFirstFileExW 70727->70729 70728->70729 70730 7ff67a41c0f4 70728->70730 70731 7ff67a41c0de GetLastError 70729->70731 70733 7ff67a41c0da 70729->70733 70738 7ff67a40876c 88 API calls 2 library calls 70730->70738 70731->70733 70733->70725 70734 7ff67a41c0f9 70736 7ff67a41c056 70735->70736 70737 7ff67a41c05d GetLastError 70735->70737 70736->70725 70738->70734 70739->70658 70740->70694 70741->70697 70742->70699 70743->70678 70744->70682 70745 7ff67a3a2f11 70746 7ff67a3a2f24 70745->70746 70765 7ff67a3a3272 70745->70765 70766 7ff67a3a3960 70746->70766 70749 7ff67a3a3278 70774 7ff67a3a0670 86 API calls 70765->70774 70768 7ff67a3a3994 70766->70768 70772 7ff67a3a39f1 70766->70772 70775 7ff67a3a7b50 8 API calls _Strxfrm 70768->70775 70769 7ff67a3a3a17 70771 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70769->70771 70773 7ff67a3a3a1d 70771->70773 70776 7ff67a38d390 86 API calls 2 library calls 70772->70776 70774->70749 70775->70772 70776->70769 70777 7ff67a397671 70778 7ff67a38f3f0 83 API calls 70777->70778 70779 7ff67a3976a4 FindNextFileW 70778->70779 70780 7ff67a3976c2 70779->70780 70781 7ff67a415220 _Strxfrm 8 API calls 70780->70781 70782 7ff67a3976e9 70781->70782 70783 7ff67a3f2ace 70788 7ff67a3f3440 70783->70788 70786 7ff67a415220 _Strxfrm 8 API calls 70787 7ff67a3f2b0b 70786->70787 70789 7ff67a3f345e 70788->70789 70790 7ff67a3f3491 70789->70790 70794 7ff67a3cbc80 86 API calls 5 library calls 70789->70794 70792 7ff67a3f3d60 86 API calls 70790->70792 70793 7ff67a3f2ad6 70792->70793 70793->70786 70794->70790 70795 7ff67a3a35e9 70796 7ff67a4154e0 std::_Facet_Register 86 API calls 70795->70796 70797 7ff67a3a35fc 70796->70797 70798 7ff67a3a1a80 86 API calls 70797->70798 70799 7ff67a3a3619 70798->70799 70800 7ff67a415220 _Strxfrm 8 API calls 70799->70800 70801 7ff67a3a36a4 70800->70801 70802 7ff67a3ea52b RegOpenKeyExA 70803 7ff67a3ea555 RegQueryValueExA 70802->70803 70811 7ff67a3ea5cd ISource 70802->70811 70808 7ff67a3ea594 70803->70808 70803->70811 70804 7ff67a3ea624 RegCloseKey 70805 7ff67a3ea62a 70804->70805 70807 7ff67a415220 _Strxfrm 8 API calls 70805->70807 70809 7ff67a3ea63d 70807->70809 70812 7ff67a3a19f0 70808->70812 70811->70804 70811->70805 70813 7ff67a3a1a33 ISource 70812->70813 70814 7ff67a3a1a05 70812->70814 70813->70811 70814->70813 70815 7ff67a3f8d28 _invalid_parameter_noinfo_noreturn 83 API calls 70814->70815 70816 7ff67a3a1a7a 70815->70816 70817 7ff67a3f00a8 70818 7ff67a3f00ce 70817->70818 70837 7ff67a3f00b9 70817->70837 70819 7ff67a3f00d7 70818->70819 70833 7ff67a3f027b 70818->70833 70821 7ff67a3a18d0 86 API calls 70819->70821 70836 7ff67a3f0131 70819->70836 70820 7ff67a3f0327 70824 7ff67a3f0a90 89 API calls 70820->70824 70821->70836 70822 7ff67a415220 _Strxfrm 8 API calls 70823 7ff67a3f093b 70822->70823 70826 7ff67a3f0340 70824->70826 70825 7ff67a3f0a90 89 API calls 70825->70833 70828 7ff67a3f0050 8 API calls 70826->70828 70827 7ff67a3f01f0 70829 7ff67a3f0a90 89 API calls 70827->70829 70828->70837 70830 7ff67a3f0222 70829->70830 70834 7ff67a3f0050 8 API calls 70830->70834 70831 7ff67a3f0050 8 API calls 70831->70833 70832 7ff67a3f0a90 89 API calls 70832->70836 70833->70820 70833->70825 70833->70831 70834->70837 70835 7ff67a3f0050 8 API calls 70835->70836 70836->70827 70836->70832 70836->70835 70837->70822 70838 7ff67a3a356d 70839 7ff67a4154e0 std::_Facet_Register 86 API calls 70838->70839 70840 7ff67a3a3580 70839->70840 70845 7ff67a3ac7c0 70840->70845 70842 7ff67a3a359d 70843 7ff67a415220 _Strxfrm 8 API calls 70842->70843 70844 7ff67a3a36a4 70843->70844 70846 7ff67a4154e0 std::_Facet_Register 86 API calls 70845->70846 70847 7ff67a3ac7f8 70846->70847 70850 7ff67a3b8080 70847->70850 70849 7ff67a3ac81e 70849->70842 70849->70849 70851 7ff67a3b80b4 70850->70851 70852 7ff67a3b815a 70850->70852 70853 7ff67a4154e0 std::_Facet_Register 86 API calls 70851->70853 70852->70849 70854 7ff67a3b80cd 70853->70854 70855 7ff67a3a1a80 86 API calls 70854->70855 70856 7ff67a3b80ea 70855->70856 70857 7ff67a3a3510 8 API calls 70856->70857 70858 7ff67a3b80f8 70857->70858 70859 7ff67a3b8080 86 API calls 70858->70859 70859->70852
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: FileModuleName
                              • String ID: $ --key "$" --type $APPB:$File.exe$cmd /c ""$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$status$6
                              • API String ID: 514040917-1525073170
                              • Opcode ID: b6f5afb4a6fe61e2ed6851905531e8daabbbe0178d6d0cdbf5cf16677d4d5fa3
                              • Instruction ID: 1664a82e766e5468305ad322683a40c51f84db4ec7359b9a0ae1b77f03edabe4
                              • Opcode Fuzzy Hash: b6f5afb4a6fe61e2ed6851905531e8daabbbe0178d6d0cdbf5cf16677d4d5fa3
                              • Instruction Fuzzy Hash: 5823B673A25BC589EB608F29D8403ED7361FB85768F505325EA9D87BA9EF78D240C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 519 7ff67a3e9310-7ff67a3e9459 GetSystemMetrics * 4 GetDC GetDeviceCaps * 2 CreateCompatibleDC CreateCompatibleBitmap SelectObject BitBlt SHCreateMemStream 520 7ff67a3e9523-7ff67a3e95ad call 7ff67a3e1970 EnterCriticalSection LeaveCriticalSection GetObjectW 519->520 521 7ff67a3e945f-7ff67a3e94b1 SelectObject DeleteDC ReleaseDC DeleteObject 519->521 532 7ff67a3e960f-7ff67a3e962a 520->532 533 7ff67a3e95af-7ff67a3e95f5 520->533 522 7ff67a3e94b3-7ff67a3e94c4 521->522 523 7ff67a3e94f0-7ff67a3e9522 call 7ff67a415220 521->523 525 7ff67a3e94df call 7ff67a415240 522->525 526 7ff67a3e94c6-7ff67a3e94d9 522->526 535 7ff67a3e94e4-7ff67a3e94eb 525->535 526->525 529 7ff67a3e98c3-7ff67a3e98c8 call 7ff67a3f8d28 526->529 534 7ff67a3e962e-7ff67a3e9679 call 7ff67a3e1b00 IStream_Size IStream_Reset 532->534 533->534 537 7ff67a3e95f7-7ff67a3e960d 533->537 541 7ff67a3e9685 534->541 542 7ff67a3e967b-7ff67a3e9683 534->542 535->523 537->534 543 7ff67a3e96ba-7ff67a3e9769 IStream_Read call 7ff67a417bf0 call 7ff67a39ffc0 call 7ff67a3c47b0 SelectObject DeleteDC ReleaseDC DeleteObject 541->543 544 7ff67a3e9687-7ff67a3e9691 541->544 542->543 559 7ff67a3e976b-7ff67a3e9778 543->559 560 7ff67a3e9798-7ff67a3e979a 543->560 545 7ff67a3e9693-7ff67a3e969f call 7ff67a3f4640 544->545 546 7ff67a3e96a1-7ff67a3e96b2 call 7ff67a417bf0 544->546 554 7ff67a3e96b6 545->554 546->554 554->543 559->560 561 7ff67a3e977a-7ff67a3e9796 559->561 562 7ff67a3e979c-7ff67a3e97a9 560->562 563 7ff67a3e97c7-7ff67a3e97cb 560->563 564 7ff67a3e97d0-7ff67a3e97d3 561->564 562->563 565 7ff67a3e97ab-7ff67a3e97c5 562->565 563->564 566 7ff67a3e97d5-7ff67a3e97d8 call 7ff67a3a33a0 564->566 567 7ff67a3e97dd-7ff67a3e9818 call 7ff67a39eb50 564->567 565->564 566->567 571 7ff67a3e983e-7ff67a3e9854 call 7ff67a3e1970 EnterCriticalSection 567->571 572 7ff67a3e981a-7ff67a3e9838 DeleteObject 567->572 575 7ff67a3e987b-7ff67a3e988d LeaveCriticalSection 571->575 576 7ff67a3e9856-7ff67a3e9866 EnterCriticalSection 571->576 572->571 575->523 579 7ff67a3e9893-7ff67a3e98a4 575->579 577 7ff67a3e986e-7ff67a3e9875 LeaveCriticalSection 576->577 578 7ff67a3e9868 GdiplusShutdown 576->578 577->575 578->577 579->525 580 7ff67a3e98aa-7ff67a3e98bd 579->580 580->525 580->529
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Object$CriticalSection$Delete$MetricsSystem$CreateEnterLeaveSelectStream_$CapsCompatibleDeviceRelease$BitmapGdiplusReadResetShutdownSizeStream_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 1635401455-3916222277
                              • Opcode ID: 9b3a16a6f4fd2a042ba7d4b4e75a123d7b9354d285038708d050d696656628ef
                              • Instruction ID: 0a1d0744d0b37a9796fde9c868dc3fe8b85e80dc40cc2c4b2445dc8ea2f4706f
                              • Opcode Fuzzy Hash: 9b3a16a6f4fd2a042ba7d4b4e75a123d7b9354d285038708d050d696656628ef
                              • Instruction Fuzzy Hash: 1D029033A28B818AE710CF76D8442AD73A1FB497A8F504275EA5D97BA8DF3DD484C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$__std_fs_convert_wide_to_narrow
                              • String ID: cannot use push_back() with $content$directory_iterator::directory_iterator$exists$filename$recursive_directory_iterator::operator++$recursive_directory_iterator::recursive_directory_iterator$status
                              • API String ID: 972399972-4250644884
                              • Opcode ID: 08c317fa21121830441233f15a5516dbd982e1a91429a72fc7e1740c9ac399a7
                              • Instruction ID: f41a617303a3eb818f3cfa8a8ccb921cf528fa6d52fa08f8a8cccd5d1cd8564a
                              • Opcode Fuzzy Hash: 08c317fa21121830441233f15a5516dbd982e1a91429a72fc7e1740c9ac399a7
                              • Instruction Fuzzy Hash: 43235D63A29BC681EA309F15E4803EAB361FBC57A4F504276D69D87BA9DF3CD544CB00

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1289 7ff67a3eba60-7ff67a3ebf29 call 7ff67a3e9ef0 call 7ff67a3e9e20 call 7ff67a3e9fb0 call 7ff67a3e9a60 call 7ff67a3e9b00 call 7ff67a3eb750 call 7ff67a3e98d0 call 7ff67a3b42c0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 call 7ff67a3b42c0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 call 7ff67a3b42c0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 call 7ff67a3b42c0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 GlobalMemoryStatusEx 1352 7ff67a3ebf32-7ff67a3ebf43 1289->1352 1353 7ff67a3ebf2b-7ff67a3ebf30 1289->1353 1354 7ff67a3ebf47-7ff67a3ec27d call 7ff67a3a2e00 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 call 7ff67a3b42c0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 call 7ff67a3b42c0 call 7ff67a391d20 call 7ff67a3a0ac0 1352->1354 1353->1354 1385 7ff67a3ec280-7ff67a3ec288 1354->1385 1385->1385 1386 7ff67a3ec28a-7ff67a3ec2f6 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 call 7ff67a3e9310 1385->1386 1395 7ff67a3ec2fb-7ff67a3ec40f call 7ff67a3a40b0 call 7ff67a3a4380 call 7ff67a391d20 call 7ff67a3a0ac0 1386->1395 1396 7ff67a3ec2f8 1386->1396 1405 7ff67a3ec410-7ff67a3ec418 1395->1405 1396->1395 1405->1405 1406 7ff67a3ec41a-7ff67a3ec473 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 1405->1406 1413 7ff67a3ec475-7ff67a3ec489 1406->1413 1414 7ff67a3ec4a9-7ff67a3ec4cb 1406->1414 1417 7ff67a3ec4a4 call 7ff67a415240 1413->1417 1418 7ff67a3ec48b-7ff67a3ec49e 1413->1418 1415 7ff67a3ec501-7ff67a3ec699 call 7ff67a3e9140 call 7ff67a3a4380 call 7ff67a391d20 call 7ff67a3a0ac0 1414->1415 1416 7ff67a3ec4cd-7ff67a3ec4e1 1414->1416 1441 7ff67a3ec6a0-7ff67a3ec6a8 1415->1441 1421 7ff67a3ec4e3-7ff67a3ec4f6 1416->1421 1422 7ff67a3ec4fc call 7ff67a415240 1416->1422 1417->1414 1418->1417 1419 7ff67a3ed3b3-7ff67a3ed3b8 call 7ff67a3f8d28 1418->1419 1424 7ff67a3ed3b9-7ff67a3ed3be call 7ff67a3f8d28 1419->1424 1421->1422 1421->1424 1422->1415 1433 7ff67a3ed3bf-7ff67a3ed3c4 call 7ff67a3f8d28 1424->1433 1439 7ff67a3ed3c5-7ff67a3ed3ca call 7ff67a3f8d28 1433->1439 1446 7ff67a3ed3cb-7ff67a3ed3d0 call 7ff67a3f8d28 1439->1446 1441->1441 1443 7ff67a3ec6aa-7ff67a3ec6fd call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 1441->1443 1457 7ff67a3ec733-7ff67a3ec7b0 call 7ff67a3ff67c call 7ff67a40067c call 7ff67a400a88 1443->1457 1458 7ff67a3ec6ff-7ff67a3ec713 1443->1458 1452 7ff67a3ed3d1-7ff67a3ed3d6 call 7ff67a3f8d28 1446->1452 1459 7ff67a3ed3d7-7ff67a3ed3dc call 7ff67a3f8d28 1452->1459 1475 7ff67a3ec7b3-7ff67a3ec7bb 1457->1475 1460 7ff67a3ec715-7ff67a3ec728 1458->1460 1461 7ff67a3ec72e call 7ff67a415240 1458->1461 1468 7ff67a3ed3dd-7ff67a3ed3e2 call 7ff67a3f8d28 1459->1468 1460->1433 1460->1461 1461->1457 1474 7ff67a3ed3e3-7ff67a3ed3e8 call 7ff67a3f8d28 1468->1474 1480 7ff67a3ed3e9-7ff67a3ed3ee call 7ff67a3f8d28 1474->1480 1475->1475 1477 7ff67a3ec7bd-7ff67a3ec8d5 call 7ff67a391d20 call 7ff67a3a4380 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 1475->1477 1507 7ff67a3ec90b-7ff67a3ec96d call 7ff67a417bf0 GetModuleFileNameA 1477->1507 1508 7ff67a3ec8d7-7ff67a3ec8eb 1477->1508 1486 7ff67a3ed3ef-7ff67a3ed3f4 call 7ff67a3f8d28 1480->1486 1492 7ff67a3ed3f5-7ff67a3ed3fa call 7ff67a3f8d28 1486->1492 1498 7ff67a3ed3fb-7ff67a3ed400 call 7ff67a3f8d28 1492->1498 1504 7ff67a3ed401-7ff67a3ed406 call 7ff67a3f8d28 1498->1504 1512 7ff67a3ed407-7ff67a3ed40f call 7ff67a3f8d28 1504->1512 1518 7ff67a3ec970-7ff67a3ec978 1507->1518 1510 7ff67a3ec8ed-7ff67a3ec900 1508->1510 1511 7ff67a3ec906 call 7ff67a415240 1508->1511 1510->1439 1510->1511 1511->1507 1518->1518 1519 7ff67a3ec97a-7ff67a3ecab9 call 7ff67a391d20 call 7ff67a3a40b0 call 7ff67a3a4380 call 7ff67a391d20 call 7ff67a3a0ac0 1518->1519 1530 7ff67a3ecac0-7ff67a3ecac8 1519->1530 1530->1530 1531 7ff67a3ecaca-7ff67a3ecb2b call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 1530->1531 1538 7ff67a3ecb61-7ff67a3ecb89 1531->1538 1539 7ff67a3ecb2d-7ff67a3ecb41 1531->1539 1540 7ff67a3ecbbc-7ff67a3ecbef call 7ff67a3eadb0 1538->1540 1541 7ff67a3ecb8b-7ff67a3ecb9c 1538->1541 1542 7ff67a3ecb43-7ff67a3ecb56 1539->1542 1543 7ff67a3ecb5c call 7ff67a415240 1539->1543 1550 7ff67a3ecbf4-7ff67a3eccfc call 7ff67a3a40b0 call 7ff67a3a4380 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 1540->1550 1551 7ff67a3ecbf1 1540->1551 1545 7ff67a3ecb9e-7ff67a3ecbb1 1541->1545 1546 7ff67a3ecbb7 call 7ff67a415240 1541->1546 1542->1446 1542->1543 1543->1538 1545->1452 1545->1546 1546->1540 1566 7ff67a3eccfe-7ff67a3ecd0f 1550->1566 1567 7ff67a3ecd2f-7ff67a3ecd4b 1550->1567 1551->1550 1568 7ff67a3ecd11-7ff67a3ecd24 1566->1568 1569 7ff67a3ecd2a call 7ff67a415240 1566->1569 1570 7ff67a3ecd81-7ff67a3ecebe call 7ff67a3a40b0 call 7ff67a3a4380 call 7ff67a391d20 call 7ff67a3a0ac0 1567->1570 1571 7ff67a3ecd4d-7ff67a3ecd61 1567->1571 1568->1459 1568->1569 1569->1567 1584 7ff67a3ecec0-7ff67a3ecec7 1570->1584 1572 7ff67a3ecd63-7ff67a3ecd76 1571->1572 1573 7ff67a3ecd7c call 7ff67a415240 1571->1573 1572->1468 1572->1573 1573->1570 1584->1584 1585 7ff67a3ecec9-7ff67a3ecf1e call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 1584->1585 1592 7ff67a3ecf20-7ff67a3ecf31 1585->1592 1593 7ff67a3ecf51-7ff67a3ecf74 1585->1593 1594 7ff67a3ecf33-7ff67a3ecf46 1592->1594 1595 7ff67a3ecf4c call 7ff67a415240 1592->1595 1596 7ff67a3ecf7a-7ff67a3ed043 call 7ff67a3b42c0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 1593->1596 1597 7ff67a3ed048-7ff67a3ed0fd call 7ff67a3a2620 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 1593->1597 1594->1474 1594->1595 1595->1593 1619 7ff67a3ed102-7ff67a3ed11d call 7ff67a3a2e00 1596->1619 1597->1619 1622 7ff67a3ed153-7ff67a3ed177 1619->1622 1623 7ff67a3ed11f-7ff67a3ed133 1619->1623 1626 7ff67a3ed1ad-7ff67a3ed1cf 1622->1626 1627 7ff67a3ed179-7ff67a3ed18d 1622->1627 1624 7ff67a3ed135-7ff67a3ed148 1623->1624 1625 7ff67a3ed14e call 7ff67a415240 1623->1625 1624->1480 1624->1625 1625->1622 1631 7ff67a3ed205-7ff67a3ed227 1626->1631 1632 7ff67a3ed1d1-7ff67a3ed1e5 1626->1632 1629 7ff67a3ed18f-7ff67a3ed1a2 1627->1629 1630 7ff67a3ed1a8 call 7ff67a415240 1627->1630 1629->1486 1629->1630 1630->1626 1633 7ff67a3ed25d-7ff67a3ed27f 1631->1633 1634 7ff67a3ed229-7ff67a3ed23d 1631->1634 1636 7ff67a3ed200 call 7ff67a415240 1632->1636 1637 7ff67a3ed1e7-7ff67a3ed1fa 1632->1637 1640 7ff67a3ed2b5-7ff67a3ed2d7 1633->1640 1641 7ff67a3ed281-7ff67a3ed295 1633->1641 1638 7ff67a3ed23f-7ff67a3ed252 1634->1638 1639 7ff67a3ed258 call 7ff67a415240 1634->1639 1636->1631 1637->1492 1637->1636 1638->1498 1638->1639 1639->1633 1646 7ff67a3ed30d-7ff67a3ed32f 1640->1646 1647 7ff67a3ed2d9-7ff67a3ed2ed 1640->1647 1644 7ff67a3ed2b0 call 7ff67a415240 1641->1644 1645 7ff67a3ed297-7ff67a3ed2aa 1641->1645 1644->1640 1645->1504 1645->1644 1648 7ff67a3ed361-7ff67a3ed3ac call 7ff67a415220 1646->1648 1649 7ff67a3ed331-7ff67a3ed345 1646->1649 1651 7ff67a3ed2ef-7ff67a3ed302 1647->1651 1652 7ff67a3ed308 call 7ff67a415240 1647->1652 1653 7ff67a3ed35c call 7ff67a415240 1649->1653 1654 7ff67a3ed347-7ff67a3ed35a 1649->1654 1651->1512 1651->1652 1652->1646 1653->1648 1654->1653 1657 7ff67a3ed3ad-7ff67a3ed3b2 call 7ff67a3f8d28 1654->1657 1657->1419
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Name$ComputerDevicesDisplayEnumFileGlobalMemoryModuleStatusUserValuewcsftime
                              • String ID: %d-%m-%Y, %H:%M:%S$computer_name$cpu$gpu$ram$system$time$timezone$user_name
                              • API String ID: 3508509583-1182675529
                              • Opcode ID: b8437008c695b881d6fc036d8695a89248c13af2ed9e5faac352d9dc755822a2
                              • Instruction ID: 11ba113439f73fbace8707825665742c7dd7f0090f95658fc430c87ae8a8db85
                              • Opcode Fuzzy Hash: b8437008c695b881d6fc036d8695a89248c13af2ed9e5faac352d9dc755822a2
                              • Instruction Fuzzy Hash: ECE2B533A29BC589EB20CF75D8402ED7765FB85758F405225EA8C97BA9EF38D284C740

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1662 7ff67a3d77f0-7ff67a3d7823 1663 7ff67a3d7855-7ff67a3d787a call 7ff67a415240 1662->1663 1664 7ff67a3d7825 1662->1664 1670 7ff67a3d78a5-7ff67a3d78c9 call 7ff67a415240 1663->1670 1671 7ff67a3d787c 1663->1671 1665 7ff67a3d7830-7ff67a3d7853 call 7ff67a3dd6d0 call 7ff67a415240 1664->1665 1665->1663 1679 7ff67a3d78e5-7ff67a3d7902 call 7ff67a415240 1670->1679 1680 7ff67a3d78cb 1670->1680 1674 7ff67a3d7880-7ff67a3d78a3 call 7ff67a3dd6d0 call 7ff67a415240 1671->1674 1674->1670 1688 7ff67a3d7904-7ff67a3d7915 1679->1688 1689 7ff67a3d7938-7ff67a3d7968 1679->1689 1682 7ff67a3d78d0-7ff67a3d78e3 call 7ff67a415240 1680->1682 1682->1679 1692 7ff67a3d7933 call 7ff67a415240 1688->1692 1693 7ff67a3d7917-7ff67a3d792a 1688->1693 1690 7ff67a3d7995-7ff67a3d79c8 call 7ff67a415240 call 7ff67a3d8a90 * 2 1689->1690 1691 7ff67a3d796a 1689->1691 1713 7ff67a3d79fe-7ff67a3d7a22 1690->1713 1714 7ff67a3d79ca-7ff67a3d79db 1690->1714 1695 7ff67a3d7970-7ff67a3d7993 call 7ff67a3dd6d0 call 7ff67a415240 1691->1695 1692->1689 1697 7ff67a3d7bb4-7ff67a3d7bb9 call 7ff67a3f8d28 1693->1697 1698 7ff67a3d7930 1693->1698 1695->1690 1707 7ff67a3d7bba-7ff67a3d7bbf call 7ff67a3f8d28 1697->1707 1698->1692 1715 7ff67a3d7bc0-7ff67a3d7bc5 call 7ff67a3f8d28 1707->1715 1719 7ff67a3d7a24-7ff67a3d7a35 1713->1719 1720 7ff67a3d7a58-7ff67a3d7a79 1713->1720 1716 7ff67a3d79dd-7ff67a3d79f0 1714->1716 1717 7ff67a3d79f9 call 7ff67a415240 1714->1717 1730 7ff67a3d7bc6-7ff67a3d7bcb call 7ff67a3f8d28 1715->1730 1716->1707 1721 7ff67a3d79f6 1716->1721 1717->1713 1724 7ff67a3d7a53 call 7ff67a415240 1719->1724 1725 7ff67a3d7a37-7ff67a3d7a4a 1719->1725 1726 7ff67a3d7a7b-7ff67a3d7a89 1720->1726 1727 7ff67a3d7aac-7ff67a3d7ac4 1720->1727 1721->1717 1724->1720 1725->1715 1731 7ff67a3d7a50 1725->1731 1733 7ff67a3d7a8b-7ff67a3d7a9e 1726->1733 1734 7ff67a3d7aa7 call 7ff67a415240 1726->1734 1728 7ff67a3d7ac6-7ff67a3d7ad4 1727->1728 1729 7ff67a3d7af7-7ff67a3d7b0f 1727->1729 1736 7ff67a3d7af2 call 7ff67a415240 1728->1736 1737 7ff67a3d7ad6-7ff67a3d7ae9 1728->1737 1739 7ff67a3d7b3e-7ff67a3d7b56 1729->1739 1740 7ff67a3d7b11-7ff67a3d7b1f 1729->1740 1743 7ff67a3d7bcc-7ff67a3d7c13 call 7ff67a3f8d28 call 7ff67a3e2ac0 1730->1743 1731->1724 1733->1730 1741 7ff67a3d7aa4 1733->1741 1734->1727 1736->1729 1742 7ff67a3d7aef 1737->1742 1737->1743 1748 7ff67a3d7b84-7ff67a3d7ba7 1739->1748 1749 7ff67a3d7b58-7ff67a3d7b65 1739->1749 1746 7ff67a3d7b21-7ff67a3d7b34 1740->1746 1747 7ff67a3d7b39 call 7ff67a415240 1740->1747 1741->1734 1742->1736 1766 7ff67a3d7c45-7ff67a3d7d4c call 7ff67a417bf0 call 7ff67a391d20 1743->1766 1767 7ff67a3d7c15-7ff67a3d7c3e call 7ff67a3e2ef0 call 7ff67a3ee0a0 call 7ff67a3a1740 ExitProcess 1743->1767 1751 7ff67a3d7b36 1746->1751 1752 7ff67a3d7ba8-7ff67a3d7bad call 7ff67a3f8d28 1746->1752 1747->1739 1754 7ff67a3d7b7f call 7ff67a415240 1749->1754 1755 7ff67a3d7b67-7ff67a3d7b7a 1749->1755 1751->1747 1756 7ff67a3d7bae-7ff67a3d7bb3 call 7ff67a3f8d28 1752->1756 1754->1748 1755->1756 1757 7ff67a3d7b7c 1755->1757 1756->1697 1757->1754 1777 7ff67a3d7d50-7ff67a3d7d58 1766->1777 1777->1777 1779 7ff67a3d7d5a-7ff67a3d7dda call 7ff67a391d20 call 7ff67a3d4ef0 call 7ff67a3dbe40 call 7ff67a3dafb0 1777->1779 1788 7ff67a3d7e0e-7ff67a3d7ee3 call 7ff67a3dbe40 call 7ff67a3dc030 call 7ff67a3dc0b0 call 7ff67a400120 call 7ff67a400118 call 7ff67a3d55d0 call 7ff67a3a2590 call 7ff67a3dc1c0 1779->1788 1789 7ff67a3d7ddc-7ff67a3d7dee 1779->1789 1819 7ff67a3d7fce-7ff67a3d805e call 7ff67a3eb750 call 7ff67a3c4e60 1788->1819 1820 7ff67a3d7ee9-7ff67a3d7f32 call 7ff67a3a1bd0 call 7ff67a3dc2b0 call 7ff67a3a18c0 1788->1820 1790 7ff67a3d7df0-7ff67a3d7e03 1789->1790 1791 7ff67a3d7e09 call 7ff67a415240 1789->1791 1790->1791 1793 7ff67a3d8257-7ff67a3d825c call 7ff67a3f8d28 1790->1793 1791->1788 1800 7ff67a3d825d-7ff67a3d8262 call 7ff67a3f8d28 1793->1800 1806 7ff67a3d8263-7ff67a3d8268 call 7ff67a3f8d28 1800->1806 1830 7ff67a3d8095-7ff67a3d80d8 OpenMutexA 1819->1830 1831 7ff67a3d8060-7ff67a3d8075 1819->1831 1837 7ff67a3d7fc5-7ff67a3d7fc7 ExitProcess 1820->1837 1838 7ff67a3d7f38-7ff67a3d7f60 call 7ff67a3cf820 call 7ff67a3a1320 1820->1838 1835 7ff67a3d80da-7ff67a3d80df ExitProcess 1830->1835 1836 7ff67a3d80e6-7ff67a3d8126 CreateMutexExA call 7ff67a3d0970 call 7ff67a3e3030 1830->1836 1833 7ff67a3d8090 call 7ff67a415240 1831->1833 1834 7ff67a3d8077-7ff67a3d808a 1831->1834 1833->1830 1834->1800 1834->1833 1847 7ff67a3d8134-7ff67a3d81a3 call 7ff67a3eba60 call 7ff67a39d510 call 7ff67a39e5a0 call 7ff67a39ec50 call 7ff67a39fa60 call 7ff67a39c9c0 call 7ff67a3c14c0 call 7ff67a3c41a0 call 7ff67a392c20 call 7ff67a39ae00 call 7ff67a399820 call 7ff67a3e0550 call 7ff67a39bee0 call 7ff67a397810 call 7ff67a394ad0 call 7ff67a397b00 call 7ff67a3e8210 call 7ff67a3d2b90 1836->1847 1848 7ff67a3d8128-7ff67a3d812d ExitProcess 1836->1848 1851 7ff67a3d7f62-7ff67a3d7fb7 call 7ff67a3a52c0 call 7ff67a3a1300 call 7ff67a3d1e50 call 7ff67a3a52a0 call 7ff67a3a1290 call 7ff67a3a1990 1838->1851 1852 7ff67a3d7fb8-7ff67a3d7fc0 call 7ff67a392b10 1838->1852 1903 7ff67a3d81a5-7ff67a3d81b1 ReleaseMutex CloseHandle 1847->1903 1904 7ff67a3d81b7-7ff67a3d81be 1847->1904 1851->1852 1852->1837 1903->1904 1905 7ff67a3d81c0-7ff67a3d81c5 call 7ff67a3d8270 1904->1905 1906 7ff67a3d81c6-7ff67a3d81d2 1904->1906 1905->1906 1908 7ff67a3d8205-7ff67a3d8226 call 7ff67a3d77f0 1906->1908 1909 7ff67a3d81d4-7ff67a3d81e9 1906->1909 1915 7ff67a3d822b-7ff67a3d8256 call 7ff67a415220 1908->1915 1912 7ff67a3d8200 call 7ff67a415240 1909->1912 1913 7ff67a3d81eb-7ff67a3d81fe 1909->1913 1912->1908 1913->1806 1913->1912
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: --key$--type$1.0$APPB:
                              • API String ID: 0-155154914
                              • Opcode ID: 13408a047c6b275042c4ef95a805510cb8bfec5d6b8dc364fa889c8a855f5948
                              • Instruction ID: f6399694de1eaa823d838f84be0793349eb1399cc9be3447b84192ab58a8ebf1
                              • Opcode Fuzzy Hash: 13408a047c6b275042c4ef95a805510cb8bfec5d6b8dc364fa889c8a855f5948
