Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
setup_run.exe

Overview

General Information

Sample name:setup_run.exe
Analysis ID:1525818
MD5:f9e546bb5a4898d65b61f8b3d93a1662
SHA1:a4f5d8c4fec7657211c71c31f92d347cad13b1c8
SHA256:b1a638cc1c6fab24c26193035daa72cdc459deebf7a11de130cf41a4218e81d0
Tags:exeuser-aachum
Infos:

Detection

CredGrabber, Meduza Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CredGrabber
Yara detected Meduza Stealer
AI detected suspicious sample
Contain functionality to detect virtual machines
Contains functionality to inject code into remote processes
Creates files in alternative data streams (ADS)
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the context of a thread in another process (thread injection)
Self deletion via cmd or bat file
Sigma detected: Suspicious Ping/Del Command Combination
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample execution stops while process was sleeping (likely an evasion)
Terminates after testing mutex exists (may check infected machine status)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • setup_run.exe (PID: 1304 cmdline: "C:\Users\user\Desktop\setup_run.exe" MD5: F9E546BB5A4898D65B61F8B3D93A1662)
    • setup_run.exe (PID: 6156 cmdline: "C:\Users\user\Desktop\setup_run.exe" MD5: F9E546BB5A4898D65B61F8B3