                              • Instruction Fuzzy Hash: 1C42B033A28BC682EA149F25E4453FEA361FB85794F504175E68DC7AAADF7CE490C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1918 7ff67a39d510-7ff67a39d600 LoadLibraryA 1919 7ff67a39e4b7-7ff67a39e4c1 1918->1919 1920 7ff67a39d606-7ff67a39d9bf GetProcAddress * 6 1918->1920 1921 7ff67a39e4d0-7ff67a39e4d3 1919->1921 1922 7ff67a39e4c3-7ff67a39e4c5 1919->1922 1920->1919 1923 7ff67a39d9c5-7ff67a39d9c8 1920->1923 1924 7ff67a39e4de-7ff67a39e50d call 7ff67a415220 1921->1924 1925 7ff67a39e4d5-7ff67a39e4d8 FreeLibrary 1921->1925 1922->1921 1923->1919 1926 7ff67a39d9ce-7ff67a39d9d1 1923->1926 1925->1924 1926->1919 1929 7ff67a39d9d7-7ff67a39d9da 1926->1929 1929->1919 1931 7ff67a39d9e0-7ff67a39d9e3 1929->1931 1931->1919 1932 7ff67a39d9e9-7ff67a39d9ec 1931->1932 1932->1919 1933 7ff67a39d9f2-7ff67a39da00 1932->1933 1934 7ff67a39da04-7ff67a39da06 1933->1934 1934->1919 1935 7ff67a39da0c-7ff67a39da18 1934->1935 1935->1919 1936 7ff67a39da1e 1935->1936 1937 7ff67a39da23-7ff67a39da3e 1936->1937 1939 7ff67a39e49e-7ff67a39e4aa 1937->1939 1940 7ff67a39da44-7ff67a39da62 1937->1940 1939->1937 1941 7ff67a39e4b0 1939->1941 1940->1939 1943 7ff67a39da68-7ff67a39da7a 1940->1943 1941->1919 1944 7ff67a39da80 1943->1944 1945 7ff67a39e485-7ff67a39e497 1943->1945 1946 7ff67a39da84-7ff67a39dad5 call 7ff67a4154e0 1944->1946 1945->1939 1950 7ff67a39dd54 1946->1950 1951 7ff67a39dadb-7ff67a39dae2 1946->1951 1954 7ff67a39dd56-7ff67a39dd5d 1950->1954 1951->1950 1953 7ff67a39dae8-7ff67a39dbdb call 7ff67a3d1a40 call 7ff67a3a40b0 call 7ff67a3a4380 1951->1953 1979 7ff67a39dbe2-7ff67a39dbea 1953->1979 1956 7ff67a39dd63-7ff67a39dd6a 1954->1956 1957 7ff67a39dfd4-7ff67a39e010 1954->1957 1956->1957 1959 7ff67a39dd70-7ff67a39de5e call 7ff67a3d1a40 call 7ff67a3a40b0 call 7ff67a3a4380 1956->1959 1965 7ff67a39e2a7-7ff67a39e2a9 1957->1965 1966 7ff67a39e016-7ff67a39e024 1957->1966 1991 7ff67a39de65-7ff67a39de6d 1959->1991 1971 7ff67a39e2af-7ff67a39e3d4 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 call 7ff67a4154e0 call 7ff67a3ba460 1965->1971 1972 7ff67a39e457-7ff67a39e46d call 7ff67a3a0120 1965->1972 1969 7ff67a39e2a0-7ff67a39e2a3 1966->1969 1970 7ff67a39e02a-7ff67a39e031 1966->1970 1969->1965 1975 7ff67a39e2a5 1969->1975 1970->1969 1977 7ff67a39e037-7ff67a39e12c call 7ff67a3d1a40 call 7ff67a3a40b0 call 7ff67a3a4380 1970->1977 2064 7ff67a39e3e0-7ff67a39e3f9 call 7ff67a3a2620 1971->2064 2065 7ff67a39e3d6-7ff67a39e3d8 1971->2065 1986 7ff67a39e473-7ff67a39e47e 1972->1986 1987 7ff67a39da82 1972->1987 1975->1965 2006 7ff67a39e130-7ff67a39e137 1977->2006 1979->1979 1984 7ff67a39dbec-7ff67a39dc46 call 7ff67a391d20 call 7ff67a3a55e0 call 7ff67a3a2e00 1979->1984 2014 7ff67a39dc79-7ff67a39dca3 1984->2014 2015 7ff67a39dc48-7ff67a39dc59 1984->2015 1986->1945 1987->1946 1991->1991 1996 7ff67a39de6f-7ff67a39dec8 call 7ff67a391d20 call 7ff67a3a55e0 call 7ff67a3a2e00 1991->1996 2028 7ff67a39defb-7ff67a39df25 1996->2028 2029 7ff67a39deca-7ff67a39dedb 1996->2029 2006->2006 2011 7ff67a39e139-7ff67a39e192 call 7ff67a391d20 call 7ff67a3a55e0 call 7ff67a3a2e00 2006->2011 2076 7ff67a39e1c5-7ff67a39e1ee 2011->2076 2077 7ff67a39e194-7ff67a39e1a5 2011->2077 2023 7ff67a39dca5-7ff67a39dcb9 2014->2023 2024 7ff67a39dcdb-7ff67a39dd01 2014->2024 2019 7ff67a39dc74 call 7ff67a415240 2015->2019 2020 7ff67a39dc5b-7ff67a39dc6e 2015->2020 2019->2014 2020->2019 2026 7ff67a39e56c-7ff67a39e571 call 7ff67a3f8d28 2020->2026 2031 7ff67a39dcd4-7ff67a39dcd9 call 7ff67a415240 2023->2031 2032 7ff67a39dcbb-7ff67a39dcce 2023->2032 2034 7ff67a39dd03-7ff67a39dd17 2024->2034 2035 7ff67a39dd39-7ff67a39dd52 2024->2035 2039 7ff67a39e572-7ff67a39e577 call 7ff67a3f8d28 2026->2039 2040 7ff67a39df27-7ff67a39df3b 2028->2040 2041 7ff67a39df5d-7ff67a39df83 2028->2041 2036 7ff67a39def6 call 7ff67a415240 2029->2036 2037 7ff67a39dedd-7ff67a39def0 2029->2037 2031->2024 2032->2031 2032->2039 2045 7ff67a39dd32-7ff67a39dd37 call 7ff67a415240 2034->2045 2046 7ff67a39dd19-7ff67a39dd2c 2034->2046 2035->1954 2036->2028 2037->2036 2047 7ff67a39e57e-7ff67a39e583 call 7ff67a3f8d28 2037->2047 2055 7ff67a39e578-7ff67a39e57d call 7ff67a3f8d28 2039->2055 2050 7ff67a39df56-7ff67a39df5b call 7ff67a415240 2040->2050 2051 7ff67a39df3d-7ff67a39df50 2040->2051 2057 7ff67a39df85-7ff67a39df99 2041->2057 2058 7ff67a39dfbb-7ff67a39dfcd 2041->2058 2045->2035 2046->2045 2046->2055 2063 7ff67a39e584-7ff67a39e589 call 7ff67a3f8d28 2047->2063 2050->2041 2051->2050 2051->2063 2055->2047 2067 7ff67a39dfb4-7ff67a39dfb9 call 7ff67a415240 2057->2067 2068 7ff67a39df9b-7ff67a39dfae 2057->2068 2058->1957 2071 7ff67a39e58a-7ff67a39e58f call 7ff67a3f8d28 2063->2071 2086 7ff67a39e3fd-7ff67a39e409 2064->2086 2078 7ff67a39e3de 2065->2078 2079 7ff67a39e514-7ff67a39e565 call 7ff67a3a27e0 call 7ff67a3a6310 call 7ff67a3a63e0 call 7ff67a418404 2065->2079 2067->2058 2068->2067 2068->2071 2097 7ff67a39e590-7ff67a39e595 call 7ff67a3f8d28 2071->2097 2087 7ff67a39e1f0-7ff67a39e204 2076->2087 2088 7ff67a39e224-7ff67a39e24a 2076->2088 2083 7ff67a39e1c0 call 7ff67a415240 2077->2083 2084 7ff67a39e1a7-7ff67a39e1ba 2077->2084 2078->2086 2112 7ff67a39e566-7ff67a39e56b call 7ff67a3f8d28 2079->2112 2083->2076 2084->2083 2084->2097 2092 7ff67a39e430-7ff67a39e43a call 7ff67a3ab840 2086->2092 2093 7ff67a39e40b-7ff67a39e42e 2086->2093 2100 7ff67a39e21f call 7ff67a415240 2087->2100 2101 7ff67a39e206-7ff67a39e219 2087->2101 2095 7ff67a39e280-7ff67a39e299 2088->2095 2096 7ff67a39e24c-7ff67a39e260 2088->2096 2105 7ff67a39e43f-7ff67a39e450 call 7ff67a3a2e00 2092->2105 2093->2105 2095->1969 2108 7ff67a39e262-7ff67a39e275 2096->2108 2109 7ff67a39e27b call 7ff67a415240 2096->2109 2100->2088 2101->2100 2103 7ff67a39e50e-7ff67a39e513 call 7ff67a3f8d28 2101->2103 2103->2079 2105->1972 2108->2109 2108->2112 2109->2095 2112->2026
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$AddressProc$Library$FreeLoad
                              • String ID: cannot use push_back() with $system$vault
                              • API String ID: 2463004387-1741236777
                              • Opcode ID: ecc748daa493dcc3c806ea0f37252f1353c6a8a5aaa5669cb2c215fc71812c66
                              • Instruction ID: 8bb5884a3d25eb915b63582e334ee12c20984a6e083d9cb59972ea746754590f
                              • Opcode Fuzzy Hash: ecc748daa493dcc3c806ea0f37252f1353c6a8a5aaa5669cb2c215fc71812c66
                              • Instruction Fuzzy Hash: 69925C33619BC58ADB608F29E8403ED73A5F749798F104225EB9C97BA9EF39C654C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2125 7ff67a3c1a80-7ff67a3c2394 call 7ff67a3903b0 * 2 2133 7ff67a3c27a8-7ff67a3c27d2 call 7ff67a415220 2125->2133 2134 7ff67a3c239a-7ff67a3c275f call 7ff67a38f020 call 7ff67a38eeb0 call 7ff67a3c4a50 call 7ff67a3e2b90 call 7ff67a392bb0 2125->2134 2150 7ff67a3c2791-7ff67a3c27a1 2134->2150 2151 7ff67a3c2761-7ff67a3c2775 2134->2151 2150->2133 2152 7ff67a3c2777-7ff67a3c278a 2151->2152 2153 7ff67a3c278c call 7ff67a415240 2151->2153 2152->2153 2155 7ff67a3c27d3-7ff67a3c2dad call 7ff67a3f8d28 call 7ff67a3a27e0 call 7ff67a3a6310 call 7ff67a3a63e0 call 7ff67a418404 call 7ff67a38fb70 * 3 call 7ff67a3f8d28 * 4 call 7ff67a38fb70 call 7ff67a3f8d28 * 2 call 7ff67a38ea20 call 7ff67a3f8d28 call 7ff67a38fb70 call 7ff67a3f8d28 * 2 call 7ff67a38ea20 call 7ff67a38f020 call 7ff67a38eeb0 2152->2155 2153->2150 2204 7ff67a3c2db0-7ff67a3c2db7 2155->2204 2204->2204 2205 7ff67a3c2db9-7ff67a3c2f79 call 7ff67a3ade60 call 7ff67a38f320 call 7ff67a38f3f0 2204->2205 2212 7ff67a3c2f80-7ff67a3c2f88 2205->2212 2212->2212 2213 7ff67a3c2f8a-7ff67a3c304b call 7ff67a391d20 call 7ff67a3ade60 call 7ff67a396c10 call 7ff67a38ec60 call 7ff67a3e1f20 2212->2213 2223 7ff67a3c3050-7ff67a3c3329 call 7ff67a38f3f0 * 2 call 7ff67a3a1d90 2213->2223 2230 7ff67a3c3330-7ff67a3c3337 2223->2230 2230->2230 2231 7ff67a3c3339-7ff67a3c3362 call 7ff67a3a6070 2230->2231 2234 7ff67a3c3d49-7ff67a3c3d54 2231->2234 2235 7ff67a3c3368-7ff67a3c3377 call 7ff67a390310 2231->2235 2237 7ff67a3c3d8e-7ff67a3c3db1 2234->2237 2238 7ff67a3c3d56-7ff67a3c3d60 2234->2238 2235->2234 2244 7ff67a3c337d-7ff67a3c3432 2235->2244 2239 7ff67a3c3dd0-7ff67a3c3e53 call 7ff67a392bb0 call 7ff67a3a1990 call 7ff67a38f3f0 call 7ff67a3a1990 call 7ff67a415220 2237->2239 2240 7ff67a3c3db3-7ff67a3c3dbc 2237->2240 2238->2237 2242 7ff67a3c3d62-7ff67a3c3d6a 2238->2242 2240->2239 2250 7ff67a3c3dbe-7ff67a3c3dcf 2240->2250 2245 7ff67a3c3d70-7ff67a3c3d73 2242->2245 2244->2234 2248 7ff67a3c3e66-7ff67a3c3ee6 call 7ff67a38ea20 call 7ff67a38fbe0 call 7ff67a38fb70 call 7ff67a3f8d28 call 7ff67a3c1850 2244->2248 2245->2237 2249 7ff67a3c3d75-7ff67a3c3d8c 2245->2249 2249->2245 2250->2239
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: cannot use push_back() with $directory_iterator::directory_iterator$exists$prefs.js$status
                              • API String ID: 0-2713369562
                              • Opcode ID: 63296be00657a7804b8933edc681fa0ff7d2a303a79522c06b7190de4e54fe63
                              • Instruction ID: 7e678bed4693d178ab878482b69c028a234b7228c5e31e28db7fa43c074be963
                              • Opcode Fuzzy Hash: 63296be00657a7804b8933edc681fa0ff7d2a303a79522c06b7190de4e54fe63
                              • Instruction Fuzzy Hash: A1525933A29BC585E6719F15E8813EAB3A4FB89794F005225DACC93B69EF7CD144CB40

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2272 7ff67a41c138-7ff67a41c178 2273 7ff67a41c17a-7ff67a41c181 2272->2273 2274 7ff67a41c18d-7ff67a41c196 2272->2274 2273->2274 2275 7ff67a41c183-7ff67a41c188 2273->2275 2276 7ff67a41c198-7ff67a41c19b 2274->2276 2277 7ff67a41c1b2-7ff67a41c1b4 2274->2277 2280 7ff67a41c40c-7ff67a41c432 call 7ff67a415220 2275->2280 2276->2277 2281 7ff67a41c19d-7ff67a41c1a5 2276->2281 2278 7ff67a41c40a 2277->2278 2279 7ff67a41c1ba-7ff67a41c1be 2277->2279 2278->2280 2282 7ff67a41c295-7ff67a41c2bc call 7ff67a41c50c 2279->2282 2283 7ff67a41c1c4-7ff67a41c1c7 2279->2283 2285 7ff67a41c1a7-7ff67a41c1a9 2281->2285 2286 7ff67a41c1ab-7ff67a41c1ae 2281->2286 2295 7ff67a41c2de-7ff67a41c2e7 2282->2295 2296 7ff67a41c2be-7ff67a41c2c7 2282->2296 2288 7ff67a41c1c9-7ff67a41c1d1 2283->2288 2289 7ff67a41c1db-7ff67a41c1ed GetFileAttributesExW 2283->2289 2285->2277 2285->2286 2286->2277 2288->2289 2292 7ff67a41c1d3-7ff67a41c1d5 2288->2292 2293 7ff67a41c1ef-7ff67a41c1f8 GetLastError 2289->2293 2294 7ff67a41c240-7ff67a41c24f 2289->2294 2292->2282 2292->2289 2293->2280 2297 7ff67a41c1fe-7ff67a41c210 FindFirstFileW 2293->2297 2298 7ff67a41c253-7ff67a41c255 2294->2298 2301 7ff67a41c39b-7ff67a41c3a4 2295->2301 2302 7ff67a41c2ed-7ff67a41c305 GetFileInformationByHandleEx 2295->2302 2299 7ff67a41c2d7-7ff67a41c2d9 2296->2299 2300 7ff67a41c2c9-7ff67a41c2d1 CloseHandle 2296->2300 2303 7ff67a41c21d-7ff67a41c23e FindClose 2297->2303 2304 7ff67a41c212-7ff67a41c218 GetLastError 2297->2304 2305 7ff67a41c257-7ff67a41c25f 2298->2305 2306 7ff67a41c261-7ff67a41c28f 2298->2306 2299->2280 2300->2299 2307 7ff67a41c44d-7ff67a41c452 call 7ff67a40876c 2300->2307 2308 7ff67a41c3a6-7ff67a41c3ba GetFileInformationByHandleEx 2301->2308 2309 7ff67a41c3f3-7ff67a41c3f5 2301->2309 2310 7ff67a41c307-7ff67a41c313 GetLastError 2302->2310 2311 7ff67a41c32d-7ff67a41c346 2302->2311 2303->2298 2304->2280 2305->2282 2305->2306 2306->2278 2306->2282 2329 7ff67a41c453-7ff67a41c458 call 7ff67a40876c 2307->2329 2313 7ff67a41c3bc-7ff67a41c3c8 GetLastError 2308->2313 2314 7ff67a41c3e0-7ff67a41c3f0 2308->2314 2317 7ff67a41c3f7-7ff67a41c3fb 2309->2317 2318 7ff67a41c433-7ff67a41c437 2309->2318 2315 7ff67a41c326-7ff67a41c328 2310->2315 2316 7ff67a41c315-7ff67a41c320 CloseHandle 2310->2316 2311->2301 2319 7ff67a41c348-7ff67a41c34c 2311->2319 2313->2315 2323 7ff67a41c3ce-7ff67a41c3d9 CloseHandle 2313->2323 2314->2309 2315->2280 2316->2315 2324 7ff67a41c45f-7ff67a41c467 call 7ff67a40876c 2316->2324 2317->2278 2325 7ff67a41c3fd-7ff67a41c408 CloseHandle 2317->2325 2320 7ff67a41c446-7ff67a41c44b 2318->2320 2321 7ff67a41c439-7ff67a41c444 CloseHandle 2318->2321 2326 7ff67a41c34e-7ff67a41c368 GetFileInformationByHandleEx 2319->2326 2327 7ff67a41c394 2319->2327 2320->2280 2321->2307 2321->2320 2330 7ff67a41c459-7ff67a41c45e call 7ff67a40876c 2323->2330 2331 7ff67a41c3db 2323->2331 2325->2278 2325->2307 2333 7ff67a41c38b-7ff67a41c392 2326->2333 2334 7ff67a41c36a-7ff67a41c376 GetLastError 2326->2334 2328 7ff67a41c398 2327->2328 2328->2301 2329->2330 2330->2324 2331->2315 2333->2328 2334->2315 2338 7ff67a41c378-7ff67a41c383 CloseHandle 2334->2338 2338->2329 2341 7ff67a41c389 2338->2341 2341->2315
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Close$ErrorFileFindHandleLast$AttributesFirst__std_fs_open_handle
                              • String ID:
                              • API String ID: 2398595512-0
                              • Opcode ID: d61a8205c22dd417f485a3e9fb419a33c3a905dc4861a856e94f2a43c5fae776
                              • Instruction ID: 8e37041c95bf1605d9029b106eab7dd3fb500f04b7e19c4201b675b74e3e35f6
                              • Opcode Fuzzy Hash: d61a8205c22dd417f485a3e9fb419a33c3a905dc4861a856e94f2a43c5fae776
                              • Instruction Fuzzy Hash: DC917133B6CA0246E6744B26EC0467A6390AF957B4F144370D9BD876F8DE3EE4518700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2395 7ff67a39c9c0-7ff67a39ca2a CredEnumerateA 2396 7ff67a39ca30-7ff67a39ca39 2395->2396 2397 7ff67a39d43a-7ff67a39d469 call 7ff67a415220 2395->2397 2398 7ff67a39ca3f-7ff67a39ca57 2396->2398 2399 7ff67a39d42d-7ff67a39d434 CredFree 2396->2399 2401 7ff67a39ca60-7ff67a39cab2 call 7ff67a4154e0 2398->2401 2399->2397 2405 7ff67a39ccee-7ff67a39ccf5 2401->2405 2406 7ff67a39cab8-7ff67a39cadc 2401->2406 2407 7ff67a39cf4f-7ff67a39cf56 2405->2407 2408 7ff67a39ccfb-7ff67a39cd1b 2405->2408 2409 7ff67a39cae0-7ff67a39cae8 2406->2409 2410 7ff67a39d19c-7ff67a39d19f 2407->2410 2411 7ff67a39cf5c-7ff67a39d03e call 7ff67a391d20 call 7ff67a3a40b0 call 7ff67a3a4380 2407->2411 2412 7ff67a39cd22-7ff67a39cd2a 2408->2412 2409->2409 2413 7ff67a39caea-7ff67a39cb9d call 7ff67a391d20 call 7ff67a3a40b0 call 7ff67a3a4380 2409->2413 2414 7ff67a39d411-7ff67a39d427 call 7ff67a3a0120 2410->2414 2415 7ff67a39d1a5-7ff67a39d229 2410->2415 2442 7ff67a39d045-7ff67a39d04d 2411->2442 2412->2412 2417 7ff67a39cd2c-7ff67a39cdea call 7ff67a391d20 call 7ff67a3a40b0 call 7ff67a3a4380 2412->2417 2444 7ff67a39cba4-7ff67a39cbac 2413->2444 2414->2399 2414->2401 2420 7ff67a39d230-7ff67a39d238 2415->2420 2447 7ff67a39cdf1-7ff67a39cdf9 2417->2447 2420->2420 2425 7ff67a39d23a-7ff67a39d2ec call 7ff67a391d20 call 7ff67a3a0ac0 2420->2425 2445 7ff67a39d2f0-7ff67a39d2f8 2425->2445 2442->2442 2446 7ff67a39d04f-7ff67a39d0a8 call 7ff67a391d20 call 7ff67a3a55e0 call 7ff67a3a2e00 2442->2446 2444->2444 2448 7ff67a39cbae-7ff67a39cc07 call 7ff67a391d20 call 7ff67a3a55e0 call 7ff67a3a2e00 2444->2448 2445->2445 2452 7ff67a39d2fa-7ff67a39d398 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 call 7ff67a4154e0 call 7ff67a3ba460 2445->2452 2474 7ff67a39d0db-7ff67a39d0fb 2446->2474 2475 7ff67a39d0aa-7ff67a39d0bb 2446->2475 2447->2447 2450 7ff67a39cdfb-7ff67a39ce54 call 7ff67a391d20 call 7ff67a3a55e0 call 7ff67a3a2e00 2447->2450 2477 7ff67a39cc09-7ff67a39cc1a 2448->2477 2478 7ff67a39cc3a-7ff67a39cc5d 2448->2478 2482 7ff67a39ce87-7ff67a39cead 2450->2482 2483 7ff67a39ce56-7ff67a39ce67 2450->2483 2546 7ff67a39d3a4-7ff67a39d3b7 call 7ff67a3a2620 2452->2546 2547 7ff67a39d39a-7ff67a39d39c 2452->2547 2486 7ff67a39d131-7ff67a39d153 2474->2486 2487 7ff67a39d0fd-7ff67a39d111 2474->2487 2480 7ff67a39d0d6 call 7ff67a415240 2475->2480 2481 7ff67a39d0bd-7ff67a39d0d0 2475->2481 2484 7ff67a39cc35 call 7ff67a415240 2477->2484 2485 7ff67a39cc1c-7ff67a39cc2f 2477->2485 2488 7ff67a39cc5f-7ff67a39cc70 2478->2488 2489 7ff67a39cc90-7ff67a39cca8 2478->2489 2480->2474 2481->2480 2495 7ff67a39d4e6-7ff67a3a57bd call 7ff67a3f8d28 2481->2495 2501 7ff67a39ceaf-7ff67a39cec3 2482->2501 2502 7ff67a39cee3-7ff67a39cf05 2482->2502 2496 7ff67a39ce82 call 7ff67a415240 2483->2496 2497 7ff67a39ce69-7ff67a39ce7c 2483->2497 2484->2478 2485->2484 2498 7ff67a39d4c2-7ff67a39d4c7 call 7ff67a3f8d28 2485->2498 2490 7ff67a39d155-7ff67a39d167 2486->2490 2491 7ff67a39d187-7ff67a39d19a 2486->2491 2503 7ff67a39d113-7ff67a39d126 2487->2503 2504 7ff67a39d12c call 7ff67a415240 2487->2504 2505 7ff67a39cc72-7ff67a39cc85 2488->2505 2506 7ff67a39cc8b call 7ff67a415240 2488->2506 2492 7ff67a39ccdb-7ff67a39cceb 2489->2492 2493 7ff67a39ccaa-7ff67a39ccbb 2489->2493 2507 7ff67a39d182 call 7ff67a415240 2490->2507 2508 7ff67a39d169-7ff67a39d17c 2490->2508 2491->2415 2492->2405 2509 7ff67a39ccd6 call 7ff67a415240 2493->2509 2510 7ff67a39ccbd-7ff67a39ccd0 2493->2510 2553 7ff67a3a57bf 2495->2553 2554 7ff67a3a57f1-7ff67a3a5804 2495->2554 2496->2482 2497->2496 2515 7ff67a39d4d4-7ff67a39d4d9 call 7ff67a3f8d28 2497->2515 2521 7ff67a39d4c8-7ff67a39d4cd call 7ff67a3f8d28 2498->2521 2518 7ff67a39cede call 7ff67a415240 2501->2518 2519 7ff67a39cec5-7ff67a39ced8 2501->2519 2511 7ff67a39cf07-7ff67a39cf19 2502->2511 2512 7ff67a39cf39-7ff67a39cf4c 2502->2512 2503->2504 2520 7ff67a39d46a-7ff67a39d46f call 7ff67a3f8d28 2503->2520 2504->2486 2505->2506 2505->2521 2506->2489 2507->2491 2508->2507 2525 7ff67a39d4bc-7ff67a39d4c1 call 7ff67a3f8d28 2508->2525 2509->2492 2510->2509 2526 7ff67a39d4ce-7ff67a39d4d3 call 7ff67a3f8d28 2510->2526 2527 7ff67a39cf34 call 7ff67a415240 2511->2527 2528 7ff67a39cf1b-7ff67a39cf2e 2511->2528 2512->2407 2536 7ff67a39d4da-7ff67a39d4df call 7ff67a3f8d28 2515->2536 2518->2502 2519->2518 2519->2536 2552 7ff67a39d470-7ff67a39d4bb call 7ff67a3a27e0 call 7ff67a3a6310 call 7ff67a3a63e0 call 7ff67a418404 2520->2552 2521->2526 2525->2498 2526->2515 2527->2512 2528->2527 2540 7ff67a39d4e0-7ff67a39d4e5 call 7ff67a3f8d28 2528->2540 2536->2540 2540->2495 2561 7ff67a39d3bb-7ff67a39d3c7 2546->2561 2547->2552 2555 7ff67a39d3a2 2547->2555 2552->2525 2560 7ff67a3a57c0-7ff67a3a57ef call 7ff67a3a7af0 call 7ff67a3b1b50 call 7ff67a415240 2553->2560 2555->2561 2560->2554 2565 7ff67a39d3c9-7ff67a39d3e8 2561->2565 2566 7ff67a39d3ea-7ff67a39d3f4 call 7ff67a3ab840 2561->2566 2567 7ff67a39d3f9-7ff67a39d407 call 7ff67a3a2e00 2565->2567 2566->2567 2567->2414
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Cred$EnumerateFree
                              • String ID: cannot use push_back() with
                              • API String ID: 1347986415-4122110429
                              • Opcode ID: 0bdad057a42082f9df9179fef09da53be48914cb1a96420893d2d1df81939936
                              • Instruction ID: f79fb864959b2b6e78ca9514d3d824bf49224dc10eab2aec7aa59704688bf184
                              • Opcode Fuzzy Hash: 0bdad057a42082f9df9179fef09da53be48914cb1a96420893d2d1df81939936
                              • Instruction Fuzzy Hash: D6628F33A18BC589EB208F65E8843ED7761F7457A8F504325EAAD97BA9DF78D180C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2583 7ff67a3f2150-7ff67a3f2191 2584 7ff67a3f246d-7ff67a3f24a7 call 7ff67a3f57d0 call 7ff67a3f27f0 2583->2584 2585 7ff67a3f2197-7ff67a3f21c1 call 7ff67a417bf0 2583->2585 2594 7ff67a3f24ac-7ff67a3f24b2 2584->2594 2590 7ff67a3f21c3-7ff67a3f21cc 2585->2590 2591 7ff67a3f21d0-7ff67a3f2209 call 7ff67a3c5c60 call 7ff67a3f4930 call 7ff67a3f27f0 2585->2591 2590->2591 2624 7ff67a3f23b0-7ff67a3f23b7 2591->2624 2625 7ff67a3f220f-7ff67a3f2294 call 7ff67a391d20 call 7ff67a3c5dc0 call 7ff67a3c9600 call 7ff67a3c6340 2591->2625 2597 7ff67a3f264f-7ff67a3f2653 2594->2597 2598 7ff67a3f24b8-7ff67a3f2533 call 7ff67a391d20 call 7ff67a3c5dc0 call 7ff67a3c9600 call 7ff67a3c6340 2594->2598 2600 7ff67a3f271c-7ff67a3f2723 2597->2600 2601 7ff67a3f2659-7ff67a3f26b6 call 7ff67a3a2620 call 7ff67a3a2e00 2597->2601 2649 7ff67a3f278e-7ff67a3f27aa call 7ff67a3c4a10 call 7ff67a418404 2598->2649 2650 7ff67a3f2539-7ff67a3f2541 2598->2650 2603 7ff67a3f26f5-7ff67a3f271b call 7ff67a415220 2600->2603 2604 7ff67a3f2725-7ff67a3f273a 2600->2604 2601->2603 2627 7ff67a3f26b8-7ff67a3f26cd 2601->2627 2610 7ff67a3f26e4-7ff67a3f26f0 call 7ff67a415240 2604->2610 2611 7ff67a3f273c-7ff67a3f274f 2604->2611 2610->2603 2617 7ff67a3f2751 2611->2617 2618 7ff67a3f2759-7ff67a3f275e call 7ff67a3f8d28 2611->2618 2617->2610 2634 7ff67a3f275f-7ff67a3f277b call 7ff67a3c4a10 call 7ff67a418404 2618->2634 2630 7ff67a3f2401-7ff67a3f2404 2624->2630 2631 7ff67a3f23b9-7ff67a3f23ff call 7ff67a3a2620 2624->2631 2625->2634 2677 7ff67a3f229a-7ff67a3f22a2 2625->2677 2627->2610 2633 7ff67a3f26cf-7ff67a3f26e2 2627->2633 2637 7ff67a3f245c-7ff67a3f2468 call 7ff67a3c5a80 2630->2637 2638 7ff67a3f2406-7ff67a3f2447 call 7ff67a3a2620 2630->2638 2652 7ff67a3f244c-7ff67a3f245b call 7ff67a3a2e00 2631->2652 2633->2610 2633->2618 2668 7ff67a3f277c-7ff67a3f2781 call 7ff67a3f8d28 2634->2668 2637->2603 2638->2652 2669 7ff67a3f27ab-7ff67a3f27b0 call 7ff67a3f8d28 2649->2669 2657 7ff67a3f2574-7ff67a3f25b9 call 7ff67a4171f4 * 2 2650->2657 2658 7ff67a3f2543-7ff67a3f2554 2650->2658 2652->2637 2681 7ff67a3f25ed-7ff67a3f2608 2657->2681 2682 7ff67a3f25bb-7ff67a3f25cd 2657->2682 2663 7ff67a3f256f call 7ff67a415240 2658->2663 2664 7ff67a3f2556-7ff67a3f2569 2658->2664 2663->2657 2664->2663 2664->2669 2686 7ff67a3f2782-7ff67a3f2787 call 7ff67a3f8d28 2668->2686 2685 7ff67a3f27b1-7ff67a3f27d6 call 7ff67a3f8d28 2669->2685 2683 7ff67a3f22a4-7ff67a3f22b6 2677->2683 2684 7ff67a3f22d6-7ff67a3f231c call 7ff67a4171f4 * 2 2677->2684 2689 7ff67a3f263c-7ff67a3f264a 2681->2689 2690 7ff67a3f260a-7ff67a3f261c 2681->2690 2687 7ff67a3f25cf-7ff67a3f25e2 2682->2687 2688 7ff67a3f25e8 call 7ff67a415240 2682->2688 2691 7ff67a3f22d1 call 7ff67a415240 2683->2691 2692 7ff67a3f22b8-7ff67a3f22cb 2683->2692 2713 7ff67a3f231e-7ff67a3f232f 2684->2713 2714 7ff67a3f234f-7ff67a3f2369 2684->2714 2705 7ff67a3f27e2-7ff67a3f27ea 2685->2705 2706 7ff67a3f27d8-7ff67a3f27dd call 7ff67a415240 2685->2706 2707 7ff67a3f2788-7ff67a3f278d call 7ff67a3f8d28 2686->2707 2687->2685 2687->2688 2688->2681 2689->2597 2697 7ff67a3f261e-7ff67a3f2631 2690->2697 2698 7ff67a3f2637 call 7ff67a415240 2690->2698 2691->2684 2692->2668 2692->2691 2697->2698 2703 7ff67a3f2753-7ff67a3f2758 call 7ff67a3f8d28 2697->2703 2698->2689 2703->2618 2706->2705 2707->2649 2717 7ff67a3f2331-7ff67a3f2344 2713->2717 2718 7ff67a3f234a call 7ff67a415240 2713->2718 2719 7ff67a3f239d-7ff67a3f23ab 2714->2719 2720 7ff67a3f236b-7ff67a3f237d 2714->2720 2717->2686 2717->2718 2718->2714 2719->2624 2722 7ff67a3f237f-7ff67a3f2392 2720->2722 2723 7ff67a3f2398 call 7ff67a415240 2720->2723 2722->2707 2722->2723 2723->2719
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                              • String ID: value
                              • API String ID: 1346393832-494360628
                              • Opcode ID: 6e96f6da4e5160c19df929875cb70b329b44440ba30b932c9d187923499d9032
                              • Instruction ID: 307c52a6a9278bb3c56ddfa21ab32d29105d5897f1563a48f664c543e4be8c8b
                              • Opcode Fuzzy Hash: 6e96f6da4e5160c19df929875cb70b329b44440ba30b932c9d187923499d9032
                              • Instruction Fuzzy Hash: 1012C023A38BC185EB00CFB9D4802BD6761EB957A4F505275FA9D82AEADF7CD084C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2781 7ff67a3e8210-7ff67a3e826d call 7ff67a416060 call 7ff67a3efc70 2786 7ff67a3e8272-7ff67a3e82b9 call 7ff67a3a40b0 call 7ff67a3a3d90 2781->2786 2787 7ff67a3e826f 2781->2787 2792 7ff67a3e82ed-7ff67a3e830c 2786->2792 2793 7ff67a3e82bb-7ff67a3e82cd 2786->2793 2787->2786 2796 7ff67a3e8343-7ff67a3e83d1 call 7ff67a3e4540 call 7ff67a417bf0 2792->2796 2797 7ff67a3e830e-7ff67a3e8323 2792->2797 2794 7ff67a3e82cf-7ff67a3e82e2 2793->2794 2795 7ff67a3e82e8 call 7ff67a415240 2793->2795 2794->2795 2799 7ff67a3e8a0d-7ff67a3e8a12 call 7ff67a3f8d28 2794->2799 2795->2792 2813 7ff67a3e83d6-7ff67a3e83f9 recv 2796->2813 2801 7ff67a3e8325-7ff67a3e8338 2797->2801 2802 7ff67a3e833e call 7ff67a415240 2797->2802 2805 7ff67a3e8a13-7ff67a3e8a18 call 7ff67a3f8d28 2799->2805 2801->2802 2801->2805 2802->2796 2812 7ff67a3e8a19-7ff67a3e8a1e call 7ff67a3f8d28 2805->2812 2825 7ff67a3e8a1f-7ff67a3e8a24 call 7ff67a3f8d28 2812->2825 2815 7ff67a3e84d0-7ff67a3e84fe 2813->2815 2816 7ff67a3e83ff-7ff67a3e8408 2813->2816 2817 7ff67a3e8504-7ff67a3e8512 call 7ff67a3ff800 2815->2817 2818 7ff67a3e881f-7ff67a3e8837 2815->2818 2820 7ff67a3e840a-7ff67a3e8446 call 7ff67a417540 2816->2820 2821 7ff67a3e8448-7ff67a3e8464 call 7ff67a3a7860 2816->2821 2834 7ff67a3e8813-7ff67a3e8819 2817->2834 2835 7ff67a3e8518-7ff67a3e851b 2817->2835 2823 7ff67a3e8a31-7ff67a3e8a36 call 7ff67a38d450 2818->2823 2824 7ff67a3e883d-7ff67a3e88aa call 7ff67a3a8e20 call 7ff67a3e4540 2818->2824 2832 7ff67a3e8469-7ff67a3e8478 2820->2832 2821->2832 2841 7ff67a3e8a37-7ff67a3e8a3c call 7ff67a3f8d28 2823->2841 2851 7ff67a3e88de-7ff67a3e88f1 2824->2851 2852 7ff67a3e88ac-7ff67a3e88be 2824->2852 2844 7ff67a3e8a25-7ff67a3e8a2a call 7ff67a3f8d28 2825->2844 2838 7ff67a3e848f-7ff67a3e84c8 2832->2838 2839 7ff67a3e847a-7ff67a3e848a 2832->2839 2834->2817 2834->2818 2835->2834 2842 7ff67a3e8521-7ff67a3e85ca call 7ff67a3a50b0 call 7ff67a3c4ee0 call 7ff67a3a2620 call 7ff67a3e45d0 call 7ff67a3efc70 2835->2842 2838->2815 2839->2813 2854 7ff67a3e8a3d-7ff67a3e8a42 call 7ff67a3f8d28 2841->2854 2890 7ff67a3e85cf-7ff67a3e865b call 7ff67a3a40b0 call 7ff67a3a2c10 call 7ff67a3e4540 2842->2890 2891 7ff67a3e85cc 2842->2891 2858 7ff67a3e8a2b-7ff67a3e8a30 call 7ff67a3f8d28 2844->2858 2859 7ff67a3e88f3-7ff67a3e8919 recv 2851->2859 2856 7ff67a3e88c0-7ff67a3e88d3 2852->2856 2857 7ff67a3e88d9 call 7ff67a415240 2852->2857 2875 7ff67a3e8a43-7ff67a3e8a48 call 7ff67a3f8d28 2854->2875 2856->2841 2856->2857 2857->2851 2858->2823 2864 7ff67a3e8921-7ff67a3e892c WSACleanup 2859->2864 2865 7ff67a3e891b closesocket 2859->2865 2869 7ff67a3e8960-7ff67a3e8988 2864->2869 2870 7ff67a3e892e-7ff67a3e893c 2864->2870 2865->2864 2873 7ff67a3e89bf-7ff67a3e8a0c call 7ff67a415220 2869->2873 2874 7ff67a3e898a-7ff67a3e899f 2869->2874 2871 7ff67a3e893e-7ff67a3e8952 2870->2871 2872 7ff67a3e8958-7ff67a3e895b call 7ff67a415240 2870->2872 2871->2854 2871->2872 2872->2869 2878 7ff67a3e89a1-7ff67a3e89b4 2874->2878 2879 7ff67a3e89ba call 7ff67a415240 2874->2879 2878->2875 2878->2879 2879->2873 2897 7ff67a3e8660-7ff67a3e8670 2890->2897 2891->2890 2898 7ff67a3e86a4-7ff67a3e86ca 2897->2898 2899 7ff67a3e8672-7ff67a3e8684 2897->2899 2902 7ff67a3e8701-7ff67a3e8726 2898->2902 2903 7ff67a3e86cc-7ff67a3e86e1 2898->2903 2900 7ff67a3e869f call 7ff67a415240 2899->2900 2901 7ff67a3e8686-7ff67a3e8699 2899->2901 2900->2898 2901->2812 2901->2900 2904 7ff67a3e875d-7ff67a3e87ae call 7ff67a3a2e00 * 2 2902->2904 2905 7ff67a3e8728-7ff67a3e873d 2902->2905 2907 7ff67a3e86e3-7ff67a3e86f6 2903->2907 2908 7ff67a3e86fc call 7ff67a415240 2903->2908 2917 7ff67a3e87e5-7ff67a3e880e 2904->2917 2918 7ff67a3e87b0-7ff67a3e87c5 2904->2918 2910 7ff67a3e873f-7ff67a3e8752 2905->2910 2911 7ff67a3e8758 call 7ff67a415240 2905->2911 2907->2825 2907->2908 2908->2902 2910->2844 2910->2911 2911->2904 2917->2859 2919 7ff67a3e87e0 call 7ff67a415240 2918->2919 2920 7ff67a3e87c7-7ff67a3e87da 2918->2920 2919->2917 2920->2858 2920->2919
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$recv$Cleanupclosesocket
                              • String ID:
                              • API String ID: 3402187201-0
                              • Opcode ID: fb716910d757f38adea17ddcce31ddc15b212ab7009bd080f33c70fd79bf3aaf
                              • Instruction ID: 7e36a79c585bb22fe5d1cd1cfae0f9b7ab9dabf9ee5e740adccc182cb4264e87
                              • Opcode Fuzzy Hash: fb716910d757f38adea17ddcce31ddc15b212ab7009bd080f33c70fd79bf3aaf
                              • Instruction Fuzzy Hash: 02127473A2CBC581EA218F15E4443EAA761FB997A0F505671EA9D83AF9DF7CD480C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2922 7ff67a3e8a50-7ff67a3e8aac 2923 7ff67a3e8ab2-7ff67a3e8ac5 call 7ff67a4153d0 2922->2923 2924 7ff67a3e8c70-7ff67a3e8c92 InternetOpenA 2922->2924 2923->2924 2934 7ff67a3e8acb-7ff67a3e8c3b 2923->2934 2925 7ff67a3e8c94-7ff67a3e8cb2 2924->2925 2926 7ff67a3e8cb7-7ff67a3e8cd0 2924->2926 2928 7ff67a3e9041-7ff67a3e906a call 7ff67a415220 2925->2928 2929 7ff67a3e8cd5-7ff67a3e8d02 InternetOpenUrlA 2926->2929 2930 7ff67a3e8cd2 2926->2930 2932 7ff67a3e8d04-7ff67a3e8d25 2929->2932 2933 7ff67a3e8d2a-7ff67a3e8d55 HttpQueryInfoW 2929->2933 2930->2929 2936 7ff67a3e9038 2932->2936 2937 7ff67a3e8d87-7ff67a3e8ddb HttpQueryInfoW 2933->2937 2938 7ff67a3e8d57-7ff67a3e8d82 2933->2938 2939 7ff67a3e8c40-7ff67a3e8c48 2934->2939 2936->2928 2942 7ff67a3e8e04-7ff67a3e8e19 InternetQueryDataAvailable 2937->2942 2943 7ff67a3e8ddd-7ff67a3e8df1 call 7ff67a3fd010 2937->2943 2938->2936 2939->2939 2941 7ff67a3e8c4a-7ff67a3e8c6b call 7ff67a391d20 call 7ff67a415824 call 7ff67a415370 2939->2941 2941->2924 2944 7ff67a3e8fee-7ff67a3e9034 InternetCloseHandle 2942->2944 2945 7ff67a3e8e1f 2942->2945 2943->2942 2952 7ff67a3e8df3-7ff67a3e8e00 call 7ff67a3a6d30 2943->2952 2944->2936 2949 7ff67a3e8e24-7ff67a3e8e29 2945->2949 2949->2944 2953 7ff67a3e8e2f-7ff67a3e8e49 2949->2953 2952->2942 2957 7ff67a3e8ebc-7ff67a3e8ed3 InternetReadFile 2953->2957 2958 7ff67a3e8e4b-7ff67a3e8e51 2953->2958 2961 7ff67a3e8fa8-7ff67a3e8faf 2957->2961 2962 7ff67a3e8ed9-7ff67a3e8ede 2957->2962 2963 7ff67a3e8e53-7ff67a3e8e5a 2958->2963 2964 7ff67a3e8e7f-7ff67a3e8e82 call 7ff67a4154e0 2958->2964 2961->2944 2966 7ff67a3e8fb1-7ff67a3e8fc2 2961->2966 2962->2961 2965 7ff67a3e8ee4-7ff67a3e8eef 2962->2965 2967 7ff67a3e8e60-7ff67a3e8e6b call 7ff67a4154e0 2963->2967 2968 7ff67a3e9071-7ff67a3e9076 call 7ff67a38d390 2963->2968 2976 7ff67a3e8e87-7ff67a3e8eb7 call 7ff67a417bf0 2964->2976 2971 7ff67a3e8ef1-7ff67a3e8f1c call 7ff67a417540 2965->2971 2972 7ff67a3e8f1e-7ff67a3e8f37 call 7ff67a3a7860 2965->2972 2973 7ff67a3e8fc4-7ff67a3e8fd7 2966->2973 2974 7ff67a3e8fdd-7ff67a3e8fea call 7ff67a415240 2966->2974 2980 7ff67a3e906b-7ff67a3e9070 call 7ff67a3f8d28 2967->2980 2989 7ff67a3e8e71-7ff67a3e8e7d 2967->2989 2991 7ff67a3e8f38-7ff67a3e8f3f 2971->2991 2972->2991 2973->2974 2973->2980 2974->2944 2976->2957 2980->2968 2989->2976 2992 7ff67a3e8f82 2991->2992 2993 7ff67a3e8f41-7ff67a3e8f52 2991->2993 2994 7ff67a3e8f84-7ff67a3e8f99 InternetQueryDataAvailable 2992->2994 2995 7ff67a3e8f54-7ff67a3e8f67 2993->2995 2996 7ff67a3e8f6d-7ff67a3e8f80 call 7ff67a415240 2993->2996 2994->2944 2997 7ff67a3e8f9b-7ff67a3e8fa3 2994->2997 2995->2980 2995->2996 2996->2994 2997->2949
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Internet$Query$AvailableDataHttpInfoOpen$CloseConcurrency::cancel_current_taskCriticalEnterFileHandleReadSection_invalid_parameter_noinfo_noreturn
                              • String ID: `;b
                              • API String ID: 2754876294-2329670205
                              • Opcode ID: a41a05434ed77775db594ef1fa2ce84004dbcbf1cc0c20e796a22ef6187ecec3
                              • Instruction ID: e7504b773c23039b170ea76851690012b4a2a28e1a8f8479d2c5595d85ae3ea0
                              • Opcode Fuzzy Hash: a41a05434ed77775db594ef1fa2ce84004dbcbf1cc0c20e796a22ef6187ecec3
                              • Instruction Fuzzy Hash: 7F027B33A29B9589F710CF65E8402AD77A4FB84798F101265EE8D97BA9EF38D481C740

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3115 7ff67a39e5a0-7ff67a39e616 CreateToolhelp32Snapshot call 7ff67a417bf0 call 7ff67a39ffc0 3120 7ff67a39e834-7ff67a39e850 call 7ff67a39fee0 3115->3120 3121 7ff67a39e61c-7ff67a39e62a Process32FirstW 3115->3121 3127 7ff67a39e856-7ff67a39e93c call 7ff67a3a40b0 call 7ff67a3a4380 3120->3127 3128 7ff67a39ea98-7ff67a39eaad CloseHandle 3120->3128 3122 7ff67a39e630-7ff67a39e632 3121->3122 3122->3120 3124 7ff67a39e638-7ff67a39e650 call 7ff67a3d1a40 3122->3124 3135 7ff67a39e652 3124->3135 3136 7ff67a39e655-7ff67a39e679 call 7ff67a3aad00 call 7ff67a3a52c0 3124->3136 3149 7ff67a39e940-7ff67a39e948 3127->3149 3129 7ff67a39eadf-7ff67a39eb33 call 7ff67a39eb50 call 7ff67a415220 3128->3129 3130 7ff67a39eaaf-7ff67a39eac3 3128->3130 3133 7ff67a39eac5-7ff67a39ead8 3130->3133 3134 7ff67a39eada call 7ff67a415240 3130->3134 3133->3134 3139 7ff67a39eb34-7ff67a39eb39 call 7ff67a3f8d28 3133->3139 3134->3129 3135->3136 3157 7ff67a39e680-7ff67a39e6a7 3136->3157 3152 7ff67a39eb3a-7ff67a39eb3f call 7ff67a3f8d28 3139->3152 3149->3149 3153 7ff67a39e94a-7ff67a39e9f0 call 7ff67a391d20 call 7ff67a3a0ac0 3149->3153 3163 7ff67a39eb40-7ff67a39eb45 call 7ff67a3f8d28 3152->3163 3171 7ff67a39e9f5-7ff67a39e9fc 3153->3171 3157->3157 3158 7ff67a39e6a9-7ff67a39e6cb 3157->3158 3161 7ff67a39e6e7-7ff67a39e6fb call 7ff67a3add60 3158->3161 3162 7ff67a39e6cd-7ff67a39e6e5 3158->3162 3165 7ff67a39e700-7ff67a39e783 call 7ff67a3aad00 call 7ff67a3a52c0 call 7ff67a3a3a20 call 7ff67a3a8c50 call 7ff67a3a8af0 3161->3165 3162->3165 3173 7ff67a39eb46-7ff67a39eb4b call 7ff67a3f8d28 3163->3173 3196 7ff67a39e785-7ff67a39e799 3165->3196 3197 7ff67a39e7b9-7ff67a39e7db 3165->3197 3171->3171 3174 7ff67a39e9fe-7ff67a39ea54 call 7ff67a391d20 call 7ff67a3a0ac0 call 7ff67a3a2e00 3171->3174 3190 7ff67a39ea87-7ff67a39ea94 3174->3190 3191 7ff67a39ea56-7ff67a39ea67 3174->3191 3190->3128 3192 7ff67a39ea82 call 7ff67a415240 3191->3192 3193 7ff67a39ea69-7ff67a39ea7c 3191->3193 3192->3190 3193->3173 3193->3192 3198 7ff67a39e7b4 call 7ff67a415240 3196->3198 3199 7ff67a39e79b-7ff67a39e7ae 3196->3199 3200 7ff67a39e80f-7ff67a39e82f Process32NextW 3197->3200 3201 7ff67a39e7dd-7ff67a39e7ef 3197->3201 3198->3197 3199->3152 3199->3198 3200->3122 3203 7ff67a39e7f1-7ff67a39e804 3201->3203 3204 7ff67a39e80a call 7ff67a415240 3201->3204 3203->3163 3203->3204 3204->3200
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                              • String ID: [PID:
                              • API String ID: 1946380282-2210602247
                              • Opcode ID: 4b2c1477acc51a709ea019105098fd94965f659ffbda46a03a4afa32c820551a
                              • Instruction ID: 0e2d02e22bdccd9f3baa4ed7f5972dde6338cb0eded3ae9193e6e7b5b250cf12
                              • Opcode Fuzzy Hash: 4b2c1477acc51a709ea019105098fd94965f659ffbda46a03a4afa32c820551a
                              • Instruction Fuzzy Hash: 3CE1B773628BC185EB24CF25D8843ED7765FB857A8F504225EA9D87BA9DF78D280C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: be6b821129be0224abbc88d0ec695db236515f1716b917d2a56516e9c042539c
                              • Instruction ID: 7ecc861e281ea7b086cd677a2836897e988cb99954750b4db358e2dda381335d
                              • Opcode Fuzzy Hash: be6b821129be0224abbc88d0ec695db236515f1716b917d2a56516e9c042539c
                              • Instruction Fuzzy Hash: F2725233619BC589DB708F29E8413ED73A5F789798F505325EA9C96BA9DF38C284C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: File$PointerReadSize_invalid_parameter_noinfo_noreturn
                              • String ID: exists$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                              • API String ID: 2478245620-15404121
                              • Opcode ID: 5f9e4ca639d8699a72128ccfa721fde7abdb19906f4f82f7ad628aecb2e310ca
                              • Instruction ID: d043b95b9115863d79d5a3b4dc54ed1c4c381007895a215241081bb2cd1522c4
                              • Opcode Fuzzy Hash: 5f9e4ca639d8699a72128ccfa721fde7abdb19906f4f82f7ad628aecb2e310ca
                              • Instruction Fuzzy Hash: 56322823A28BC589EB60CF29D8807ED37A1FB84758F404276DA4D97BA9EF79D544C700
                              APIs
                              • _get_daylight.LIBCMT ref: 00007FF67A409D4D
                                • Part of subcall function 00007FF67A4093B8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67A4093CC
                                • Part of subcall function 00007FF67A404454: RtlFreeHeap.NTDLL(?,?,?,00007FF67A40E5C2,?,?,?,00007FF67A40E93F,?,?,00000000,00007FF67A40C67C,?,?,?,00007FF67A40C5AF), ref: 00007FF67A40446A
                                • Part of subcall function 00007FF67A404454: GetLastError.KERNEL32(?,?,?,00007FF67A40E5C2,?,?,?,00007FF67A40E93F,?,?,00000000,00007FF67A40C67C,?,?,?,00007FF67A40C5AF), ref: 00007FF67A404474
                                • Part of subcall function 00007FF67A3F8D58: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF67A3F8D06,?,?,?,?,8000000000000000,00007FF67A3F8BEE), ref: 00007FF67A3F8D61
                                • Part of subcall function 00007FF67A3F8D58: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF67A3F8D06,?,?,?,?,8000000000000000,00007FF67A3F8BEE), ref: 00007FF67A3F8D86
                                • Part of subcall function 00007FF67A412470: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67A4123BB
                              • _get_daylight.LIBCMT ref: 00007FF67A409D3C
                                • Part of subcall function 00007FF67A409418: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67A40942C
                              • _get_daylight.LIBCMT ref: 00007FF67A409FB2
                              • _get_daylight.LIBCMT ref: 00007FF67A409FC3
                              • _get_daylight.LIBCMT ref: 00007FF67A409FD4
                              • GetTimeZoneInformation.KERNEL32(00007FF67A40A2C2), ref: 00007FF67A409FFB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                              • String ID: Eastern Standard Time$Eastern Summer Time
                              • API String ID: 4070488512-239921721
                              • Opcode ID: 5ef8fea5b7ffb6343d58d59f5e654fded817569be5bd4a323691fdfdb31d52da
                              • Instruction ID: f1074a54e1123cb778c3c4b37db362b6ac5eccf07db4d3a9a52f56feeadc1221
                              • Opcode Fuzzy Hash: 5ef8fea5b7ffb6343d58d59f5e654fded817569be5bd4a323691fdfdb31d52da
                              • Instruction Fuzzy Hash: 33D1C523A3824245E724EF27D8502BA67A1FFA4784F4480B5EA4DC77AADF3EE441D740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: a8454d332437e86018a34e79ee0e67cd90b8fc8e0130e7ecb8683b7bf90769a1
                              • Instruction ID: d212f2c96bfe00631ddf88f362f8881e3e6c37ec83a370b4a685fdc1f7a6054a
                              • Opcode Fuzzy Hash: a8454d332437e86018a34e79ee0e67cd90b8fc8e0130e7ecb8683b7bf90769a1
                              • Instruction Fuzzy Hash: E5C1F523B3868665FB605F1684003BEAB91EF91B94F4401F4DA4E877A9CFBEE4549701
                              APIs
                              • _get_daylight.LIBCMT ref: 00007FF67A409FB2
                                • Part of subcall function 00007FF67A409418: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67A40942C
                              • _get_daylight.LIBCMT ref: 00007FF67A409FC3
                                • Part of subcall function 00007FF67A4093B8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67A4093CC
                              • _get_daylight.LIBCMT ref: 00007FF67A409FD4
                                • Part of subcall function 00007FF67A4093E8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF67A4093FC
                                • Part of subcall function 00007FF67A404454: RtlFreeHeap.NTDLL(?,?,?,00007FF67A40E5C2,?,?,?,00007FF67A40E93F,?,?,00000000,00007FF67A40C67C,?,?,?,00007FF67A40C5AF), ref: 00007FF67A40446A
                                • Part of subcall function 00007FF67A404454: GetLastError.KERNEL32(?,?,?,00007FF67A40E5C2,?,?,?,00007FF67A40E93F,?,?,00000000,00007FF67A40C67C,?,?,?,00007FF67A40C5AF), ref: 00007FF67A404474
                              • GetTimeZoneInformation.KERNEL32(00007FF67A40A2C2), ref: 00007FF67A409FFB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                              • String ID: Eastern Standard Time$Eastern Summer Time
                              • API String ID: 3458911817-239921721
                              • Opcode ID: 6992b982ce594931a36680c500339fff6557f0f256ccf34fb948bfc31a61fc78
                              • Instruction ID: d2fa12772a3884bad9a0f38bdfa5c2cda0676ceac7d8384f71586bfde4311abe
                              • Opcode Fuzzy Hash: 6992b982ce594931a36680c500339fff6557f0f256ccf34fb948bfc31a61fc78
                              • Instruction Fuzzy Hash: 06518333A3864286E710EF23D8805BA77A0BB58744F4451B5EA4DC77BADF3EE4419B50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: cores
                              • API String ID: 3668304517-2370456839
                              • Opcode ID: ddaaeac7637abf309bd636fba0f4e21889d932baa452a3d4ed9cbc3cb814210e
                              • Instruction ID: 25a522006ef9f48d65989d3de10bdb69f58963b788aedad2f46cd765319e05eb
                              • Opcode Fuzzy Hash: ddaaeac7637abf309bd636fba0f4e21889d932baa452a3d4ed9cbc3cb814210e
                              • Instruction Fuzzy Hash: 6DB1B763F28B858AF700CFB9C4413EC3372AB55368F505365DE6CA2AAADF789595C340
                              APIs
                                • Part of subcall function 00007FF67A4153D0: EnterCriticalSection.KERNEL32(?,?,0000000100000000,00007FF67A391944), ref: 00007FF67A4153E0
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF67A3E3BAE
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF67A3E3BB4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$CriticalEnterSection
                              • String ID: exists$ios_base::badbit set
                              • API String ID: 555700303-2074760687
                              • Opcode ID: 60c627b790b2c0ffcf3682fe3924915bfa2a818b45532bdaba860411a19b8344
                              • Instruction ID: 1f8dea4ff592532fdcb563a060d52a4638e29f7f73c43f016e4baf00ee41324c
                              • Opcode Fuzzy Hash: 60c627b790b2c0ffcf3682fe3924915bfa2a818b45532bdaba860411a19b8344
                              • Instruction Fuzzy Hash: 7F324033A2DBC696DA20DF15E4903EA6365FB84750F404272EA8DC3AA9EF7CD544CB00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 842207f6fbf6b3ba87ef6fac9f7f4deeb4e0fa80b22a779e3f22aada3394b51a
                              • Instruction ID: 505f8e3f085b4b500a30571592888a790c20cf9770d54696533f503e01165e22
                              • Opcode Fuzzy Hash: 842207f6fbf6b3ba87ef6fac9f7f4deeb4e0fa80b22a779e3f22aada3394b51a
                              • Instruction Fuzzy Hash: 96F14133A18F8889EB608F69E44135D77B1F7897A8F105325EADC96B99EF7CD1908700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: deb8995be8b8993a75605fc0b2e969a111e795985316c39fb14fcec82bc48fd2
                              • Instruction ID: 69e28b9feb4db35607ef10be0637605dbd754a683bc0a952f33a6d499711d8a1
                              • Opcode Fuzzy Hash: deb8995be8b8993a75605fc0b2e969a111e795985316c39fb14fcec82bc48fd2
                              • Instruction Fuzzy Hash: F1F14133A18F8989EB608F69E44135D77A1F7897A8F105325EEDC96B98EF7CD1908700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$DriveLogicalStrings
                              • String ID:
                              • API String ID: 3916208290-0
                              • Opcode ID: fae7fe8c1d7166c2d90c83820ca4dab5deb36866862a2bbd62ab0eb48a487933
                              • Instruction ID: bdfb43bb5e67a07f0a6eb3482b613e4c3d55a26adbd150378c70a4cde2f5bb7c
                              • Opcode Fuzzy Hash: fae7fe8c1d7166c2d90c83820ca4dab5deb36866862a2bbd62ab0eb48a487933
                              • Instruction Fuzzy Hash: FB716033E28B8582E7108F25E4803AE7765FB947A8F105225EA9C53AB9DF7CE5D0D740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: InformationTimeZone
                              • String ID: [UTC
                              • API String ID: 565725191-1715286942
                              • Opcode ID: a66f02d72a5db2c1b3acb4f2da40c4cf2eb1e0a78d729c6841fe139f9daa0958
                              • Instruction ID: ae08827e127d219fbd2eaba3c3b71fbd6f3e6eb62ebdae6b2db9f70b7aa7c716
                              • Opcode Fuzzy Hash: a66f02d72a5db2c1b3acb4f2da40c4cf2eb1e0a78d729c6841fe139f9daa0958
                              • Instruction Fuzzy Hash: A291D832619FC98AD7718F29E84129AB7A4F78D798F105325EACD57B19EF38C250CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: CryptDataFreeLocalUnprotect
                              • String ID:
                              • API String ID: 1561624719-0
                              • Opcode ID: f88957cfd2b51bcb633bef7ba602987a2d0c6455c83a8ba819920da39e749fc3
                              • Instruction ID: a3648a3cc15e8d6b1d949aa11bbacee318573b9adddd9455229868635e807b78
                              • Opcode Fuzzy Hash: f88957cfd2b51bcb633bef7ba602987a2d0c6455c83a8ba819920da39e749fc3
                              • Instruction Fuzzy Hash: D6414633A28B80CAE3208F74E4403E937A4FB5974CF044279EA8C92E9ADF79D564C754
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: 90496fcf6dfcee039494cb4054596e234e531b545ff591467ece2fe3a88e0abf
                              • Instruction ID: dbf4cde338bb63ace5091489c08b6155766b0b924438043c9f32278a3eb05863
                              • Opcode Fuzzy Hash: 90496fcf6dfcee039494cb4054596e234e531b545ff591467ece2fe3a88e0abf
                              • Instruction Fuzzy Hash: F601843352C78182E760CF25F5003AAB3A0FB98788F500131EACD82669DFBCD190CB40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: \u%04x
                              • API String ID: 0-2916071157
                              • Opcode ID: 1fad9b3796bb0d5fdcf9dafeee4abe8aa7886122a64dabba2bcf5863bcbe4c67
                              • Instruction ID: 541851fd2b4e7836db5a4167f193d63e249d9aad09f5e44ac69713d248a9251b
                              • Opcode Fuzzy Hash: 1fad9b3796bb0d5fdcf9dafeee4abe8aa7886122a64dabba2bcf5863bcbe4c67
                              • Instruction Fuzzy Hash: 7D912623A2868182EB54CF29D5902BD7760FB82B94F44907ADB5ECB7A5EF3CE515C700
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: ":
                              • API String ID: 0-3662656813
                              • Opcode ID: 21247e27d2ae44605742fa71cc188a78342d6b0a71e2b25c5488f365a3c44f00
                              • Instruction ID: dd080b783792917a19f3c5a8298f6bbb1dbadc1ab2d0d64e796e56dc117e38f2
                              • Opcode Fuzzy Hash: 21247e27d2ae44605742fa71cc188a78342d6b0a71e2b25c5488f365a3c44f00
                              • Instruction Fuzzy Hash: 1A912477228A4681DB20DF2AE19466D7761FB89FD8F409026DF4E8BB64DF39D158CB00
                              Strings
                              • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/, xrefs: 00007FF67A3A4139
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
                              • API String ID: 0-1713319389
                              • Opcode ID: 437ae662eb117c41f44ff7f9c77615c2854eafd9d66bebc79b763ab490802efe
                              • Instruction ID: 111a2634241fb5184f31718ab7fc7d9a0a2e7d9e823d2e561a2219ec4176189e
                              • Opcode Fuzzy Hash: 437ae662eb117c41f44ff7f9c77615c2854eafd9d66bebc79b763ab490802efe
                              • Instruction Fuzzy Hash: AD41D56362D6E049EB02CB39841127D7FB2D366B84B1C81A2E7D8C7756DE2DD216C710

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2342 7ff67a3e1b00-7ff67a3e1b3b call 7ff67a3e1970 2345 7ff67a3e1b3d-7ff67a3e1b4c EnterCriticalSection 2342->2345 2346 7ff67a3e1b7c 2342->2346 2348 7ff67a3e1b4e-7ff67a3e1b70 GdiplusStartup 2345->2348 2349 7ff67a3e1ba0-7ff67a3e1bba LeaveCriticalSection GdipGetImageEncodersSize 2345->2349 2347 7ff67a3e1b81-7ff67a3e1b9f call 7ff67a415220 2346->2347 2348->2349 2352 7ff67a3e1b72-7ff67a3e1b76 LeaveCriticalSection 2348->2352 2349->2346 2351 7ff67a3e1bbc-7ff67a3e1bcf 2349->2351 2354 7ff67a3e1bd1-7ff67a3e1bda call 7ff67a3e1700 2351->2354 2355 7ff67a3e1c0b-7ff67a3e1c19 call 7ff67a400aa4 2351->2355 2352->2346 2362 7ff67a3e1bdc-7ff67a3e1be6 2354->2362 2363 7ff67a3e1c08 2354->2363 2360 7ff67a3e1c20-7ff67a3e1c2a 2355->2360 2361 7ff67a3e1c1b-7ff67a3e1c1e 2355->2361 2364 7ff67a3e1c2e-7ff67a3e1c31 2360->2364 2361->2364 2365 7ff67a3e1bf2-7ff67a3e1c06 call 7ff67a416060 2362->2365 2366 7ff67a3e1be8 2362->2366 2363->2355 2367 7ff67a3e1c33-7ff67a3e1c38 2364->2367 2368 7ff67a3e1c3d-7ff67a3e1c4e GdipGetImageEncoders 2364->2368 2365->2364 2366->2365 2370 7ff67a3e1da8-7ff67a3e1dab 2367->2370 2371 7ff67a3e1d93-7ff67a3e1d98 2368->2371 2372 7ff67a3e1c54-7ff67a3e1c5d 2368->2372 2376 7ff67a3e1dc4-7ff67a3e1dc6 2370->2376 2377 7ff67a3e1dad 2370->2377 2371->2370 2374 7ff67a3e1c8f 2372->2374 2375 7ff67a3e1c5f-7ff67a3e1c6d 2372->2375 2380 7ff67a3e1c96-7ff67a3e1ca6 2374->2380 2378 7ff67a3e1c70-7ff67a3e1c7b 2375->2378 2376->2347 2379 7ff67a3e1db0-7ff67a3e1dc2 call 7ff67a3f8110 2377->2379 2381 7ff67a3e1c7d-7ff67a3e1c82 2378->2381 2382 7ff67a3e1c88-7ff67a3e1c8d 2378->2382 2379->2376 2384 7ff67a3e1cb9-7ff67a3e1cd5 2380->2384 2385 7ff67a3e1ca8-7ff67a3e1cb3 2380->2385 2381->2382 2388 7ff67a3e1d37-7ff67a3e1d3b 2381->2388 2382->2374 2382->2378 2386 7ff67a3e1d42-7ff67a3e1d81 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 2384->2386 2387 7ff67a3e1cd7-7ff67a3e1d30 GdipCreateBitmapFromScan0 GdipSaveImageToStream 2384->2387 2385->2371 2385->2384 2392 7ff67a3e1d83 2386->2392 2393 7ff67a3e1d9a-7ff67a3e1da7 GdipDisposeImage 2386->2393 2390 7ff67a3e1d32-7ff67a3e1d35 2387->2390 2391 7ff67a3e1d40 2387->2391 2388->2380 2394 7ff67a3e1d86-7ff67a3e1d8d GdipDisposeImage 2390->2394 2391->2393 2392->2394 2393->2370 2394->2371
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Gdip$Image$CriticalSection$DisposeEncodersLeave$BitmapCreateEnterErrorFromGdiplusInitializeLastSaveScan0SizeStartupStream
                              • String ID: &
                              • API String ID: 1703174404-3042966939
                              • Opcode ID: a799f0d6590f995dc081d60b5774d6bb27e4fbd63746d95bb83c1d8aad6cf0fd
                              • Instruction ID: ac8b865dc84d3c4a10628500a25c6a8c69cf04461ed5f00e8620ab947222d530
                              • Opcode Fuzzy Hash: a799f0d6590f995dc081d60b5774d6bb27e4fbd63746d95bb83c1d8aad6cf0fd
                              • Instruction Fuzzy Hash: 65916233A28B428AE710CF31D8005B977A4FB647A8F5441B5DA4DD7BA8DF38E995C340

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Info$CleanupStartupUserclosesocketconnecthtonsinet_ptonsocket
                              • String ID: geo$system
                              • API String ID: 2440148987-2364779556
                              • Opcode ID: 369b569b77179fae4a33040cbad1b1e26fc2306e03f387e213986ff8efbfca03
                              • Instruction ID: bf5755514e8c655c8ac3e84a762618f2baa4749875b3c30021b139664fed7450
                              • Opcode Fuzzy Hash: 369b569b77179fae4a33040cbad1b1e26fc2306e03f387e213986ff8efbfca03
                              • Instruction Fuzzy Hash: 4A919F63F28B4289EB00CFB5E8501AC3372EF447A8F405675EA5D92AB9EE7DE545C300

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3000 7ff67a3eb136-7ff67a3eb19e call 7ff67a3a2c10 call 7ff67a3a1850 3005 7ff67a3eb1a0-7ff67a3eb1b1 3000->3005 3006 7ff67a3eb1d1-7ff67a3eb1ea 3000->3006 3007 7ff67a3eb1b3-7ff67a3eb1c6 3005->3007 3008 7ff67a3eb1cc call 7ff67a415240 3005->3008 3009 7ff67a3eb1ec-7ff67a3eb1fd 3006->3009 3010 7ff67a3eb21d-7ff67a3eb268 call 7ff67a3e0ec0 call 7ff67a3ddb20 3006->3010 3007->3008 3011 7ff67a3eb706-7ff67a3eb70b call 7ff67a3f8d28 3007->3011 3008->3006 3013 7ff67a3eb1ff-7ff67a3eb212 3009->3013 3014 7ff67a3eb218 call 7ff67a415240 3009->3014 3025 7ff67a3eb26a-7ff67a3eb279 3010->3025 3026 7ff67a3eb286-7ff67a3eb297 call 7ff67a3a7540 3010->3026 3017 7ff67a3eb70c-7ff67a3eb711 call 7ff67a3f8d28 3011->3017 3013->3014 3013->3017 3014->3010 3027 7ff67a3eb712-7ff67a3eb717 call 7ff67a3f8d28 3017->3027 3028 7ff67a3eb27e-7ff67a3eb284 3025->3028 3029 7ff67a3eb27b 3025->3029 3032 7ff67a3eb29c-7ff67a3eb3b4 call 7ff67a3a2c10 * 3 3026->3032 3035 7ff67a3eb718-7ff67a3eb71d call 7ff67a3f8d28 3027->3035 3028->3032 3029->3028 3047 7ff67a3eb3b6-7ff67a3eb3c7 3032->3047 3048 7ff67a3eb3e7-7ff67a3eb408 3032->3048 3041 7ff67a3eb71e-7ff67a3eb723 call 7ff67a3f8d28 3035->3041 3046 7ff67a3eb724-7ff67a3eb729 call 7ff67a3f8d28 3041->3046 3061 7ff67a3eb72a-7ff67a3eb72f call 7ff67a3f8d28 3046->3061 3052 7ff67a3eb3e2 call 7ff67a415240 3047->3052 3053 7ff67a3eb3c9-7ff67a3eb3dc 3047->3053 3049 7ff67a3eb43c-7ff67a3eb45f 3048->3049 3050 7ff67a3eb40a-7ff67a3eb41c 3048->3050 3057 7ff67a3eb493-7ff67a3eb4ae 3049->3057 3058 7ff67a3eb461-7ff67a3eb473 3049->3058 3054 7ff67a3eb41e-7ff67a3eb431 3050->3054 3055 7ff67a3eb437 call 7ff67a415240 3050->3055 3052->3048 3053->3027 3053->3052 3054->3035 3054->3055 3055->3049 3064 7ff67a3eb4b0-7ff67a3eb4c1 3057->3064 3065 7ff67a3eb4e1-7ff67a3eb4fa 3057->3065 3062 7ff67a3eb475-7ff67a3eb488 3058->3062 3063 7ff67a3eb48e call 7ff67a415240 3058->3063 3079 7ff67a3eb730-7ff67a3eb735 call 7ff67a3f8d28 3061->3079 3062->3041 3062->3063 3063->3057 3070 7ff67a3eb4c3-7ff67a3eb4d6 3064->3070 3071 7ff67a3eb4dc call 7ff67a415240 3064->3071 3066 7ff67a3eb4fc-7ff67a3eb50d 3065->3066 3067 7ff67a3eb52d-7ff67a3eb557 call 7ff67a3ea4c0 3065->3067 3072 7ff67a3eb50f-7ff67a3eb522 3066->3072 3073 7ff67a3eb528 call 7ff67a415240 3066->3073 3078 7ff67a3eb55c-7ff67a3eb586 call 7ff67a3a2c10 3067->3078 3070->3046 3070->3071 3071->3065 3072->3061 3072->3073 3073->3067 3084 7ff67a3eb588-7ff67a3eb599 3078->3084 3085 7ff67a3eb5b9-7ff67a3eb5d7 3078->3085 3086 7ff67a3eb736-7ff67a3eb73b call 7ff67a3f8d28 3079->3086 3087 7ff67a3eb5b4 call 7ff67a415240 3084->3087 3088 7ff67a3eb59b-7ff67a3eb5ae 3084->3088 3090 7ff67a3eb60d-7ff67a3eb631 3085->3090 3091 7ff67a3eb5d9-7ff67a3eb5ed 3085->3091 3103 7ff67a3eb73c-7ff67a3eb741 call 7ff67a3f8d28 3086->3103 3087->3085 3088->3079 3088->3087 3092 7ff67a3eb633-7ff67a3eb647 3090->3092 3093 7ff67a3eb667-7ff67a3eb689 3090->3093 3096 7ff67a3eb5ef-7ff67a3eb602 3091->3096 3097 7ff67a3eb608 call 7ff67a415240 3091->3097 3099 7ff67a3eb662 call 7ff67a415240 3092->3099 3100 7ff67a3eb649-7ff67a3eb65c 3092->3100 3101 7ff67a3eb6bb-7ff67a3eb6ff call 7ff67a415220 3093->3101 3102 7ff67a3eb68b-7ff67a3eb69f 3093->3102 3096->3086 3096->3097 3097->3090 3099->3093 3100->3099 3100->3103 3105 7ff67a3eb6a1-7ff67a3eb6b4 3102->3105 3106 7ff67a3eb6b6 call 7ff67a415240 3102->3106 3105->3106 3109 7ff67a3eb700-7ff67a3eb705 call 7ff67a3f8d28 3105->3109 3106->3101 3109->3011
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: 35cef6b89aa133bbca15bc5762099fcbb25724a90db74ea652aff1a28b07d9f7
                              • Instruction ID: bd71dbd253c4763cfe22e0b7f5793d854af9c23056ee46a97a7639a17eb90a06
                              • Opcode Fuzzy Hash: 35cef6b89aa133bbca15bc5762099fcbb25724a90db74ea652aff1a28b07d9f7
                              • Instruction Fuzzy Hash: B7F1E363E28BC585EB118F79D4453AC6351EF957B8F509361EAAC86AEADF7CD4C08300

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3206 7ff67a3c14c0-7ff67a3c150f 3207 7ff67a3c17df-7ff67a3c180b call 7ff67a415220 3206->3207 3208 7ff67a3c1515-7ff67a3c1519 3206->3208 3209 7ff67a3c1520-7ff67a3c1535 3208->3209 3211 7ff67a3c1537 3209->3211 3212 7ff67a3c153a-7ff67a3c1580 call 7ff67a3ade60 call 7ff67a38f320 3209->3212 3211->3212 3218 7ff67a3c1582-7ff67a3c1599 3212->3218 3219 7ff67a3c15b9-7ff67a3c15fb call 7ff67a3903b0 3212->3219 3220 7ff67a3c15b4 call 7ff67a415240 3218->3220 3221 7ff67a3c159b-7ff67a3c15ae 3218->3221 3227 7ff67a3c160d-7ff67a3c1611 3219->3227 3228 7ff67a3c15fd-7ff67a3c160b 3219->3228 3220->3219 3221->3220 3223 7ff67a3c1836-7ff67a3c183b call 7ff67a3f8d28 3221->3223 3233 7ff67a3c183c-7ff67a3c1841 call 7ff67a3f8d28 3223->3233 3230 7ff67a3c1617-7ff67a3c1619 3227->3230 3231 7ff67a3c1821-7ff67a3c1835 call 7ff67a38fbe0 3227->3231 3228->3230 3234 7ff67a3c1627-7ff67a3c163c 3230->3234 3235 7ff67a3c161b-7ff67a3c1622 call 7ff67a3c0cd0 3230->3235 3231->3223 3243 7ff67a3c1842-7ff67a3c1847 call 7ff67a3f8d28 3233->3243 3239 7ff67a3c1641-7ff67a3c1684 call 7ff67a3ade60 call 7ff67a38f320 3234->3239 3240 7ff67a3c163e 3234->3240 3235->3234 3249 7ff67a3c1686-7ff67a3c169d 3239->3249 3250 7ff67a3c16bd-7ff67a3c16ff call 7ff67a3903b0 3239->3250 3240->3239 3251 7ff67a3c1848-7ff67a3c184f call 7ff67a3f8d28 3243->3251 3252 7ff67a3c169f-7ff67a3c16b2 3249->3252 3253 7ff67a3c16b8 call 7ff67a415240 3249->3253 3259 7ff67a3c1711-7ff67a3c1715 3250->3259 3260 7ff67a3c1701-7ff67a3c170f 3250->3260 3252->3233 3252->3253 3253->3250 3261 7ff67a3c171b-7ff67a3c171d 3259->3261 3262 7ff67a3c180c-7ff67a3c1820 call 7ff67a38fbe0 3259->3262 3260->3261 3263 7ff67a3c171f-7ff67a3c172b call 7ff67a3c0cd0 3261->3263 3264 7ff67a3c172c-7ff67a3c1734 3261->3264 3262->3231 3263->3264 3266 7ff67a3c1736-7ff67a3c174c 3264->3266 3267 7ff67a3c176c-7ff67a3c1785 3264->3267 3270 7ff67a3c174e-7ff67a3c1761 3266->3270 3271 7ff67a3c1767 call 7ff67a415240 3266->3271 3272 7ff67a3c1787-7ff67a3c179d 3267->3272 3273 7ff67a3c17bd-7ff67a3c17d9 3267->3273 3270->3243 3270->3271 3271->3267 3276 7ff67a3c179f-7ff67a3c17b2 3272->3276 3277 7ff67a3c17b8 call 7ff67a415240 3272->3277 3273->3207 3273->3209 3276->3251 3276->3277 3277->3273
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: chrome_key$directory_iterator::directory_iterator$exists$key$status
                              • API String ID: 3668304517-2866355200
                              • Opcode ID: 3755d7ed5a9e4e021b532b58241de286af76a174978315f378cd37477dbfcab9
                              • Instruction ID: 4c765ae7e8f0f3b9f2440bc50978830423a48a41d3da51eaf60800a385f29fca
                              • Opcode Fuzzy Hash: 3755d7ed5a9e4e021b532b58241de286af76a174978315f378cd37477dbfcab9
                              • Instruction Fuzzy Hash: 4DA19073A28B9686EB00CF28E8442AD7361FB457A8F505775EA5D87AE8DF3CD181C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                              • String ID:
                              • API String ID: 1330151763-0
                              • Opcode ID: c371a098d1ed890db9e0e1017008efad7e651166628c24d51931c4570b1b57a6
                              • Instruction ID: e8af66c05eb78e7d5dcbb9e006b14099b260f5d71c2f322c5c2c9cfd0778e804
                              • Opcode Fuzzy Hash: c371a098d1ed890db9e0e1017008efad7e651166628c24d51931c4570b1b57a6
                              • Instruction Fuzzy Hash: 6FC1BF37B38A4285EB10CFAAC4906AC3761FB49BA8F015265DA2ED77E9CF39D451C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: content$directory_iterator::directory_iterator$exists$filename$status
                              • API String ID: 3668304517-3429737954
                              • Opcode ID: 5f04f57a576b5b157d65a31b2d2d56cc07066f3f03f05c04df50e5a63e20b52d
                              • Instruction ID: 86baabd9c5cf82e6756d3b0b23de4800b43264f1a36595801baf15919bea6d73
                              • Opcode Fuzzy Hash: 5f04f57a576b5b157d65a31b2d2d56cc07066f3f03f05c04df50e5a63e20b52d
                              • Instruction Fuzzy Hash: 33F0B4A3B24A8541FB089FA8D00837D2391EB14F8DF540070C64C8A6E6DF6DC4D1C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$CloseEnumOpen
                              • String ID:
                              • API String ID: 2177193445-0
                              • Opcode ID: 1154c0838f5fe8a157184aa3084b9b3080f43bed9e9792bae30ff953cebbf079
                              • Instruction ID: 01173a94c68055ebe6cfe9d9ae1208dfc319913ca6147d4d41551f2608bcb7be
                              • Opcode Fuzzy Hash: 1154c0838f5fe8a157184aa3084b9b3080f43bed9e9792bae30ff953cebbf079
                              • Instruction Fuzzy Hash: 56719173E28B8585FB108F65E4443AD6761FB453A8F504225EAAC93AE9DF7CE4D1C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: exists
                              • API String ID: 3668304517-2996790960
                              • Opcode ID: d982718c1fd17e903050a2bce105db42f02820095b4acfa229deab4207014bee
                              • Instruction ID: 780c7b04a75e063842bcbbcbf93f74ab1e873e5b8f2d0a7f2359dc41d76821fa
                              • Opcode Fuzzy Hash: d982718c1fd17e903050a2bce105db42f02820095b4acfa229deab4207014bee
                              • Instruction Fuzzy Hash: ABA19273A24B9686EB10CF68E8442AD3362FB847A8F505675EA5D87AE9DF3CD141C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: EnvironmentInitStringStringsUnicode$Free_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 1868271193-0
                              • Opcode ID: 7aacb83b0b7a91bef113ae9f2073742aece83b3739fe776fd5feee7380209aa8
                              • Instruction ID: 3baba3a249ef69c6d148e58ab0f38c909eb7c603dedf6d83618766397ff914b7
                              • Opcode Fuzzy Hash: 7aacb83b0b7a91bef113ae9f2073742aece83b3739fe776fd5feee7380209aa8
                              • Instruction Fuzzy Hash: 9E518E23A28B8182EB108F26E44036D7360FB94BD4F589265DB9D83BA9DF7CE5D18700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: EnumOpen
                              • String ID:
                              • API String ID: 3231578192-0
                              • Opcode ID: d7bd87d262713fd341ef96cadf58e55a35a040a09dcf12c0f6eedd94483c23ba
                              • Instruction ID: 38834442f3fcaa2a910570cddba363a38aa0aca9dabcd383c3f7dc979c378832
                              • Opcode Fuzzy Hash: d7bd87d262713fd341ef96cadf58e55a35a040a09dcf12c0f6eedd94483c23ba
                              • Instruction Fuzzy Hash: 49319333A28B8585F7208F61E8446AE7374FB447A8F101225EE9D97B64DF7CD491C700
                              APIs
                                • Part of subcall function 00007FF67A4153D0: EnterCriticalSection.KERNEL32(?,?,0000000100000000,00007FF67A391944), ref: 00007FF67A4153E0
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF67A3E445A
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF67A3E4460
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$CriticalEnterSection
                              • String ID: exists$ios_base::badbit set
                              • API String ID: 555700303-2074760687
                              • Opcode ID: b7ed75b60f7e9a23a9d9aefacd9b63456f7413aba5a27f785b067fc61554d3aa
                              • Instruction ID: 11febdd3455529d68268a702c1c53eb177f397a5d59d03ffca0602e357c67f21
                              • Opcode Fuzzy Hash: b7ed75b60f7e9a23a9d9aefacd9b63456f7413aba5a27f785b067fc61554d3aa
                              • Instruction Fuzzy Hash: 23223133A2DAC691DA21DF15E4903EA6360FB84794F504276EA9DC3AB9EF7CD544CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$DriveFileFindFirstLogicalStrings
                              • String ID: content$filename
                              • API String ID: 3820383557-474635906
                              • Opcode ID: 077d28648c368bd565441d311059af13d9c85b96747a6d5d62d4a356330f4545
                              • Instruction ID: b139c38a522bc851767a0aa24fa3690454aab2a17da5c87124d4c84d5d606976
                              • Opcode Fuzzy Hash: 077d28648c368bd565441d311059af13d9c85b96747a6d5d62d4a356330f4545
                              • Instruction Fuzzy Hash: 62417263E2874682EE209F15E44016AA361EBD4BF4F580371E6AD87BF9DE7CD1818B00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Value
                              • String ID: --type$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 3702945584-3762788641
                              • Opcode ID: fbe3309223dee704750fca85b9350de5150356862cfa63411aa7ce2d28625d08
                              • Instruction ID: d66693b717381d84d459eeb54f43b4b7ae8b6f989aee619cce001f9866a35a7a
                              • Opcode Fuzzy Hash: fbe3309223dee704750fca85b9350de5150356862cfa63411aa7ce2d28625d08
                              • Instruction Fuzzy Hash: FA113D33618B8186D7208F22F4413AAB3A4FB89798F504225EB9C86B68DFBDD155CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                              • String ID:
                              • API String ID: 215268677-0
                              • Opcode ID: b58325ce29b780eef651909379bfc8c714b7e3d5217266914ac01701143baf7a
                              • Instruction ID: 11abe64d5a336499b8d2e517a134c261ffdb8f51ec9648385ee0eeb354472803
                              • Opcode Fuzzy Hash: b58325ce29b780eef651909379bfc8c714b7e3d5217266914ac01701143baf7a
                              • Instruction Fuzzy Hash: CC113D32628B8286EB508F12F84075AB3B4FB84B84F445135EB8D97B68DF3CD455CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID: cannot use operator[] with a numeric argument with
                              • API String ID: 73155330-485864652
                              • Opcode ID: 98353018458b324c6d2cd4645ea98d9218f85b6860abfe801e2f0706387ed068
                              • Instruction ID: 5af2811f3811e26b62d35a60ba21a4d63a469fefc519bc0cde4960c2ce40c776
                              • Opcode Fuzzy Hash: 98353018458b324c6d2cd4645ea98d9218f85b6860abfe801e2f0706387ed068
                              • Instruction Fuzzy Hash: 8C310423B2979244EE149F1AA5443B8A352AB04BF5F580770EE6DCBBF6DE7CE0518700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: CurrentProfile
                              • String ID: --type$Unknown
                              • API String ID: 2104809126-2669863112
                              • Opcode ID: bea126a491d64014bcb752177728a3eb5fb05278235be00e47c33b448f6fcdbd
                              • Instruction ID: 699a01faaf9c8ac5af32e84fa9850c128d10add6efddbcce923bcf7deb1c1207
                              • Opcode Fuzzy Hash: bea126a491d64014bcb752177728a3eb5fb05278235be00e47c33b448f6fcdbd
                              • Instruction Fuzzy Hash: CA31C123A2CBC182E7208F25F4402AAB760FB99784F541225FBCD82A5ADF7DD580CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: CloseOpen
                              • String ID: --type
                              • API String ID: 47109696-2654721227
                              • Opcode ID: 5f4988e2b79fc1b4d0fbfbceca3180348d66adf10f6e166154fa8f5c91246763
                              • Instruction ID: 6f53945c8d85d49a841b2141b5dd637f4b59c8d8f188d8493a4c1304adb71e30
                              • Opcode Fuzzy Hash: 5f4988e2b79fc1b4d0fbfbceca3180348d66adf10f6e166154fa8f5c91246763
                              • Instruction Fuzzy Hash: DE21A223B6CA8545FE509B62E8403AAA360EF99BE4F445171EA4DC7BA9DF2CD481C740
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: EnvironmentStrings$Free
                              • String ID:
                              • API String ID: 3328510275-0
                              • Opcode ID: 3333babb8737e4b4370a1f62f1c70aa9451fe4f3b12653bb777bcb8b2a2ae2b7
                              • Instruction ID: 3a2e9736715608689107a279ee0127465e500c9a002192c014e7f0043df874ab
                              • Opcode Fuzzy Hash: 3333babb8737e4b4370a1f62f1c70aa9451fe4f3b12653bb777bcb8b2a2ae2b7
                              • Instruction Fuzzy Hash: 56C18133A28B8585EB20CF65E4803ED7761FB857A8F505235EA9D97BA9DF78C180C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Cleanupclosesocketrecv
                              • String ID:
                              • API String ID: 1729841683-0
                              • Opcode ID: a65f43f2d25ca7c6a3c374e64be69b380e3eb1144f0c8397e9354ba1d1cc6162
                              • Instruction ID: b0f51910f4109c7570c16eb06a7c3db3601040ff8e0e4c98eeb1534c106c0d17
                              • Opcode Fuzzy Hash: a65f43f2d25ca7c6a3c374e64be69b380e3eb1144f0c8397e9354ba1d1cc6162
                              • Instruction Fuzzy Hash: 6E917463E2CBC581EA208F59E4443A96721FB857A0F504371DAAC976E9DF7DD481C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: FolderFreeKnownPathTask_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 2444108017-0
                              • Opcode ID: ac0544086cf5bef0a3a7e7647e350e937d75641a90ccf9a4dd159b67ba3d08bd
                              • Instruction ID: 0086c92577eeb5e82e125bd5bdbd1f7eb614f1f25c60c3d40ccd6f76979b0450
                              • Opcode Fuzzy Hash: ac0544086cf5bef0a3a7e7647e350e937d75641a90ccf9a4dd159b67ba3d08bd
                              • Instruction Fuzzy Hash: 7C31757392878181E720CF65E44026AB361FBD97F4F205365FAAC836A9DF7DD5818B40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo$_local_unwind
                              • String ID:
                              • API String ID: 1677304287-0
                              • Opcode ID: bf7ff17dcb7492c4667a4e3f85a5f987f8021e196c42520ea16941355517f9df
                              • Instruction ID: 7c1f9625270b34ce9a33a919fcda1b2f3f0a88a0f279c4383e2059c1b05102f4
                              • Opcode Fuzzy Hash: bf7ff17dcb7492c4667a4e3f85a5f987f8021e196c42520ea16941355517f9df
                              • Instruction Fuzzy Hash: 0E21AC33A3964681EE54DF14E8511B92361EB95BA5F4401BAF60EC73B6EE3DE114CF00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: bfbf7a769ea2a317111fb1415386c847ea7650cfabc1f9c9b6c6499fcc250df6
                              • Instruction ID: 69f3b76f0d75ff4ef81793d7de9fa799935c5c428bc5aa0f0e48685616bc7b37
                              • Opcode Fuzzy Hash: bfbf7a769ea2a317111fb1415386c847ea7650cfabc1f9c9b6c6499fcc250df6
                              • Instruction Fuzzy Hash: BC218663E2CB8581EE508F25E48136AA761FBD57E4F505231EA9DC3AA9DF2CD484CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Info$User
                              • String ID:
                              • API String ID: 2017065092-0
                              • Opcode ID: 13d6c8570dd485256c110f571c40c9a01fa7513018fe1e8d2ffc8141344c43e0
                              • Instruction ID: 952a7c25b92767dcb4436183328efbf5e8afa6e40de1cf614e2b660c468e4abb
                              • Opcode Fuzzy Hash: 13d6c8570dd485256c110f571c40c9a01fa7513018fe1e8d2ffc8141344c43e0
                              • Instruction Fuzzy Hash: EB118B33A28B8586D7108F62E45465EB361FB94B88F045234EB8993B69DF7CE5508B84
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: ios_base::badbit set
                              • API String ID: 3668304517-3882152299
                              • Opcode ID: bee812225db2d635c5fa52296bcce2e8811ad68f616f17cba62308d4dc3910fd
                              • Instruction ID: ff316d426f5f1010252d0f58664f0636bfa849c17d7173a12ccda80a8beb608e
                              • Opcode Fuzzy Hash: bee812225db2d635c5fa52296bcce2e8811ad68f616f17cba62308d4dc3910fd
                              • Instruction Fuzzy Hash: 9361E123F28A818AFB118FB9E4003FC7371AF55768F045274DF8DA2AA5DF38A5958744
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3c2fc93069d0735478807502c6a8eb0f7dfdae4299f655f81443917c4c6b024a
                              • Instruction ID: 6359a3f89716c61db2b19aa3dee8dfcf383eaf37f7292d47d095a7d4901a9497
                              • Opcode Fuzzy Hash: 3c2fc93069d0735478807502c6a8eb0f7dfdae4299f655f81443917c4c6b024a
                              • Instruction Fuzzy Hash: 5BA18373A18B8186EB10CF29D8443AD77A0F785BA8F589135EA4D877A9DF7CD881C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: 647f2119a84eef7fd1010834c12802ef46582b2c4f8f77b629fd762cdfa26d47
                              • Instruction ID: b85d99aa42d0ab7b34310d9a18c8c37e6376d2de4eea2d89e9c46a9528346ed0
                              • Opcode Fuzzy Hash: 647f2119a84eef7fd1010834c12802ef46582b2c4f8f77b629fd762cdfa26d47
                              • Instruction Fuzzy Hash: AE61AD63B28BA581ED14CF16A41427AA355FB44BF4F548635EEAD87BE9CE3CE491C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: e57078d7786f0b54e02f67a913ce752761ea8653fe71ddcff7226ea5521429c1
                              • Instruction ID: 3e28919277add3642f822442fb51550ac7ef188fe2a1860ecbc92c1e58e4361e
                              • Opcode Fuzzy Hash: e57078d7786f0b54e02f67a913ce752761ea8653fe71ddcff7226ea5521429c1
                              • Instruction Fuzzy Hash: 3F61CE23B3968184EE24CE1AC01427D6761EB05FA4F548679CEADCB7E2DF3CE4818701
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$CloseOpen
                              • String ID:
                              • API String ID: 3087652857-0
                              • Opcode ID: 9cac156f850a5e9580aa35b7c7e3dbf63f5e9e4ede002a32ebca26308ef9dd88
                              • Instruction ID: 9c441a051a9ac96fbbd4670d596f556a91334dc914b719820e8b6c7e5322c5aa
                              • Opcode Fuzzy Hash: 9cac156f850a5e9580aa35b7c7e3dbf63f5e9e4ede002a32ebca26308ef9dd88
                              • Instruction Fuzzy Hash: E571A233A28BC585EB10CF65E4403AD77A2F7857A8F504261EA9C97BA9DF7CD580CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: 7b0652754b0399f71cbca4179e54aea714a58894d5f66d01874737d9fc442da8
                              • Instruction ID: 4d218dbe79913a37f87ab8eb2d3abd966cdd66ae871882f124f4a125b03ef96b
                              • Opcode Fuzzy Hash: 7b0652754b0399f71cbca4179e54aea714a58894d5f66d01874737d9fc442da8
                              • Instruction Fuzzy Hash: A5515633B18B5685EF158F2AD45426C73A2FB48FA8F944272EE1D873A9DE38D491C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: InformationVolume__std_fs_get_current_path_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3375085511-0
                              • Opcode ID: 39ebbe3971e4808ab3192d23f6c3ed1521155418b648f898ad4ea1bf5430e487
                              • Instruction ID: 600b5df8835f91af8ac45b82e653867a3247f9e5f1156fe0fe33855cb11220a8
                              • Opcode Fuzzy Hash: 39ebbe3971e4808ab3192d23f6c3ed1521155418b648f898ad4ea1bf5430e487
                              • Instruction Fuzzy Hash: 45714E33A28B9189EB10CF74E8802ED7774FB84758F504226EA8D93B69EF78D595C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: 6703d7483f92450a1a67d8dd1c7aba1679349bc5d410218413b15373f03d61e0
                              • Instruction ID: ab7a0cd79325f834ee2a76a4070fdefdb464945b17ebff7ac05bd68b1285407e
                              • Opcode Fuzzy Hash: 6703d7483f92450a1a67d8dd1c7aba1679349bc5d410218413b15373f03d61e0
                              • Instruction Fuzzy Hash: 5841E123B2969181EE209F16E1402BAA356FB04BE4F540671EFADC77E9DE3DD040C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: __std_fs_directory_iterator_open
                              • String ID:
                              • API String ID: 4007087469-0
                              • Opcode ID: 384626957ede6438cac394f4032ba4f712b942acf186d6e7428bc4e3685138be
                              • Instruction ID: e5f9bd03eb7cfb6057b4c68e70dc31195d4694982ed46011c30a10ba90c95972
                              • Opcode Fuzzy Hash: 384626957ede6438cac394f4032ba4f712b942acf186d6e7428bc4e3685138be
                              • Instruction Fuzzy Hash: A841CF63A2874281EA209F29E5402B96261EB957B4F144375EF6CC37F9EF3CE586C710
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: c84bd85506a39b541427b90818548adb0f13ee535e09f099231ef443adf89cdf
                              • Instruction ID: 9faa0d5ad1d02d066c851d1d316a93516ea42ec6f3b2f5cf0a986e6afd767672
                              • Opcode Fuzzy Hash: c84bd85506a39b541427b90818548adb0f13ee535e09f099231ef443adf89cdf
                              • Instruction Fuzzy Hash: DD31F163728B9582ED24DF66A4041BAA351FB44BF4F504A35EEADC7BE9CE3CE4418300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 663876e353fde44ef4518f71a861adaf855929f5345926a9478de678d3eb2b79
                              • Instruction ID: d3fc4a44b49e931ffc3b20f94fb5b9c1a91fd967d224e6a92ab3a0426548d286
                              • Opcode Fuzzy Hash: 663876e353fde44ef4518f71a861adaf855929f5345926a9478de678d3eb2b79
                              • Instruction Fuzzy Hash: 6A31D72372975141EE149F16E2041B86252EF44BF4F580671FA6D8B7E9DF3CE0908300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: 0b644b4600dd2a1a0ac3acf77c50451acd9f612592f9345b7be626f2c60d2298
                              • Instruction ID: 5c5372401936c6378b547c939ac46da1f5db55279ab89e746e99a6d5371013dc
                              • Opcode Fuzzy Hash: 0b644b4600dd2a1a0ac3acf77c50451acd9f612592f9345b7be626f2c60d2298
                              • Instruction Fuzzy Hash: 2441A563A28AC682EA109F69E44536EA751FB857B4F500375E6ACC67F9DF3CD080CB04
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: af3ab77b95a207a6a7b4c385d7872f9712e67ee6787c3c9d51907d8c9c81837d
                              • Instruction ID: e322b46ab8bc6b5a035b0c99aee4b46c0580a3217fcc68ef440d325a87f99381
                              • Opcode Fuzzy Hash: af3ab77b95a207a6a7b4c385d7872f9712e67ee6787c3c9d51907d8c9c81837d
                              • Instruction Fuzzy Hash: 5021C023B29A5145EE18DF15A6002B92251AF44BF4F244771EA3D837E6FE7CD4D28340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: 6aa293e3c0ad5da22062a4d317702fa56bd888e78d6c5539912e0d6b999e3137
                              • Instruction ID: 3cf268899bb7de452301bd6b9f33f574ed4f9ed54fb78d783f043675f17aced2
                              • Opcode Fuzzy Hash: 6aa293e3c0ad5da22062a4d317702fa56bd888e78d6c5539912e0d6b999e3137
                              • Instruction Fuzzy Hash: 4B21D123B2A66644FE1E9F25D11537912429F00FF4F5406B4EA2EC7BEADE7CE4818304
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: CloseCreateCredEnumerateFirstHandleMutexProcess32ReleaseSnapshotToolhelp32recv
                              • String ID:
                              • API String ID: 420082584-0
                              • Opcode ID: 8f2d8c6a76ebedf1a7dda879b56b5b04b6050b161a7d620b4f1764e63ea951d9
                              • Instruction ID: 67c43c4e44b1425dcf2bbc232e856de4637b7b99ac2ac8899810b1110d830ea9
                              • Opcode Fuzzy Hash: 8f2d8c6a76ebedf1a7dda879b56b5b04b6050b161a7d620b4f1764e63ea951d9
                              • Instruction Fuzzy Hash: 5421AF63E3CA8281FA11BFB5A5062FD5310AF857B9F5406B0EA5DC26F79E2CF440C611
                              APIs
                              • SetFilePointerEx.KERNEL32(?,?,?,?,?,00007FF67A406A18,?,?,?,?,?,?,?,00007FF67A406B6D), ref: 00007FF67A406AC4
                              • GetLastError.KERNEL32(?,?,?,?,?,00007FF67A406A18,?,?,?,?,?,?,?,00007FF67A406B6D), ref: 00007FF67A406ACE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: 558e61541b40b1db2d94306fe445127bdb7d9f4201fb97becbd1ea20618c89ce
                              • Instruction ID: 82e8531037059d2dafef05aa946130cebbb7e29f72e957eb6f7899ed27002016
                              • Opcode Fuzzy Hash: 558e61541b40b1db2d94306fe445127bdb7d9f4201fb97becbd1ea20618c89ce
                              • Instruction Fuzzy Hash: 6711C162738A8181DA109B26A80406AA761AB55BF4F5483B1EE7E877EDCFBDD0509740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                              • String ID:
                              • API String ID: 1173176844-0
                              • Opcode ID: 9b26ece190ddfef467b4df6d1441cacb056fd69bbf8aa7748d5518b3e61eb427
                              • Instruction ID: 6bf5ef752f3c71d9c2e3ed678b3fdc4bcd0f586cfb973a7b68b705e608fa99ac
                              • Opcode Fuzzy Hash: 9b26ece190ddfef467b4df6d1441cacb056fd69bbf8aa7748d5518b3e61eb427
                              • Instruction Fuzzy Hash: A9E08C02F3910700FC28316B84150F502400F59375E2C0BF0E93EC42EAADAEA0614321
                              APIs
                              • RtlFreeHeap.NTDLL(?,?,?,00007FF67A40E5C2,?,?,?,00007FF67A40E93F,?,?,00000000,00007FF67A40C67C,?,?,?,00007FF67A40C5AF), ref: 00007FF67A40446A
                              • GetLastError.KERNEL32(?,?,?,00007FF67A40E5C2,?,?,?,00007FF67A40E93F,?,?,00000000,00007FF67A40C67C,?,?,?,00007FF67A40C5AF), ref: 00007FF67A404474
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 485612231-0
                              • Opcode ID: 2ec01da6e00d8dba875950f448c3bd01e8b433f0394c9c223fce95592ce8bd56
                              • Instruction ID: b2c50dedb2229d68e4ddc6231ab5c659c9c43cef892c047a7718249f864dcf20
                              • Opcode Fuzzy Hash: 2ec01da6e00d8dba875950f448c3bd01e8b433f0394c9c223fce95592ce8bd56
                              • Instruction Fuzzy Hash: 7EE08C53F3A60342FF086FF3984907922519F94791F1444B8CE1ED6279EE2D684A5710
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: fc634be891fac8d8a02407564c46de64da184d1b12253a1e9a8f450d41f42fe1
                              • Instruction ID: 71a7e8c40e1bdafc4c2cbe7075fb785bfa3e5371445c3910b6a5f1ed940b5886
                              • Opcode Fuzzy Hash: fc634be891fac8d8a02407564c46de64da184d1b12253a1e9a8f450d41f42fe1
                              • Instruction Fuzzy Hash: 30B19C37F28A6184EB14CF65E5442AD6762FB04BA8F054176EF5EA7BA9CF3CD4908340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: 964edde025d73b37a7090f4428b04f5379783d1770711d49adbb065a59c038aa
                              • Instruction ID: 597495a55a2acf9b01d2686ad0880e0489501aa955f6cf00d4273682ddda0cff
                              • Opcode Fuzzy Hash: 964edde025d73b37a7090f4428b04f5379783d1770711d49adbb065a59c038aa
                              • Instruction Fuzzy Hash: 7FB16C33614A51CADB248F39D0902AC73A2FB48B68F445672EA6E87FA9DF3DD554C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: db0bd8a1e73a62c664ab3ffa3c1e477a4247943e4680293c034fd14a9f2f8219
                              • Instruction ID: 0f89dadf622b74481c7225ac8abb35ed307339258f1e9b047c98a2320e54bde8
                              • Opcode Fuzzy Hash: db0bd8a1e73a62c664ab3ffa3c1e477a4247943e4680293c034fd14a9f2f8219
                              • Instruction Fuzzy Hash: 75919223E28BC585F711CB78E4403AD67A0FB997A8F145365EADC92AA9DF7CD180C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: 9e03cc759f24d11102b15f23c8107da48b154919f49b66d4715d2663590a1902
                              • Instruction ID: 42ed980e0db83eaa75373eed22c9d3967815ffade50132e9667fe535fa956a50
                              • Opcode Fuzzy Hash: 9e03cc759f24d11102b15f23c8107da48b154919f49b66d4715d2663590a1902
                              • Instruction Fuzzy Hash: 5341B533A3820147EA34DB1A954027A73A0EBA5B54F1001B5DB8EC77E9CF7EE442DB50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: 7cbe5bb23c5416ec12b349e903e9e84600306d0444772b0e1196c5b5ab3eb6cc
                              • Instruction ID: a70ad52756be1ac3326ee0980af9f3aa0e68d269f94313828dcd2e249df16348
                              • Opcode Fuzzy Hash: 7cbe5bb23c5416ec12b349e903e9e84600306d0444772b0e1196c5b5ab3eb6cc
                              • Instruction Fuzzy Hash: A0414933B25F488DEB008FB9D4413AC73B6E74879CF004624EE9CA6B99EF3481648394
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task
                              • String ID:
                              • API String ID: 118556049-0
                              • Opcode ID: 04c3f97f92dc1ef7c3056213d1fd72729a4651799a7fcf362dfb16104cf71f7d
                              • Instruction ID: 8e43a821737260a1723bed1bb910f8cb759e606085f3ddfcc7ec46c360da8a27
                              • Opcode Fuzzy Hash: 04c3f97f92dc1ef7c3056213d1fd72729a4651799a7fcf362dfb16104cf71f7d
                              • Instruction Fuzzy Hash: 114127B3A18B41C6DB14CF16E480169B7B0F798F95B15866AEB8D83364DF38D8A0C754
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: f8a09153dc28454014ad16fa4410b2a8e400d7f5b281336c33c9fc96a651bd4e
                              • Instruction ID: f3e24e6ecd22c405c3d1a18a31472fcbbe17fcaf0ae93e2c9adbe101671d3b7f
                              • Opcode Fuzzy Hash: f8a09153dc28454014ad16fa4410b2a8e400d7f5b281336c33c9fc96a651bd4e
                              • Instruction Fuzzy Hash: 11313133B3820299FA506F02884137D7651AF90BA4F5102F9EA0E833F6DFBDA4419711
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: aa1cae949020b460122b86b20bfad32905152ffd6daa8965ec12828f056d1577
                              • Instruction ID: 89565c6da72e7b098cecf50283b48e330ec2d9b42dbf7b0239ac02554276f25f
                              • Opcode Fuzzy Hash: aa1cae949020b460122b86b20bfad32905152ffd6daa8965ec12828f056d1577
                              • Instruction Fuzzy Hash: 3411E677715B4986DF058FAED09426C3362EB88FA9B518066DF4D87368DF39C890C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: d449f7bd6633de8b8bd08ff16019e33518f74ffb8b7583db2479c3fafe75e578
                              • Instruction ID: dbc265f01d5c2e6aff92c9cb74714a83a9db6840dee34fb2ff9fde51b4ae0c15
                              • Opcode Fuzzy Hash: d449f7bd6633de8b8bd08ff16019e33518f74ffb8b7583db2479c3fafe75e578
                              • Instruction Fuzzy Hash: E621A73362864186DB65CF19D44037976B0EB85B95F544274EA5DC76EEDF3EE8018B00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: 071eab0d2ddb6d97d7b7232e2de0088f1d155ba52ad6f2216ba9fc5c62e5c193
                              • Instruction ID: 8d56af68a4d6c000b9da599c06f122f55461eb55d791c0f7715f131b2ddb6212
                              • Opcode Fuzzy Hash: 071eab0d2ddb6d97d7b7232e2de0088f1d155ba52ad6f2216ba9fc5c62e5c193
                              • Instruction Fuzzy Hash: 8911A527A3C642C2EA609F52D4021BDA2A0AF85B84F4444B5EE4CC76AADF3EE8114B44
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: send
                              • String ID:
                              • API String ID: 2809346765-0
                              • Opcode ID: 96e4cb0db8931e5393824d0ecfe825f058e215f5b5777a5c71bbd2f46533e8b7
                              • Instruction ID: 91bc147f6cdf14b509fbc8e1f29ab7adeb8c417fea0dab1d306e388efb9273e6
                              • Opcode Fuzzy Hash: 96e4cb0db8931e5393824d0ecfe825f058e215f5b5777a5c71bbd2f46533e8b7
                              • Instruction Fuzzy Hash: 0301A222B2CA8581EB508F27F940129A3A0FB8CFE4F485170EF5D83B58EF29D8418B40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: FileFindNext
                              • String ID:
                              • API String ID: 2029273394-0
                              • Opcode ID: 9cd3b2291a3f23570049eab3fc1e6fef5472ba74db640f5840e90f60f9558740
                              • Instruction ID: 74165cf4b5dcb2e43e868f202d2257481392ca671ca3f660c0f53fbbd6e0ec47
                              • Opcode Fuzzy Hash: 9cd3b2291a3f23570049eab3fc1e6fef5472ba74db640f5840e90f60f9558740
                              • Instruction Fuzzy Hash: A901FF27618A8181DA70CF56F4542AAA364FB88B95F404072DE8DD3B69DF3DD8468F00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: e3199247b15e626e1ff80a5878ee6ff274038b46c14856a595a092b0a0f0e46b
                              • Instruction ID: 8c461631a8c5d122826d1367cd4a428406722b248ec46442231fc387860ab1e5
                              • Opcode Fuzzy Hash: e3199247b15e626e1ff80a5878ee6ff274038b46c14856a595a092b0a0f0e46b
                              • Instruction Fuzzy Hash: 66E02B33A3960241EB646F79958107C72905F247B0F104775F63CC22E9CF289C504E00
                              APIs
                              • FindNextFileW.KERNELBASE(?,?,?,?,00007FF67A38FD7B,?,?,?,?,00000000,00000000,FFFFFFFF,?,?,00007FF67A3A3F5F), ref: 00007FF67A41C04C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: FileFindNext
                              • String ID:
                              • API String ID: 2029273394-0
                              • Opcode ID: 90da3352575779015bf82052fd36c7aa4f0d5469104e151cce640f4290d1ac4f
                              • Instruction ID: d10a70b55467799370ecbcede503c10e4d6cee33d974d006039dfe8a8fc593c7
                              • Opcode Fuzzy Hash: 90da3352575779015bf82052fd36c7aa4f0d5469104e151cce640f4290d1ac4f
                              • Instruction Fuzzy Hash: 35C09B16F79903C2E65417B35D8213151E07F55701F50C4B1C15CD0174DF1DA1F74711
                              APIs
                              • GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,00007FF67A3EA118), ref: 00007FF67A41DB79
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: InfoNativeSystem
                              • String ID:
                              • API String ID: 1721193555-0
                              • Opcode ID: 9a96f232a94608228943c1438b0803d9c53371bfd202436300ffcab614f7d4f0
                              • Instruction ID: daf30774e94d20fafdb55e5c951fcd9d82a3fb44fce6fd190dc3e87df19aa717
                              • Opcode Fuzzy Hash: 9a96f232a94608228943c1438b0803d9c53371bfd202436300ffcab614f7d4f0
                              • Instruction Fuzzy Hash: D9B09B26A249C0D3C511EB14D8410157331F794709FD00050D28D41624DE2DD5158F00
                              APIs
                              • HeapAlloc.KERNEL32(?,?,?,00007FF67A4171A3,?,?,?,?,?,?,?,?,0000000100000000,00007FF67A41CE65), ref: 00007FF67A406E32
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: AllocHeap
                              • String ID:
                              • API String ID: 4292702814-0
                              • Opcode ID: c374065ae54e37142203b7ce4bf8e8709c0fa599dd5bee20d3e6af25bcd0fdcb
                              • Instruction ID: 97068b1d64fa64edeacca6355eee81ca57e91ae05a32d449fcb45f9131c52317
                              • Opcode Fuzzy Hash: c374065ae54e37142203b7ce4bf8e8709c0fa599dd5bee20d3e6af25bcd0fdcb
                              • Instruction Fuzzy Hash: 8FF0BE13F3D30740FA942A63980527692814F947A0F084AF0ED2FC52E9EEAEE4416751
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$ExceptionFileHeaderRaise__std_exception_copy
                              • String ID: "$#base$#include$*$/$No closed word$Unexpected eof$conditional not closed$key declared, but no value$key opened, but never closed$object is not closed with '}'$quote was opened but not closed.$unexpected '}'$unexpected key without object$word wasnt properly ended
                              • API String ID: 1861853482-2258937249
                              • Opcode ID: c7ea62ee023bda5483a05b33829794a688d97cf37c36a587353b2f6601147d13
                              • Instruction ID: b4545af252510c17ba0cb0c7a6c59004df031504500de246a66624dac5ce7634
                              • Opcode Fuzzy Hash: c7ea62ee023bda5483a05b33829794a688d97cf37c36a587353b2f6601147d13
                              • Instruction Fuzzy Hash: 20E28F33A28BD685EF608F25D8443F92762FB447A8F544572EA4DCBAA9DF78D185C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                              • String ID: "$#base$#include$No closed word$key declared, but no value$key opened, but never closed$quote was opened but not closed.$unexpected '}'$unexpected key without object$word wasnt properly ended
                              • API String ID: 3936042273-2543107223
                              • Opcode ID: 27c125338b1e291dff05108e22ab0259c3e6de5834d986b61c0233ced3d33b89
                              • Instruction ID: e404914cb47fb3cc7710a96179c9dd366df8900019885e8d44b0a7bf58a57a53
                              • Opcode Fuzzy Hash: 27c125338b1e291dff05108e22ab0259c3e6de5834d986b61c0233ced3d33b89
                              • Instruction Fuzzy Hash: 73A2A063A29BC6C5EB608F25C8403FD2762FB457A8F445272DA4DCBAA9DF78D585C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$__std_fs_convert_wide_to_narrow
                              • String ID: !$content$filename$status$users
                              • API String ID: 1223724100-3795777748
                              • Opcode ID: 7e816ec9e8569474a41fc60701ba5f12f1ec58b71a6479551b8b428b4167c649
                              • Instruction ID: ef64ffc08dcd1683607b6d8f626338d0d1f26d81aa70a1b3868a951dd4284da8
                              • Opcode Fuzzy Hash: 7e816ec9e8569474a41fc60701ba5f12f1ec58b71a6479551b8b428b4167c649
                              • Instruction Fuzzy Hash: F6B28463A25BC589EB21DF34D8403ED2365FB457A8F405271EA9DCBAA9EF78D641C300
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: Software$exists
                              • API String ID: 0-2364128853
                              • Opcode ID: ab1f34c6eabb8e6b4357a6be38fa35660b2f85d5e605683310524eaab521cea2
                              • Instruction ID: 2641ea74a38861b9e84703f9fec4bf0551beccb3cd0858d9d154567cd1c0fd2b
                              • Opcode Fuzzy Hash: ab1f34c6eabb8e6b4357a6be38fa35660b2f85d5e605683310524eaab521cea2
                              • Instruction Fuzzy Hash: 1FE28173A24BC589EB208F29D9843ED7364FB857A8F105221EB5C97BA9DF78D580C740
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID: BOOTNXT$autorun.inf$boot.ini$boot.sdi$bootfont.bin$bootmgfw.efi$bootmgr$bootsect.bak$bootstat.dat$d3d9caps.dat$desktop.ini$gdipfontcachev1.dat$iconcache.db$indexervolumeguid$mib.bin$ntldr$ntuser.dat$ntuser.dat.log$ntuser.ini$reagent.xml$thumbs.db$winre.wim$winsipolicy.p7b$wpsettings.dat
                              • API String ID: 73155330-850610325
                              • Opcode ID: b815a531361c7f9514bfba62c325ecb5df87e29bcbffc5f06317a13bf243767b
                              • Instruction ID: 797a3b2cea8fec2856cb883b39e5433a96d68f9dee283ea14784fe66256ee5eb
                              • Opcode Fuzzy Hash: b815a531361c7f9514bfba62c325ecb5df87e29bcbffc5f06317a13bf243767b
                              • Instruction Fuzzy Hash: 04C13453D74FCA84E711DF35C8813F55361BBEA388F606326E948A586AEF68B6C4C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: lstrcpy$lstrcat$AllocateInitLockMemoryObjectStringUnicodeVirtual$AcquireEnumerateFolderFreeInitializeKnownLoadedModulesPathReleaseTaskUninitialize_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 2979746431-0
                              • Opcode ID: 470d3dfc7b9750618d423cd4540c8fa8ed8d435e855b8fca27854b27f60d9312
                              • Instruction ID: e316234e5309d96a27107152bfb27438843589614a48f8e8ae49c67e435ff74e
                              • Opcode Fuzzy Hash: 470d3dfc7b9750618d423cd4540c8fa8ed8d435e855b8fca27854b27f60d9312
                              • Instruction Fuzzy Hash: 1DD2873662AFC58AD7918F69E88169EB3B4F788788F105225EECD57B18EF38C154C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: content$directory_iterator::directory_iterator$exists$filename$files$key
                              • API String ID: 3668304517-2980817763
                              • Opcode ID: 8808fe76fe11be17fede2411d256a0c1c8621fc4363a651c91913278584ab810
                              • Instruction ID: 580028a8c62444c1ded86e1f1dd3d34a1eb140350a416d30df24106b0c7611fc
                              • Opcode Fuzzy Hash: 8808fe76fe11be17fede2411d256a0c1c8621fc4363a651c91913278584ab810
                              • Instruction Fuzzy Hash: 65A26173A19BC589DB218F24D8803ED7365FB457A8F505325EA9C8BBA9DF78D284C700
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: content$directory_iterator::directory_iterator$exists$filename$status
                              • API String ID: 0-3429737954
                              • Opcode ID: e2231abf9e6750d7fa4b60caa1b050a200a47e40475597661d0923c48db29045
                              • Instruction ID: 0e31da2aa3b2e5922b469c1fbfcba1521da37f92a6f54810d151c4feebdab9c0
                              • Opcode Fuzzy Hash: e2231abf9e6750d7fa4b60caa1b050a200a47e40475597661d0923c48db29045
                              • Instruction Fuzzy Hash: AE829323A25BC689EB209F75D8843ED2361FB857A8F445271EA4DD7BA9DF38D641C300
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID: #recycle$$recycle.bin$$windows.~bt$$windows.~ws$$winreagent$All users$AppData$Application Data$Boot$PerfLogs$Program Files$Program Files (x86)$ProgramData$System Volume Information$Windows$Windows.old$Windows.~bt$bootmgr$config.msi$ntldr
                              • API String ID: 73155330-2722463023
                              • Opcode ID: 09db10df498b887c42b6ddd2bb1ccb86b1b81dbdf6e64d0b75542c00bd61434b
                              • Instruction ID: 65aa9aa803483816232a45c4857e01a55ddde80124cafc1a1129bcead89a8718
                              • Opcode Fuzzy Hash: 09db10df498b887c42b6ddd2bb1ccb86b1b81dbdf6e64d0b75542c00bd61434b
                              • Instruction Fuzzy Hash: E5A14653D74BCA44E711DF35C8823F55361BBEA388F606326E54CA186AEF68B6C5C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 808467561-2761157908
                              • Opcode ID: d3ac3c9e6f2a3cc9299820455b8d5a62efe305f74d449836c4ee372b45885f05
                              • Instruction ID: 6b9d2768a0cc266250f968fc5b7f0e7994eb3ae998ade39ab8f812dd09ff9008
                              • Opcode Fuzzy Hash: d3ac3c9e6f2a3cc9299820455b8d5a62efe305f74d449836c4ee372b45885f05
                              • Instruction Fuzzy Hash: 83B2D773A282828BE7648F6AD4407FD77B1FB44788F505179DA09D7AACDF3AA510CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: or more] $[default: $[nargs: $[nargs=$[required]
                              • API String ID: 3668304517-2670406794
                              • Opcode ID: f3164cb6f8f4669c550a80faf72dde7c9d51d7f03de8c29346bc794460403ad6
                              • Instruction ID: 4968b3855b89ba1abbc8c257767a8937d6fa777b78f63271a3c4b806a9730685
                              • Opcode Fuzzy Hash: f3164cb6f8f4669c550a80faf72dde7c9d51d7f03de8c29346bc794460403ad6
                              • Instruction Fuzzy Hash: 3B529163A28B8181FB14CF69E4442AD6761FB857A4F6046B6EA5DC37E9DF3CE080C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: content$directory_iterator::directory_iterator$exists$filename
                              • API String ID: 3668304517-1400943384
                              • Opcode ID: fb29027cbcfc176c16ecb449572523415ce074717b5e89282a4012ca1ef7e868
                              • Instruction ID: a450bd4d7ff2b441c16bd67d3b82eb6aeee7bb8bca9d291bfe426ab2f0bc22ef
                              • Opcode Fuzzy Hash: fb29027cbcfc176c16ecb449572523415ce074717b5e89282a4012ca1ef7e868
                              • Instruction Fuzzy Hash: 0252A873625BC589EB20CF25D8403ED73A1FB897A8F505225DA9C97BA9DF78D680C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_destroy
                              • String ID: value
                              • API String ID: 1346393832-494360628
                              • Opcode ID: c4f955665f49c842b5d129d8127569334b04b417095e30994275b775f98a0e06
                              • Instruction ID: b699b6ff2133257fd44d730ba2a3e8154f89699ebeb699ea49c1b8c6fb0844b6
                              • Opcode Fuzzy Hash: c4f955665f49c842b5d129d8127569334b04b417095e30994275b775f98a0e06
                              • Instruction Fuzzy Hash: 7F02A223A28BD185EB00CF79D8402BD6761EB857A4F505372FA9D92AEADF6CD185C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: lstrcatlstrcpy$Object$AcquireAllocateInitializeLockMemoryUninitializeVirtual
                              • String ID:
                              • API String ID: 3636535045-0
                              • Opcode ID: b7bfeffe4e490a9624e5010149ae55799967800886d82e80360165d1231289cd
                              • Instruction ID: 70fd205f27c9ed10300cd9f87eb19a06300286c8da78def5c731930e58028b9a
                              • Opcode Fuzzy Hash: b7bfeffe4e490a9624e5010149ae55799967800886d82e80360165d1231289cd
                              • Instruction Fuzzy Hash: 3CB2673652AFC58AD7A18F29E88169AB3A4F789B84F105215FFCD57F18EF38C2548740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                              • String ID: --help$--version$prints version information and exits$shows help message and exits
                              • API String ID: 3936042273-1172229024
                              • Opcode ID: 5f58f7e40627627a6a2a95d0060da266843323e37e75f24a8559d961539eb37c
                              • Instruction ID: e1ce10659cc6c0bca321847140a485899faa1719bf284f20fd06fd62c4fbd4f2
                              • Opcode Fuzzy Hash: 5f58f7e40627627a6a2a95d0060da266843323e37e75f24a8559d961539eb37c
                              • Instruction Fuzzy Hash: CE22AA33A28B81C5E710CF24E4407AD73A4FB98798F649236DA8C93769EF79D1A5C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ExecuteFileModuleNameShell
                              • String ID: --type
                              • API String ID: 3435646932-2654721227
                              • Opcode ID: e007e293bcbd1e18ae45f006441b6335a5ba7266a3a47bfeac8c5918e6b39eba
                              • Instruction ID: 9d92b4c4d1d28ab74f5952f548476d2e853420ce890030deed3cac7010cda79c
                              • Opcode Fuzzy Hash: e007e293bcbd1e18ae45f006441b6335a5ba7266a3a47bfeac8c5918e6b39eba
                              • Instruction Fuzzy Hash: B4221A33A29FC486DB408F29E8816ADB3A4F788798F505225FE9D57B68EF78D150C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ErrorLastNameTranslate$CodePageValidValue
                              • String ID: utf8
                              • API String ID: 1791977518-905460609
                              • Opcode ID: 75fc4a7c8dd77050ccf508e81fcf101ab10c97c00b882e20efad90d3381ba567
                              • Instruction ID: e1fc361e7568e3b09b0e021c177e94d7d124f579c4f7a4a41323f53820ecc4c8
                              • Opcode Fuzzy Hash: 75fc4a7c8dd77050ccf508e81fcf101ab10c97c00b882e20efad90d3381ba567
                              • Instruction Fuzzy Hash: D2917B33A3874285EB249F63D4812BA33A4EB64B80F4441B1DA4DC77AAEF3EE551D741
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                              • String ID:
                              • API String ID: 2591520935-0
                              • Opcode ID: e3a05af4ba6670b971f6ec394c6969138c7dcc59e88584d7c61c9146e292b8e6
                              • Instruction ID: bbd98f497f596c96c7b5c43a30ebf64b72c2337751ac205ecbdbbd0d283caabc
                              • Opcode Fuzzy Hash: e3a05af4ba6670b971f6ec394c6969138c7dcc59e88584d7c61c9146e292b8e6
                              • Instruction Fuzzy Hash: 1A719D23B286068AFB509B62E4542BD33B0BF84744F6440B6CA5DD77A9EF3EE955C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: 35bf856a41f19bc8ee7b8f5e42e7dc75e2a598134c0ac36b1a8c304357de2300
                              • Instruction ID: 74ff8e08f66fabe665391e38dcdf7c40014e666517106c38a043109d8e4978de
                              • Opcode Fuzzy Hash: 35bf856a41f19bc8ee7b8f5e42e7dc75e2a598134c0ac36b1a8c304357de2300
                              • Instruction Fuzzy Hash: 1B318E33628F8186DB60CF25E8402AE73A4FB88759F544176EA8D93BA8DF3DC555CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: memcpy_s
                              • String ID:
                              • API String ID: 1502251526-3916222277
                              • Opcode ID: 1b748593274e8ddd9ac1e908b2a22b3d8043b10f383cd2471e7c6bd1e5b959b4
                              • Instruction ID: 4184e6f80e598a446f63b754fd507d0333d14b427d996aafa29d0443bde9f5c8
                              • Opcode Fuzzy Hash: 1b748593274e8ddd9ac1e908b2a22b3d8043b10f383cd2471e7c6bd1e5b959b4
                              • Instruction Fuzzy Hash: C6C1B273A786868BDB24CF59A088A6AB791FB94794F448139DB4EC3754DE3CE805CF00
                              APIs
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF67A41E333
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: DebugDebuggerErrorLastOutputPresentString
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 389471666-631824599
                              • Opcode ID: dd3e2ca460fa5c1ace79570233ea5db2e1cd5342ccce423e6cc7acf1d21f1517
                              • Instruction ID: 8215658075ce03db53d96193913e09efd427b2fcf099979e15ec43d5fef81f45
                              • Opcode Fuzzy Hash: dd3e2ca460fa5c1ace79570233ea5db2e1cd5342ccce423e6cc7acf1d21f1517
                              • Instruction Fuzzy Hash: BC118833A28B42A3E7048B23E6413B973A4FB04745F448075CB4DC2A68EF3EE4B48710
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: __std_exception_destroy$_invalid_parameter_noinfo_noreturn
                              • String ID: array$object$object key$object separator$value
                              • API String ID: 2506729964-2448007618
                              • Opcode ID: e431f2b2776ee5f1a30440124ce9b7b28fb47f76c39932588eb4869221464a06
                              • Instruction ID: 388933e0a66806b1b824b91ead893e759a19e7443b23d45237ce5855d06361c6
                              • Opcode Fuzzy Hash: e431f2b2776ee5f1a30440124ce9b7b28fb47f76c39932588eb4869221464a06
                              • Instruction Fuzzy Hash: 5F42D423A38A8696FB00DF75C4411FD2321EB91794F406676EA0ED76BAEF6CE185C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Virtual$AllocInfoProtectQuerySystem
                              • String ID:
                              • API String ID: 3562403962-0
                              • Opcode ID: 11b77a7473343ea9f97a82672d96a93015c4d3047c6cf214eae4d55d05e5b63c
                              • Instruction ID: 61febffb0707822caa2c9ad2fe27ce6cc72093f9b617a6a64862644c3990728b
                              • Opcode Fuzzy Hash: 11b77a7473343ea9f97a82672d96a93015c4d3047c6cf214eae4d55d05e5b63c
                              • Instruction Fuzzy Hash: DA314B33724A818EEB10CF36D8447E923A5FB58788F444075DA4E87B68DE3DE645C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: 5214a599837bfdf14c14888f2e92068cf60515bb8fdf26be688366121654f7f3
                              • Instruction ID: a985c4177a1824d462438170dedb81ce74ab34a8028ec1a45f7d700de978d947
                              • Opcode Fuzzy Hash: 5214a599837bfdf14c14888f2e92068cf60515bb8fdf26be688366121654f7f3
                              • Instruction Fuzzy Hash: FE113026B24F0189EB00CF71E8542B833A4F759B59F441E35DA6D867B8EF79D1548340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: %
                              • API String ID: 3668304517-2567322570
                              • Opcode ID: 78ff1c0ba038cc3ab3b58d10f66274e2fef20a22b12b05c7e6c4e15174b0cae6
                              • Instruction ID: 85cc981091cab753fd7a94776061a23abcb15a0759c853e645ca4ac49c017991
                              • Opcode Fuzzy Hash: 78ff1c0ba038cc3ab3b58d10f66274e2fef20a22b12b05c7e6c4e15174b0cae6
                              • Instruction Fuzzy Hash: FD121C23B28A858AFB258FA5E4103FD67A1AB44798F244135EE4DA7BA9DF3CD445C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _get_daylight$_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 1286766494-0
                              • Opcode ID: bd57f40c3e3db77148fe0ffe54f4275cd58e4d53c750776aaf4c012eb2fe935b
                              • Instruction ID: 11876c8482f2f32fdfe3a77b75ecf3033d310034c52036d83d3850b8c60a61aa
                              • Opcode Fuzzy Hash: bd57f40c3e3db77148fe0ffe54f4275cd58e4d53c750776aaf4c012eb2fe935b
                              • Instruction Fuzzy Hash: 9A92BD33A3864286E7248F26945417B37A1FB64784F1481F5DB8E87BA9CF3EE901E714
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: FormatInfoLocaleMessage
                              • String ID: !x-sys-default-locale
                              • API String ID: 4235545615-2729719199
                              • Opcode ID: e03368e1294968a7be98b08cf2acdcb8e5506132744e7f119a71bf8ca3b046b3
                              • Instruction ID: b866f310fc1e94cebb2e83d5fc6093c8d4ab53a147dfc44415d102985dc6ebfa
                              • Opcode Fuzzy Hash: e03368e1294968a7be98b08cf2acdcb8e5506132744e7f119a71bf8ca3b046b3
                              • Instruction Fuzzy Hash: 1D01B173B28B8182E7248B22F4407B9A7A1FB987D5F444175DA8992BACCF3DD405CB00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: 9193ef1a76070ff9094938fc9e26e3b07d864966f927d00ca1d39ba0c7ab48d4
                              • Instruction ID: 90ad688f8f2a0560b2cad28dd9d584e21615fda6e10cd76544093529d1fba9d9
                              • Opcode Fuzzy Hash: 9193ef1a76070ff9094938fc9e26e3b07d864966f927d00ca1d39ba0c7ab48d4
                              • Instruction Fuzzy Hash: 72029D63B29F8685EB10CFA9D0402AD6362EB48BE4F144272DE5D977A9DF38E491C740
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8ed4d05b7ff35b3b56e886d6629c0703e26c40081793b28326e6b7c6c8a6dab9
                              • Instruction ID: aae68af041cb0e9c26b63989d26fddd222f4971fc568855c6aba911915a79558
                              • Opcode Fuzzy Hash: 8ed4d05b7ff35b3b56e886d6629c0703e26c40081793b28326e6b7c6c8a6dab9
                              • Instruction Fuzzy Hash: 9F91CF73B29B8981EE14CF16E5401A963A5FB58BD0F544132EA8ECB768EF3CE552C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: CryptDataFreeLocalUnprotect_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 2610421622-0
                              • Opcode ID: 6e1be380b36d6308e574858bb0b1421ef5b9830db38561ba86a8e01b5bc49d21
                              • Instruction ID: 9cf3f12594a4f145fe406fbc83cfa0401c5863d7c54928eec21b47c4ed2fa07a
                              • Opcode Fuzzy Hash: 6e1be380b36d6308e574858bb0b1421ef5b9830db38561ba86a8e01b5bc49d21
                              • Instruction Fuzzy Hash: 05616C33B24B818AFB10DFB5E4403AD73A1EB5879CF008275EA4D96A99DF78D5A48740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: -
                              • API String ID: 3668304517-2547889144
                              • Opcode ID: f249676934a509c3e643a81391da5fbc4642066ddecaf12384e377dfbebdae82
                              • Instruction ID: 734a6291cf6a660ebaa123f0d0f4b67c21d22cca0a78ac4eb50cf71bf3a1797d
                              • Opcode Fuzzy Hash: f249676934a509c3e643a81391da5fbc4642066ddecaf12384e377dfbebdae82
                              • Instruction Fuzzy Hash: 5D22A123A28B91C6EB10CF25E4402AD77A1FB457A8F604675FE5D97BA9DF38E481C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: InfoLocale
                              • String ID: GetLocaleInfoEx
                              • API String ID: 2299586839-2904428671
                              • Opcode ID: 3e7302eb2a7978fa3031c2e08be01dfce33e44987349fbcc01d6c54447146e53
                              • Instruction ID: 2c247ceff18d6cb665697244d5c11a4b9844e7ec698f27bf7e07099e66af2537
                              • Opcode Fuzzy Hash: 3e7302eb2a7978fa3031c2e08be01dfce33e44987349fbcc01d6c54447146e53
                              • Instruction Fuzzy Hash: 2901A722B2864185E7448B67B4001ABA760EF94BC0F5440B5DE4D97BBDCE3ED5418340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ExceptionRaise_clrfp
                              • String ID:
                              • API String ID: 15204871-0
                              • Opcode ID: b71f1d3c42e610c0face707ee20cd6d6a88a4c4d18c7a9917a4b3c1b6102180a
                              • Instruction ID: 7256bb47396c1293d18901fc59393085936ddd9280a19578712f9df24e215352
                              • Opcode Fuzzy Hash: b71f1d3c42e610c0face707ee20cd6d6a88a4c4d18c7a9917a4b3c1b6102180a
                              • Instruction Fuzzy Hash: 60B17C73624B448BEB55CF2AC98236937E0F794B88F1589A1DA5D837B8CF3AD451D700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task
                              • String ID:
                              • API String ID: 118556049-0
                              • Opcode ID: a10e736733ab78b52f91e159c721946c235020e2f4f5fc1209b4e2fc31c319d0
                              • Instruction ID: b0d9a7e6366fbfc6610212374522e4bab2a15be95bd65bd21aa10132d528e4ce
                              • Opcode Fuzzy Hash: a10e736733ab78b52f91e159c721946c235020e2f4f5fc1209b4e2fc31c319d0
                              • Instruction Fuzzy Hash: EAA18C23A19BA589EB00CF69D8803AC7770F715788F548566DF8D93BA9DF38E091C350
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task
                              • String ID:
                              • API String ID: 118556049-0
                              • Opcode ID: 413d5fab21a9d9f2d5efc64595a1be8cb0e2d9a45e1cdd630bc19ef13d16304d
                              • Instruction ID: 0061ef6c053d5a05fb3b393064fb89bb388d524949405ad2b65377c6a84b35c7
                              • Opcode Fuzzy Hash: 413d5fab21a9d9f2d5efc64595a1be8cb0e2d9a45e1cdd630bc19ef13d16304d
                              • Instruction Fuzzy Hash: 6BA19023A29BA589EB00CFA9D8803AC7771F754798F544566EF8D97BA5DF38E091C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task
                              • String ID:
                              • API String ID: 118556049-0
                              • Opcode ID: c581e8977b33af35039448f8e39aaf5e8cb8f390a98b08808b20f05f175720f5
                              • Instruction ID: a0dbb7cfceb73633d5fae7873d17aabd62ddc58ddc3c31e0b019299f5a6b387e
                              • Opcode Fuzzy Hash: c581e8977b33af35039448f8e39aaf5e8cb8f390a98b08808b20f05f175720f5
                              • Instruction Fuzzy Hash: 35A1AC63B29BA989EB00CFA9D8803AC6770F715788F548566DF8D97BA5DF38D091C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task
                              • String ID:
                              • API String ID: 118556049-0
                              • Opcode ID: d2b7f1040b983b5a6047405a0407e77e46b8456ac83219ed03ba37a61d7b5d0b
                              • Instruction ID: c1f9872a94f9b16ea4a2c393e8f491bb3502ad83071107d873e0a1a7def77e76
                              • Opcode Fuzzy Hash: d2b7f1040b983b5a6047405a0407e77e46b8456ac83219ed03ba37a61d7b5d0b
                              • Instruction Fuzzy Hash: D5A17A63A19BA989EB00CF6AD8803AC7770F715748F648666DF8D97BA5DF38D091C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _get_daylight_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 474895018-0
                              • Opcode ID: c18a0d9b03aae947ae56912f7fbd91862cf6e30b660de31e07dea2fef0df8077
                              • Instruction ID: 043efa6f92a781b21043d9ffe67913984eb793c56b82cebeada062bb7f1961a9
                              • Opcode Fuzzy Hash: c18a0d9b03aae947ae56912f7fbd91862cf6e30b660de31e07dea2fef0df8077
                              • Instruction Fuzzy Hash: 98610923F3869245FBA8CE2B944077D65A19F40764F1402B9DA2DC7AF9DE6EF8448700
                              APIs
                                • Part of subcall function 00007FF67A4010DC: GetLastError.KERNEL32 ref: 00007FF67A4010EB
                                • Part of subcall function 00007FF67A4010DC: FlsGetValue.KERNEL32 ref: 00007FF67A401100
                                • Part of subcall function 00007FF67A4010DC: SetLastError.KERNEL32 ref: 00007FF67A40118B
                              • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF67A4102CF,?,00000000,00000092,?,?,00000000,?,00007FF67A401CC5), ref: 00007FF67A40FB82
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystemValue
                              • String ID:
                              • API String ID: 3029459697-0
                              • Opcode ID: 6bbfa0cfbcb117d0d0bd7b1f47d6fbf85da9e61559fd768ec35dd84706e269b8
                              • Instruction ID: 0b940ae345416f638e6249b9b6114eba40beff23c22eab205165474b36f702f0
                              • Opcode Fuzzy Hash: 6bbfa0cfbcb117d0d0bd7b1f47d6fbf85da9e61559fd768ec35dd84706e269b8
                              • Instruction Fuzzy Hash: E311D563E386458AEB148F26D0906A977E0FBA0BA1F4441B5C699833E8DE3DD5D1DB40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: .
                              • API String ID: 0-248832578
                              • Opcode ID: fb315bc80d0e4220bfa16cea2cebd06dd5b487f5fc83885914d8b253c2bdc7b6
                              • Instruction ID: e2e36dfe2f9eb953b5d47611433c19d359c598b764b47289dafcd0e495f22a8f
                              • Opcode Fuzzy Hash: fb315bc80d0e4220bfa16cea2cebd06dd5b487f5fc83885914d8b253c2bdc7b6
                              • Instruction Fuzzy Hash: 9DC19463A28E86C6EB608F26D4441BD63A2FB497A4F548372DA9DC77A4DF7CD841C304
                              APIs
                                • Part of subcall function 00007FF67A4010DC: GetLastError.KERNEL32 ref: 00007FF67A4010EB
                                • Part of subcall function 00007FF67A4010DC: FlsGetValue.KERNEL32 ref: 00007FF67A401100
                                • Part of subcall function 00007FF67A4010DC: SetLastError.KERNEL32 ref: 00007FF67A40118B
                              • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF67A41028B,?,00000000,00000092,?,?,00000000,?,00007FF67A401CC5), ref: 00007FF67A40FC32
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystemValue
                              • String ID:
                              • API String ID: 3029459697-0
                              • Opcode ID: 20f033303a7f43631ab577e4b8c174f2a0670d8761bb9d685c12eeb3ee4fc0cb
                              • Instruction ID: 7933b5251a0b8fc303851fac7392d197974b71fc8123ab3eecc8e39efe4cdb21
                              • Opcode Fuzzy Hash: 20f033303a7f43631ab577e4b8c174f2a0670d8761bb9d685c12eeb3ee4fc0cb
                              • Instruction Fuzzy Hash: 3401D673E2C28186E7144B17E4807AA72E1FB60BA1F4582B5D669876E8DF6E9481E700
                              APIs
                              • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF67A404FBB,?,?,?,?,?,?,?,?,00000000,00007FF67A40F130), ref: 00007FF67A404BB7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: EnumLocalesSystem
                              • String ID:
                              • API String ID: 2099609381-0
                              • Opcode ID: 91facb745afbc2f4637f145e0eb14d72f4a938eed1d470420a8036ca57912e6f
                              • Instruction ID: 3a1698edfea0a5f77315674770c202fde96d55a1c7b7d5391556e6f9619ef4b1
                              • Opcode Fuzzy Hash: 91facb745afbc2f4637f145e0eb14d72f4a938eed1d470420a8036ca57912e6f
                              • Instruction Fuzzy Hash: A6F01977A28A4182E704DB26F9512AA6371EB99B81F0480B5DA4DC3379DF3DD4519740
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: gfffffff
                              • API String ID: 0-1523873471
                              • Opcode ID: 47307880288f6578f87132817073c4c2bb16437997dd627ef4aa9327bb89f433
                              • Instruction ID: 4e615b1f5379532bc28fa06a4efd3258f63eadb3b32cab4b386163ca19770589
                              • Opcode Fuzzy Hash: 47307880288f6578f87132817073c4c2bb16437997dd627ef4aa9327bb89f433
                              • Instruction Fuzzy Hash: EFA12963B38BC546EB25CB2694407BE7791BB60784F0481B1DE4D877A9DE3EE501DB02
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID: 0-3916222277
                              • Opcode ID: 0e27038ca049793d61ec5ddb93713cae2a321fb0d894cb179eab7f341e6cf820
                              • Instruction ID: 5889eb4b5606aa54d627ab3d96cc5f1791782a9762ec4453dda3eda6a415bcbb
                              • Opcode Fuzzy Hash: 0e27038ca049793d61ec5ddb93713cae2a321fb0d894cb179eab7f341e6cf820
                              • Instruction Fuzzy Hash: 53B16A73A38755C5E7658F2AD45423C3BA0EB09B68F2802BEDE4EC63A5CF29D441CB15
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5c12bc012ad02e285c341da713a39c5a81c563c1883bac74b687ebed5d69bd68
                              • Instruction ID: 86c494f0e91df6f5b5c2383cfc7fb477dda8c136c158ac960e8049b6417d2195
                              • Opcode Fuzzy Hash: 5c12bc012ad02e285c341da713a39c5a81c563c1883bac74b687ebed5d69bd68
                              • Instruction Fuzzy Hash: 98729433A18BC589EB718F25D8403ED77A5F749798F404265EA9C9BBA9DF38D680C700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c5325b933501e752e53b4993b7539b7d02dad47a23dec996b8a144fc4eb4aaf5
                              • Instruction ID: 738cec704029506ef6b0df6e4deb40db1634c599fe66fa9206ab30d1866e10b7
                              • Opcode Fuzzy Hash: c5325b933501e752e53b4993b7539b7d02dad47a23dec996b8a144fc4eb4aaf5
                              • Instruction Fuzzy Hash: 77626E23E39E5686E6538F36B8115356364BF523C4F5183B3E90EE7A78DF2EA4528700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 042c13a15fea5a2a1b7fd401a9e4f90c7abfb219e0802bb1e0a5658ac4d56ca8
                              • Instruction ID: 0695a6346a901bb7aead330e6aa675f58279d918060eb6aa8acfb82ebbc6c05d
                              • Opcode Fuzzy Hash: 042c13a15fea5a2a1b7fd401a9e4f90c7abfb219e0802bb1e0a5658ac4d56ca8
                              • Instruction Fuzzy Hash: A402AF13E28B82C2EB218F25D5802B92351FB55BA8F149275DE5DC76AADF38F6D1C340
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1b7c041a1ddcf11e25cf0bb9e41c031e648fd4e482a102b9d07c79ecb8b8e1b7
                              • Instruction ID: 62faad7b4dc7074ad48f13846cd66cc1a4974ad7a5c3daacb4c4d98f53aed60f
                              • Opcode Fuzzy Hash: 1b7c041a1ddcf11e25cf0bb9e41c031e648fd4e482a102b9d07c79ecb8b8e1b7
                              • Instruction Fuzzy Hash: 9FD19127A39646C6EB648F29804067D27A1FF04B68F24037ADE5DC77E5DF29E842CB41
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 4023145424-0
                              • Opcode ID: 88e75c18b578dfe027ebcec4b74e3b6c1c05ca8ec6d9b2d69b7d7db6122ddb3f
                              • Instruction ID: 0f47d355988f6dec613a171302e93827a59b59167e441f22d6fb1d24c21f477f
                              • Opcode Fuzzy Hash: 88e75c18b578dfe027ebcec4b74e3b6c1c05ca8ec6d9b2d69b7d7db6122ddb3f
                              • Instruction Fuzzy Hash: 5BC1A327A3868285EB609B2794107BF67B0FBA4788F4040B1DE4DC7AADEF3ED5419700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8a50d792f6ea55e1878b4c34ab1188b16c77c7345f1422f6bee4b15fd44da86d
                              • Instruction ID: eb438a44a6fcddb694ab657a25b7432a07b16074a855d38c9ebd6906e70b598f
                              • Opcode Fuzzy Hash: 8a50d792f6ea55e1878b4c34ab1188b16c77c7345f1422f6bee4b15fd44da86d
                              • Instruction Fuzzy Hash: 1602F533915FC48DE7228F39EC512E977A4F799798F105225EB9C6AB19EF349290C340
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5bb6e68f6367ee2887d169ae8d8b9ba2fe82d39e90418e2bd536febdff533256
                              • Instruction ID: a83b6b7d260627f74204cc5a21d3fdc0c52a326aeebf6a94f9077048640a9283
                              • Opcode Fuzzy Hash: 5bb6e68f6367ee2887d169ae8d8b9ba2fe82d39e90418e2bd536febdff533256
                              • Instruction Fuzzy Hash: 05B15973A38B55C5E7A58F29845422C3BA1EB49B68F2402BACA4EC73A5CF29D441DB05
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b94abd17858a29da6604f084abc8ede15cb37ad89f40817780fbb3ade52cfd43
                              • Instruction ID: a86bbf871795deeff051649bf185dfdbd10642c81c88c29639b75243f15025ec
                              • Opcode Fuzzy Hash: b94abd17858a29da6604f084abc8ede15cb37ad89f40817780fbb3ade52cfd43
                              • Instruction Fuzzy Hash: 82917FB76246808BD354CF29E440A4ABBA4F7D8B48F51E615EF8593B14E739DA06CF40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: e8a9fff3f2d525b00164d309c93a27ca122c3ecc993597ac109084ccaafdead9
                              • Instruction ID: e015d2f013b6b68590a1024fac7efc577eed81b7dc2ccc501f7c4b0b919a7fc3
                              • Opcode Fuzzy Hash: e8a9fff3f2d525b00164d309c93a27ca122c3ecc993597ac109084ccaafdead9
                              • Instruction Fuzzy Hash: 1F81A377A24A5286EB64CF26D4813BD23A0FB44B98F144A76EE1EC77A9DF39D0518304
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 03f10e5c36d2c90e3e843d3ee526e322415ff32a223bae658752ee0c55110d05
                              • Instruction ID: f7eaf89248f44e1c91fe3888ea00c6a17761e382892659cace978609a0dbd2e2
                              • Opcode Fuzzy Hash: 03f10e5c36d2c90e3e843d3ee526e322415ff32a223bae658752ee0c55110d05
                              • Instruction Fuzzy Hash: 6881E573A38B8145E7B4CB2A948037B7691FB95794F1042B5DA8D87BA9CF3EE4409F01
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5ec938e2278b14a04dbb626e947d484f460c30e86730ef98d8f8e7ce8a528cec
                              • Instruction ID: 4cec02f9310064dc4b1a23377e3ffb5b8f46e0d8c31a8737c8939ab7b9a4dee2
                              • Opcode Fuzzy Hash: 5ec938e2278b14a04dbb626e947d484f460c30e86730ef98d8f8e7ce8a528cec
                              • Instruction Fuzzy Hash: 8B61E463B29AA982EF208F9DD0455B86362FB547E4F458231EB5EC77A4DE3CE191C300
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8597c923cbaa6151206fd998e97a6f96e981866a793e387065817f7198bd7c65
                              • Instruction ID: e50a310b70e5d2a74110a26e469e2b0ffd420c0c3c9c48e1359745d949e2ce58
                              • Opcode Fuzzy Hash: 8597c923cbaa6151206fd998e97a6f96e981866a793e387065817f7198bd7c65
                              • Instruction Fuzzy Hash: B161C12321E2C48FD30DDF7C589106D7F61D7A7908388469DEAC5EBB4BC518C51ACBA6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d5449f8e1e76c7c39ff7bf4f38ba925b3ca9a205e5da8ad886608f72b29d4485
                              • Instruction ID: 983e9e3356270b3b0611d8f51b50450bf4d3c4e5edbf5eebb912441b93ca38ae
                              • Opcode Fuzzy Hash: d5449f8e1e76c7c39ff7bf4f38ba925b3ca9a205e5da8ad886608f72b29d4485
                              • Instruction Fuzzy Hash: 2451E4A3B0568443DB248B49FC42796F7A5FBD87C5F00A126EE8D97B68EB3CD5818700
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 65988544bd8c51d46c1f2ecd44d2c2020be5c6c9d2ff497e3ff94f9df2993759
                              • Instruction ID: 58f4f7aa9e2b98920a2dcb7e146c62879f80889dd2d5a8c64ff4f8c17d2336a9
                              • Opcode Fuzzy Hash: 65988544bd8c51d46c1f2ecd44d2c2020be5c6c9d2ff497e3ff94f9df2993759
                              • Instruction Fuzzy Hash: 88517073A3965183F7298E24815833C27A1EB55BADF140179CE4AD77A9CF29EC42CB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 485612231-0
                              • Opcode ID: 21af7599d668425c508b6dc6d20b2ad751947d9bb730ee801f404e20e9297778
                              • Instruction ID: 7187146593f7d32a6a730576f25972678f0c0022ee1bb6a9a97d31a659f7ffc0
                              • Opcode Fuzzy Hash: 21af7599d668425c508b6dc6d20b2ad751947d9bb730ee801f404e20e9297778
                              • Instruction Fuzzy Hash: 2741AF23724A5586EF44CF2AEA2416A7391FB58FD4B499076DE0DC7B68EE3DD4428340
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: *$/$No closed word$Unexpected eof$key declared, but no value$key opened, but never closed$object is not closed with '}'$quote was opened but not closed.$unexpected '}'$unexpected key without object$word wasnt properly ended
                              • API String ID: 0-1642088037
                              • Opcode ID: b8faa98e97a49f4b4eeb8a7d9a1122b2dec6a5f31b1fca10665950ec988442fc
                              • Instruction ID: c72839f4904ca489d5766388c4252673464bb7efbdf1101e9599db89bfb9992b
                              • Opcode Fuzzy Hash: b8faa98e97a49f4b4eeb8a7d9a1122b2dec6a5f31b1fca10665950ec988442fc
                              • Instruction Fuzzy Hash: DC12B423A29A8695EF60DF25D8802F96361FF40798F405572E64ECBAB9EF7DD185C300
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: No closed word$Unexpected eof$key declared, but no value$key opened, but never closed$object is not closed with '}'$quote was opened but not closed.$unexpected '}'$unexpected key without object$word wasnt properly ended
                              • API String ID: 0-2490624340
                              • Opcode ID: d7b8be012b611d7c68f823c86e04f696d3f65aa94ea25392f05cb2508796e7ca
                              • Instruction ID: 72795a76075d9c8a4ab09d41d86eaa969c1b4157a85eceedbae4e773e0fc9125
                              • Opcode Fuzzy Hash: d7b8be012b611d7c68f823c86e04f696d3f65aa94ea25392f05cb2508796e7ca
                              • Instruction Fuzzy Hash: 8BF16333629A8694EB60DF25E8803E92361FF40398F405572E65DC7ABAEF7DD295C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: .exe$.exe$abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+=-&^%$#@!(){}[},.;'$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$open$runas$temp_directory_path
                              • API String ID: 3668304517-3845196099
                              • Opcode ID: b18a3ac510c8b0f24bfca421e772cd1bd5065f06416b9bbe873d300fd71040d9
                              • Instruction ID: b7782c19951bd143594be5c2fa173864d7407d3695de4d0e352d776b2adf218e
                              • Opcode Fuzzy Hash: b18a3ac510c8b0f24bfca421e772cd1bd5065f06416b9bbe873d300fd71040d9
                              • Instruction Fuzzy Hash: B2516E33F24B4584FB008FA5D5405BD6771AF497A8F685675EE1CA3AA9EE38E581C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Value$ErrorLast$Heap$AllocFree
                              • String ID:
                              • API String ID: 570795689-0
                              • Opcode ID: 2d52a3bb37d6d36dfb8a5f7ee38180eb966f95766ed099e595ddcb8a032545f6
                              • Instruction ID: 100ce537d0509120bcfc12f4e7e6170020ed9061168b1e6135c584f8d7f9d8da
                              • Opcode Fuzzy Hash: 2d52a3bb37d6d36dfb8a5f7ee38180eb966f95766ed099e595ddcb8a032545f6
                              • Instruction Fuzzy Hash: 2C415E26A3C20241FA68A377595517A21625F743B0F1447F9E83ECA7FFEE2EB441A300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: ; expected $; last read: '$syntax error $unexpected $while parsing
                              • API String ID: 3668304517-4239264347
                              • Opcode ID: d8ec020af4906ba83bac0fda7dd28d6df5c5a2a76fe582c9c531894715449f51
                              • Instruction ID: 86974ff45ac05c896e2b5d8cccac4c022014e0bbe77495e83cf2bd56cc4cab44
                              • Opcode Fuzzy Hash: d8ec020af4906ba83bac0fda7dd28d6df5c5a2a76fe582c9c531894715449f51
                              • Instruction Fuzzy Hash: A7F18463F2469189FB00DFA5D8403ED2B72AB417B8F605275DE1DA7AEADF7894C58300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                              • String ID: bad locale name$false$true
                              • API String ID: 164343898-1062449267
                              • Opcode ID: 7d0d5576e659e219aee7dd8fd1c1c89a3be7b9c8693a6a6153ae4918549f2811
                              • Instruction ID: 543069bdaa3130a63ac7bd198b7b48c20a8efec1dc5937b66377c149e9eae664
                              • Opcode Fuzzy Hash: 7d0d5576e659e219aee7dd8fd1c1c89a3be7b9c8693a6a6153ae4918549f2811
                              • Instruction Fuzzy Hash: DB716E23B29B418AEB15DF71D8502BC37A5EF84758F140178DE4CA7AA9DF38E421C784
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Session$CriticalSection$EnterListProcess$CurrentLeaveRegisterResourcesStart
                              • String ID:
                              • API String ID: 3440422588-0
                              • Opcode ID: 93fd087dd890e0721090498d8606ad22e96d3fb8a918304c10cc0c02454d1560
                              • Instruction ID: 2bc7912443579d23958b1dd501b499801c22f96e2c4602ac3466b87212364a47
                              • Opcode Fuzzy Hash: 93fd087dd890e0721090498d8606ad22e96d3fb8a918304c10cc0c02454d1560
                              • Instruction Fuzzy Hash: 47513F33B296018AE710CFA5E4406AC73B1BB88798F440575DA4EE7BA8DF3CE905CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: 0$f$p$p
                              • API String ID: 3215553584-1202675169
                              • Opcode ID: 20a17dcc54312a4719634567cfff119de1b0c98f105182ac0e8ea3c8a1e1f82e
                              • Instruction ID: 2837cf21f7b63dd4d9eb1d21dba8b93aac24c1c6c9a8e0739326f79b74df6aa0
                              • Opcode Fuzzy Hash: 20a17dcc54312a4719634567cfff119de1b0c98f105182ac0e8ea3c8a1e1f82e
                              • Instruction Fuzzy Hash: 9012C063E7C24386FB609E15D04467A7661FB80764F84497AE69EC66E8CF3CE884DF04
                              APIs
                              • FreeLibrary.KERNEL32(?,00000000,00007FF67A405292,?,?,00000030,00007FF67A40BF50,?,?,?,?,?,?,?), ref: 00007FF67A404D63
                              • GetProcAddress.KERNEL32(?,00000000,00007FF67A405292,?,?,00000030,00007FF67A40BF50,?,?,?,?,?,?,?), ref: 00007FF67A404D6F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: AddressFreeLibraryProc
                              • String ID: api-ms-$ext-ms-
                              • API String ID: 3013587201-537541572
                              • Opcode ID: ea1db75ad569a1f751d6f236fcb11e3532b51c7e1c493ad09dd3763442c21a1b
                              • Instruction ID: edef71a477eb7636e4db50aa5cea31d2179f67a452bac93ab3fa9f4ba2fa61e7
                              • Opcode Fuzzy Hash: ea1db75ad569a1f751d6f236fcb11e3532b51c7e1c493ad09dd3763442c21a1b
                              • Instruction Fuzzy Hash: B9413663B3870281FA15DB27A9001766391BF55BE0F0941B5DD1DCB7ACEE3EE4409340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Internet$CloseFileHandleOpenRead
                              • String ID: File Downloader
                              • API String ID: 4038090926-3631955488
                              • Opcode ID: 8631c50a7d7aeab745ffe52be2581e033ecdaeaf209ccd52c94b4234562f4027
                              • Instruction ID: cbda10835d2fad7282527d53192642a9669d2e6a0652ffd86b1a78a3e708ee95
                              • Opcode Fuzzy Hash: 8631c50a7d7aeab745ffe52be2581e033ecdaeaf209ccd52c94b4234562f4027
                              • Instruction Fuzzy Hash: 86315E3362978182E7108F66F4506AAB360FB88B94F545035EE8D83B68DF7DE155CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
                              • String ID: invalid_iterator
                              • API String ID: 1944019136-2508626007
                              • Opcode ID: 6373d4ae284ed067edb89ab867350e8ff58b7e5ed5f060a0eb34cf8dd729731b
                              • Instruction ID: 256a9ff46f89c8e1b05c133400f279a49bed5869b4702eaa9b1b5ef271b61ab4
                              • Opcode Fuzzy Hash: 6373d4ae284ed067edb89ab867350e8ff58b7e5ed5f060a0eb34cf8dd729731b
                              • Instruction Fuzzy Hash: B571C463F29B4589FB00CF79D8413BC2361AB457A8F509371EE5CA66E9EE3CA185C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
                              • String ID: out_of_range
                              • API String ID: 1944019136-3053435996
                              • Opcode ID: f034ebdfa626e4f2b8545fb8a5c00e60822f5f7df233ea77256a503c2671a737
                              • Instruction ID: cef90a7b581995bdb272ab025187d6783bd123a4e6e20e237d644db592e9c68b
                              • Opcode Fuzzy Hash: f034ebdfa626e4f2b8545fb8a5c00e60822f5f7df233ea77256a503c2671a737
                              • Instruction Fuzzy Hash: 35719363F28B8689FB00CF79D4403EC2361AB557A8F409771EA5C966EAEE7CD195C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
                              • String ID: other_error
                              • API String ID: 1944019136-896093151
                              • Opcode ID: cafb1c7d775c8fc8f368e604fb96d6e4c2f5a7e68f84fbfad756204a80c51c56
                              • Instruction ID: 3031ceee520b31c6a03019398b41ed8299175b463a35f5b2cc6127d32e7aa85a
                              • Opcode Fuzzy Hash: cafb1c7d775c8fc8f368e604fb96d6e4c2f5a7e68f84fbfad756204a80c51c56
                              • Instruction Fuzzy Hash: 3671B463F24B8589FB00CF79D4803ED6362AB553A8F409771EA5C96AE9EE7CD195C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy
                              • String ID: type_error
                              • API String ID: 1944019136-1406221190
                              • Opcode ID: fa151557f7cd5f0a3cfbdf51518d4d57f7be2016b1bcd6949a45317675b1fda3
                              • Instruction ID: a08d43f4070dde6c8acfe8acecfb3655329a59f3d9b0930d0759a72dd633e2a5
                              • Opcode Fuzzy Hash: fa151557f7cd5f0a3cfbdf51518d4d57f7be2016b1bcd6949a45317675b1fda3
                              • Instruction Fuzzy Hash: DB71C363F29B4588FB00CF79D4553BC2322AB553A8F009371EE5CA66E9EE7CA185C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: __std_exception_destroy_invalid_parameter_noinfo_noreturn
                              • String ID: at line $, column
                              • API String ID: 729085983-191570568
                              • Opcode ID: f7c5522b9465ec32394d11f34281698112e2604be269cbd79ec38097c54cc68c
                              • Instruction ID: 00e0baf096acb267786399f737056c4c1f8c748c22e33949aa70b86cefa92e20
                              • Opcode Fuzzy Hash: f7c5522b9465ec32394d11f34281698112e2604be269cbd79ec38097c54cc68c
                              • Instruction Fuzzy Hash: 7F51D673A28B4181EB149F1AE14126E6322FB85BE0F104271EB9C83BEADF3CD4918740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 3e87a9d24b09cb7ed727a1284b1e7e38199b0e79d20510dbc5928c805aadcfb1
                              • Instruction ID: d1d274442013bc88f306c6e3190df9a4e3aa3affd4d79aad64418cdaed1c1ff5
                              • Opcode Fuzzy Hash: 3e87a9d24b09cb7ed727a1284b1e7e38199b0e79d20510dbc5928c805aadcfb1
                              • Instruction Fuzzy Hash: ED118162628B4182E7508B57E854329A3A0FB88FE5F004274EA6DC77B8DF3ED4148744
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$CriticalEnterSection
                              • String ID:
                              • API String ID: 555700303-0
                              • Opcode ID: 67c30172e01021a1a2b2e5c4eda750d777d23457661e5aa8fea52c950020d6e6
                              • Instruction ID: 061e7e7a4103d542ac4d7ac3e4723869f21fc5f677623880eaf801a5169ba2b4
                              • Opcode Fuzzy Hash: 67c30172e01021a1a2b2e5c4eda750d777d23457661e5aa8fea52c950020d6e6
                              • Instruction Fuzzy Hash: 11D1CF63B29A8285FB108F69D5502BD2362AB497A8F405671EA5DD7BE9DF3CE081C301
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$CompareInfoString
                              • String ID:
                              • API String ID: 2984826149-0
                              • Opcode ID: 1f222af0314fcbf6c58ca9d58d599dac593cbc3de6a245fd672c9df98935204f
                              • Instruction ID: 9d719518c71386c72ba0cd5bc9008a6065ac5f4b26f05d77576d04ee3d9c8486
                              • Opcode Fuzzy Hash: 1f222af0314fcbf6c58ca9d58d599dac593cbc3de6a245fd672c9df98935204f
                              • Instruction Fuzzy Hash: 75A11437B2838286FF308B22D4513B96691AF447A4F480671EA5D87BEDDF7EE4208344
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ByteCharMultiStringWide
                              • String ID:
                              • API String ID: 2829165498-0
                              • Opcode ID: 1f3243329c99890ad18f8a7cec79f33d9315a9a6983336c811db799711a53098
                              • Instruction ID: da5f3e3337eaa43f644872dda22fe7ab5d7afb879156416ebd7f9da605b53193
                              • Opcode Fuzzy Hash: 1f3243329c99890ad18f8a7cec79f33d9315a9a6983336c811db799711a53098
                              • Instruction Fuzzy Hash: 7A81C273A29B4182EF608F22D44077963A1FF94BA8F040675EA5D97BE8DF7DE4118700
                              APIs
                              • GetLastError.KERNEL32(?,?,8000000000000000,00007FF67A3FD1D5,?,?,?,?,00007FF67A406E44,?,?,?,00007FF67A4171A3), ref: 00007FF67A401263
                              • FlsSetValue.KERNEL32(?,?,8000000000000000,00007FF67A3FD1D5,?,?,?,?,00007FF67A406E44,?,?,?,00007FF67A4171A3), ref: 00007FF67A401299
                              • FlsSetValue.KERNEL32(?,?,8000000000000000,00007FF67A3FD1D5,?,?,?,?,00007FF67A406E44,?,?,?,00007FF67A4171A3), ref: 00007FF67A4012C6
                              • FlsSetValue.KERNEL32(?,?,8000000000000000,00007FF67A3FD1D5,?,?,?,?,00007FF67A406E44,?,?,?,00007FF67A4171A3), ref: 00007FF67A4012D7
                              • FlsSetValue.KERNEL32(?,?,8000000000000000,00007FF67A3FD1D5,?,?,?,?,00007FF67A406E44,?,?,?,00007FF67A4171A3), ref: 00007FF67A4012E8
                              • SetLastError.KERNEL32(?,?,8000000000000000,00007FF67A3FD1D5,?,?,?,?,00007FF67A406E44,?,?,?,00007FF67A4171A3), ref: 00007FF67A401303
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Value$ErrorLast
                              • String ID:
                              • API String ID: 2506987500-0
                              • Opcode ID: 3fb94930e8d310cf8687c67c78b30c4d55b0f224f4bef0ecbf114cb03a3ab9f6
                              • Instruction ID: 49eb6dad0320a929e182b18a53c4aeba2fbc4408bbe0a31d26bb660895e6acf3
                              • Opcode Fuzzy Hash: 3fb94930e8d310cf8687c67c78b30c4d55b0f224f4bef0ecbf114cb03a3ab9f6
                              • Instruction Fuzzy Hash: EE11AE22B3C28246FA54A377565017A21925F647B0F1003F8E83ED67FEEE2EA441A300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$DeleteGdiplusObjectShutdown
                              • String ID:
                              • API String ID: 4268643673-0
                              • Opcode ID: 30679f12dbbd152e61c0fe2a4bbedbaa7e9dfe4d4c4f42536384a88b64d7b78a
                              • Instruction ID: 9f396d7d7ddc0805a5234c2647141e460670cf48f24dd479ed9510958f3eee0b
                              • Opcode Fuzzy Hash: 30679f12dbbd152e61c0fe2a4bbedbaa7e9dfe4d4c4f42536384a88b64d7b78a
                              • Instruction Fuzzy Hash: 82113D33529B41C1EB109F26E844028B3B4FF54FA5B584275D69D836B8CF3DD896C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: std::_$GetcollLocinfo::_Locinfo_ctorLockitLockit::__invalid_parameter_noinfo_noreturn
                              • String ID: bad locale name
                              • API String ID: 818938248-1405518554
                              • Opcode ID: 3e48039cb6299e80eb77bcc41b0a2d3b1a2936e918a8e4afd8f24e70d94dd675
                              • Instruction ID: 0c5fc8eae4447d9462451d7b255bce257612d2d5204d8c721d865b1a4333aed3
                              • Opcode Fuzzy Hash: 3e48039cb6299e80eb77bcc41b0a2d3b1a2936e918a8e4afd8f24e70d94dd675
                              • Instruction Fuzzy Hash: FB71AC23B26B418AFF14DFB5E4503BC3366AF44768F004175EE5DA7AA9DE38D0618384
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturnstd::_$Concurrency::cancel_current_taskLocinfo::_Locinfo_ctorLockitLockit::_
                              • String ID:
                              • API String ID: 2759874623-0
                              • Opcode ID: 630db9639453cfbfdb5905753b83a3dbc2dcbdd4757e5410f93e4ef9431ec585
                              • Instruction ID: 5b18214c714824b3da920190545b0bfbbf77165a4c678d9f55f2c079fcef9286
                              • Opcode Fuzzy Hash: 630db9639453cfbfdb5905753b83a3dbc2dcbdd4757e5410f93e4ef9431ec585
                              • Instruction Fuzzy Hash: 0B919E33B29B4189EB14DF61E4403BD33A5EF44BA8F084675EE5D97AAADF38D4618340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Window$DesktopRect
                              • String ID:
                              • API String ID: 1991322523-0
                              • Opcode ID: 8bf5badb92777a96b12c27d7376b26c04db940d8e94f5480e2108a89df877fcf
                              • Instruction ID: 92881711b8fb6aceac0ab73a355ac656d95043a41d0d692b1998207969f8d3df
                              • Opcode Fuzzy Hash: 8bf5badb92777a96b12c27d7376b26c04db940d8e94f5480e2108a89df877fcf
                              • Instruction Fuzzy Hash: BE418263A2C78541EE109F69F44536AA351EF857A4F504771E6ACC6BFADE3DD4808B00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _set_statfp
                              • String ID:
                              • API String ID: 1156100317-0
                              • Opcode ID: 025d23688907853b564ca8c27b0d165eda471880a57ba5485be5edd5abf68226
                              • Instruction ID: 95fce7a017fb7026962fc9ae54fe60787bd077246fd31e9504a08cbd6fa0fa3e
                              • Opcode Fuzzy Hash: 025d23688907853b564ca8c27b0d165eda471880a57ba5485be5edd5abf68226
                              • Instruction Fuzzy Hash: 2F11E3ABE7CA0302F6541166D9453B511506F683B8F440AF8F97E866FEAE1FA8924301
                              APIs
                              • FlsGetValue.KERNEL32(?,?,?,00007FF67A3F89C7,?,?,00000000,00007FF67A3F8C62,?,?,?,?,8000000000000000,00007FF67A3F8BEE), ref: 00007FF67A40133B
                              • FlsSetValue.KERNEL32(?,?,?,00007FF67A3F89C7,?,?,00000000,00007FF67A3F8C62,?,?,?,?,8000000000000000,00007FF67A3F8BEE), ref: 00007FF67A40135A
                              • FlsSetValue.KERNEL32(?,?,?,00007FF67A3F89C7,?,?,00000000,00007FF67A3F8C62,?,?,?,?,8000000000000000,00007FF67A3F8BEE), ref: 00007FF67A401382
                              • FlsSetValue.KERNEL32(?,?,?,00007FF67A3F89C7,?,?,00000000,00007FF67A3F8C62,?,?,?,?,8000000000000000,00007FF67A3F8BEE), ref: 00007FF67A401393
                              • FlsSetValue.KERNEL32(?,?,?,00007FF67A3F89C7,?,?,00000000,00007FF67A3F8C62,?,?,?,?,8000000000000000,00007FF67A3F8BEE), ref: 00007FF67A4013A4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: a4fb289c786a0eca790088b9bcd761b8d76418df99202d3b5e7beb8be43a49ad
                              • Instruction ID: 20c98248e68b52470443027117569943ef9a938118c22c9123e489b56da36f2d
                              • Opcode Fuzzy Hash: a4fb289c786a0eca790088b9bcd761b8d76418df99202d3b5e7beb8be43a49ad
                              • Instruction Fuzzy Hash: 24113D12A3C24241FA58A3375A5157A61915F647B0F1447F9E83E86BFEEE2EE441A700
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                              • API String ID: 0-1866435925
                              • Opcode ID: e0f0697e29cf140b8ec4918c7538444e865b456e99957fe85f44bf5cc242374e
                              • Instruction ID: e3c4632cb6426e29a0221d49ff0f0541d47a2895e29e3fdf0276c69810526a9d
                              • Opcode Fuzzy Hash: e0f0697e29cf140b8ec4918c7538444e865b456e99957fe85f44bf5cc242374e
                              • Instruction Fuzzy Hash: E791B923A29A85C2EB14CF19E4443ADB366FB48BD4F544172EA9D87BA8DF3CC491C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: Optional arguments:$Positional arguments:$Subcommands:
                              • API String ID: 3668304517-2031040180
                              • Opcode ID: 816267435a35a0d78f2cf947243fad65008e0525db3d833e2ec34da25788430d
                              • Instruction ID: 8517761b59d97b0b8c7bf399b889133e15261d0bd97f1a3bdb75ab3b34ad2056
                              • Opcode Fuzzy Hash: 816267435a35a0d78f2cf947243fad65008e0525db3d833e2ec34da25788430d
                              • Instruction Fuzzy Hash: ECA1A9A3A28A4180EF14DF26E4843AC67A2EB44FD4F548076DA1EC77AACF7CD585C341
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID: [json.exception.
                              • API String ID: 0-791563284
                              • Opcode ID: ae0d6a02d63d35cb3a55785fbfa0ad02bd209fdb03e42c2fe57af30d188fe299
                              • Instruction ID: a62d4d57de51bdefedad8e8e3c10a118dcecf321c3f3f7b2b980eb296f28629c
                              • Opcode Fuzzy Hash: ae0d6a02d63d35cb3a55785fbfa0ad02bd209fdb03e42c2fe57af30d188fe299
                              • Instruction Fuzzy Hash: B771E163F24B9185FB00CF7AD4412AC2761EB95BA8F504275EE599BBAADF78D081C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: CurrentDirectory__std_exception_copy__std_fs_get_current_path_invalid_parameter_noinfo_noreturn
                              • String ID: --type$current_path()
                              • API String ID: 2526998938-584980331
                              • Opcode ID: 11f1563b3bab9115ca760f64c3965c306fbea0127aadccaa6a521a725f07e0a8
                              • Instruction ID: ffb89a0ae8172d7049ea8b1d779a62b2f8be64f98486f9f46e2ff8cefdb83133
                              • Opcode Fuzzy Hash: 11f1563b3bab9115ca760f64c3965c306fbea0127aadccaa6a521a725f07e0a8
                              • Instruction Fuzzy Hash: 99518F63F2475189EB10CFB5D8406AD37B5FB487A8F504639EE69A7BA8DF389481C310
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: std::_$GetctypeLocinfo::_Locinfo_ctorLockitLockit::_
                              • String ID: bad locale name
                              • API String ID: 1612978173-1405518554
                              • Opcode ID: 5d25508214ec7044c54f7b6a54389aadf6d9a4272941ecba3a100e3fb4536ebf
                              • Instruction ID: e38eed2aeb30e6619397c6f2c1f41e3473433cbb7c6bc488952ca6afc5a859c9
                              • Opcode Fuzzy Hash: 5d25508214ec7044c54f7b6a54389aadf6d9a4272941ecba3a100e3fb4536ebf
                              • Instruction Fuzzy Hash: B1517833B2AB418AEB44DF61D8802FC33A5AF40748F144579DE4DA7AAADF38D525C384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ExitProcess$InitializeMutexOpen
                              • String ID: --key$--type$APPB:
                              • API String ID: 3710457153-2541764812
                              • Opcode ID: f0dad4a55aebe92829e22db305535894228dfd5e9c5921f9cb9629a2b4d59aba
                              • Instruction ID: 5dc809f6d5b6a35ba3687571614f4854408b8d0963317fc92c57bec978d3dce8
                              • Opcode Fuzzy Hash: f0dad4a55aebe92829e22db305535894228dfd5e9c5921f9cb9629a2b4d59aba
                              • Instruction Fuzzy Hash: 1F212F33628AC6A1EE21AF60E4513EAA351EF94390F405476E68DC75BAEF2DD609C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: GetTempPath2W$kernel32.dll
                              • API String ID: 1646373207-1846531799
                              • Opcode ID: 6f9f3995978003d1ccc8dec992d9ad662db8d21aec809d3de5c822f6ec52e1f4
                              • Instruction ID: 328038575732dfd8df0fdbb28fccc5e12f3d9612dea93b4cc61079572b471549
                              • Opcode Fuzzy Hash: 6f9f3995978003d1ccc8dec992d9ad662db8d21aec809d3de5c822f6ec52e1f4
                              • Instruction Fuzzy Hash: 72E01A73A28E4292EF098B26F985075A361FF88BD1F188075D98E87339EE7DD4858740
                              APIs
                              • GetConsoleMode.KERNEL32(?,?,?,?,00000000,?,?,00000000,00000000,?,00000000,00000000,00007FF67A4040E4), ref: 00007FF67A404267
                              • GetLastError.KERNEL32(?,?,?,?,00000000,?,?,00000000,00000000,?,00000000,00000000,00007FF67A4040E4), ref: 00007FF67A4042F1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ConsoleErrorLastMode
                              • String ID:
                              • API String ID: 953036326-0
                              • Opcode ID: a5446ee033ab3a96d987ba82b954b746e7061da89c8fac301d0f6a6fa71b0e87
                              • Instruction ID: 851d4e158d32c2e5fa486b9415d62b5b5283d1d9330522c7028ed9ebc8b16be1
                              • Opcode Fuzzy Hash: a5446ee033ab3a96d987ba82b954b746e7061da89c8fac301d0f6a6fa71b0e87
                              • Instruction Fuzzy Hash: FB91D173B3865289FB50CB6698402BE27A0BB64B88F5451F5DE0E97AACCF3AD441D710
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo$_get_daylight
                              • String ID:
                              • API String ID: 72036449-0
                              • Opcode ID: 7f2af6dd734c9f49134f5f6cb4caa58708795f3dc7952dab5fe11fe3ab74a09c
                              • Instruction ID: a341d8954269e1a4170b73a7ce17d4bc98198643abaaf59bfe74504d624e4b88
                              • Opcode Fuzzy Hash: 7f2af6dd734c9f49134f5f6cb4caa58708795f3dc7952dab5fe11fe3ab74a09c
                              • Instruction Fuzzy Hash: 11518023E2CA0386F76DCE2AA50537965B1EF40714F1A44B9DA4DC62FEDE6EF8408741
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bb3d7264b8b674bf82fce66e91665e7e2bda2521a4e4f6b3e39894c39e276e61
                              • Instruction ID: a2585cc5f3fa4e2d8b5e2e2686353c2cdf0ddb23d1e787b0e0ffb78dcd44bcda
                              • Opcode Fuzzy Hash: bb3d7264b8b674bf82fce66e91665e7e2bda2521a4e4f6b3e39894c39e276e61
                              • Instruction Fuzzy Hash: 95411623B2975646EA245F26A4403B9A291AF557E4F140671FF9DC7BE6DF3CE0918300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: e17a87e0dac188715d7de44836a78e224ef073b665df49492f96d06277b00cdc
                              • Instruction ID: 318161aef37147fc1daf2b0dbbb0d10e30e222481037b8fc25ac9611573e44f1
                              • Opcode Fuzzy Hash: e17a87e0dac188715d7de44836a78e224ef073b665df49492f96d06277b00cdc
                              • Instruction Fuzzy Hash: CB519C73725B8582EA088F65E44427C73A5FB44FA4F544676EA5C87BE9CF2CD4A0C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_RegisterSetgloballocalestd::locale::_
                              • String ID:
                              • API String ID: 3698853521-0
                              • Opcode ID: cd937c2163436b9fb287f8dcd4740911990055bdb6793be5d7727d4a2ed8b4cb
                              • Instruction ID: 42ede6a69d51ce62a96f8c2de42a36a0a1ad3d6a3a99ff90451d594c8e0f7611
                              • Opcode Fuzzy Hash: cd937c2163436b9fb287f8dcd4740911990055bdb6793be5d7727d4a2ed8b4cb
                              • Instruction Fuzzy Hash: 0A417E37A28B5181EA20DF12E85467A73A5FB44BA4F540572EA9DC37B9DF3DE451C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 73155330-0
                              • Opcode ID: b30ae2a1adf495e9d439415c37c45efc14ad700a5141eea4e88dcc01de75cced
                              • Instruction ID: 1282280f2b70148bee35b02d1de5d7e7cb5abbf60d3970ed46f295be82514510
                              • Opcode Fuzzy Hash: b30ae2a1adf495e9d439415c37c45efc14ad700a5141eea4e88dcc01de75cced
                              • Instruction Fuzzy Hash: C9417C73B29B46C9EB18CFA4C4553BC2B61AB447A8F244A71DA1DD6AE9DE78D084C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                              • String ID:
                              • API String ID: 1168246061-0
                              • Opcode ID: 0369a9c64f1772f6bca1fded505bf389f4c46f7af8db3148ec6ac7e1e0e24fe9
                              • Instruction ID: 93a1e89193571bd6b36df2515379690417b003bd559d0163f832be2fd6215eca
                              • Opcode Fuzzy Hash: 0369a9c64f1772f6bca1fded505bf389f4c46f7af8db3148ec6ac7e1e0e24fe9
                              • Instruction Fuzzy Hash: 53419127A28B4281EF25DF16E8443796761FB84BA4F180671EA4DC77B9EE3DE542C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide
                              • String ID:
                              • API String ID: 203985260-0
                              • Opcode ID: a35a7af96b277efd2b3ef8961dad066aa662e8996eab021f8be0da18f0958b31
                              • Instruction ID: eadeec97b1045164426315e697c2a66194ac3fdeb610086dd788ff4366dff339
                              • Opcode Fuzzy Hash: a35a7af96b277efd2b3ef8961dad066aa662e8996eab021f8be0da18f0958b31
                              • Instruction Fuzzy Hash: 1B215477A28B5587E7608F16E44432EBBB4F798B84F244174DB8993B68DF3DD4118B40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Handle$AddressAttributesCloseErrorFileLastModuleProc__std_fs_open_handle
                              • String ID:
                              • API String ID: 3095436882-0
                              • Opcode ID: 6c31786f829653212935232cf3d85fa5a40863707855e3c977216cfbe1f658b8
                              • Instruction ID: 469c56baea746dfed2e85e804db8df8c1ddf2c638d0728180bd756c60756ada5
                              • Opcode Fuzzy Hash: 6c31786f829653212935232cf3d85fa5a40863707855e3c977216cfbe1f658b8
                              • Instruction Fuzzy Hash: F611B623B3C54285E6709727E9442396750DB847B5F201670E5BAC6AF8DE3DD0508B00
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ErrorFileHandleInformationLast
                              • String ID:
                              • API String ID: 275135790-0
                              • Opcode ID: ef666a5330756d5a635ca31cfb1b723dc77e2aec855cfe130d87bc9277cbf906
                              • Instruction ID: a08ee790f378e4f2c47c3ccc74ff006bb54d021916bf0187735cac38413fd6f9
                              • Opcode Fuzzy Hash: ef666a5330756d5a635ca31cfb1b723dc77e2aec855cfe130d87bc9277cbf906
                              • Instruction Fuzzy Hash: 01F0F433A2818282F7A85B73D8586B426A0EF55741F1409B4D68ADA5BCDF2EE9958300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID: conditional not closed
                              • API String ID: 73155330-2481790218
                              • Opcode ID: de053c112b64e768f8428813dd411f94ee97544ab1db2f6cb749ea2c733d172c
                              • Instruction ID: 648d2c7d479e5c563497fc221ee9e0abd6bbf4ad218d61cffe397cc6e1f0805b
                              • Opcode Fuzzy Hash: de053c112b64e768f8428813dd411f94ee97544ab1db2f6cb749ea2c733d172c
                              • Instruction Fuzzy Hash: 4A51D563A28A86C1EA50CF29D4402B96763FF947E4F545272EA5EC72B9EF3DD494C300
                              APIs
                                • Part of subcall function 00007FF67A3ADD8E: __std_fs_convert_narrow_to_wide.LIBCPMT ref: 00007FF67A3ADEDD
                                • Part of subcall function 00007FF67A3ADD8E: __std_fs_convert_narrow_to_wide.LIBCPMT ref: 00007FF67A3ADF15
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF67A3BB741
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF67A3BB747
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: __std_fs_convert_narrow_to_wide_invalid_parameter_noinfo_noreturn
                              • String ID: exists
                              • API String ID: 522447391-2996790960
                              • Opcode ID: 0812b07cca2c7e13efabdba849dce9808f902fe97657f9a56c61faa4ce2bafba
                              • Instruction ID: 365f214958a9085244a4fa6d8170ceb1d93820001337b2037d6b0c266b715fa6
                              • Opcode Fuzzy Hash: 0812b07cca2c7e13efabdba849dce9808f902fe97657f9a56c61faa4ce2bafba
                              • Instruction Fuzzy Hash: CA519F73B24B8689FB00DFA5D4453AC3322EB487A8F405636EE5C97BA9EE38D551C344
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                              • String ID: bad locale name
                              • API String ID: 3988782225-1405518554
                              • Opcode ID: d3c72544cd645b69e8a2c5bf7666d31f89d387f88ea681514652529d93fb1af9
                              • Instruction ID: d74707540e8c827e5aa2d2d8a4f22fc958ee7af9f2a991177a8280151910d52f
                              • Opcode Fuzzy Hash: d3c72544cd645b69e8a2c5bf7666d31f89d387f88ea681514652529d93fb1af9
                              • Instruction Fuzzy Hash: C6515A33B29A4189EB14DF71D4902B823A8EF44B58F140475EA4DA7AA9DE38D525D384
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                              • String ID: bad locale name
                              • API String ID: 3988782225-1405518554
                              • Opcode ID: f2da8db68162ba056228c46117a7daadb370c3837c43f6d530888027403bb8d8
                              • Instruction ID: 81aba4bc8d5bcdc0e5c21b531f570011cea316f09ec4510f5e249784cba095a1
                              • Opcode Fuzzy Hash: f2da8db68162ba056228c46117a7daadb370c3837c43f6d530888027403bb8d8
                              • Instruction Fuzzy Hash: 2C517833B2AA4189EB14DF61D8912FC33A5EF44718F040575EA4DA3AAADF38D422C344
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _get_daylight$_invalid_parameter_noinfo
                              • String ID: ?
                              • API String ID: 1286766494-1684325040
                              • Opcode ID: a3b13d974e2cd164ba41b4e4a9c5cd7494e93de61a48e4dfc92e765cfa0c422b
                              • Instruction ID: 4adf3e0448f96344c3b0e9c86ca161e5f072c85ff15dbdc3795a3a8dd5e7619c
                              • Opcode Fuzzy Hash: a3b13d974e2cd164ba41b4e4a9c5cd7494e93de61a48e4dfc92e765cfa0c422b
                              • Instruction Fuzzy Hash: B041C913A3874141F7249B27984137B66A0EFA07A4F1441B5FF5D86AEEDF3ED4419700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: U
                              • API String ID: 442123175-4171548499
                              • Opcode ID: bee17eca91563b03ee591555d47daf55e6df060aa8ca0c42c3912dffb49774b0
                              • Instruction ID: 03563a3cb74ffd5951cc9a3556bca21ad0bd5341492580465a5b6df308134021
                              • Opcode Fuzzy Hash: bee17eca91563b03ee591555d47daf55e6df060aa8ca0c42c3912dffb49774b0
                              • Instruction Fuzzy Hash: 4741A223A38A4181DB60CF26E4443AAA7A0FB98B84F854171EE4DC77A8DF3DE441C750
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: _set_errno_from_matherr
                              • String ID: exp
                              • API String ID: 1187470696-113136155
                              • Opcode ID: 4150a5858f8c1529622c9a3be3afac75e5a34536c3a73a8c8f4fb5056da0edb7
                              • Instruction ID: 1f772b751eb24cc1c9014e2d9fa489630135a81c93f69f1a6870a31f95766d8a
                              • Opcode Fuzzy Hash: 4150a5858f8c1529622c9a3be3afac75e5a34536c3a73a8c8f4fb5056da0edb7
                              • Instruction Fuzzy Hash: 4E214637E24A158EE740CF79D8402AE33B0FB58348F4015B9FA0DA2B5ADF39E5419B40
                              APIs
                              • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00007FF67A41CE76), ref: 00007FF67A418448
                              • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00007FF67A41CE76), ref: 00007FF67A41848E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1961095305.00007FF67A361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF67A360000, based on PE: true
                              • Associated: 00000000.00000002.1961072653.00007FF67A360000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961182946.00007FF67A438000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961218781.00007FF67A464000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961240104.00007FF67A466000.00000008.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961261597.00007FF67A469000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1961290171.00007FF67A46D000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff67a360000_file.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: 16aa976642c7796b59811f77f3d663cd3a8b54534e2f5bb095776f4baf69a92e
                              • Instruction ID: e9a7cea6305d010e7cca4ef54c16a091c4c65265dd30a174c5e1796fc4bb1ccf
                              • Opcode Fuzzy Hash: 16aa976642c7796b59811f77f3d663cd3a8b54534e2f5bb095776f4baf69a92e
                              • Instruction Fuzzy Hash: B5111233618B4182EB518F26E440269B7A5FB84B99F284271DFCD47768EF3DD561CB40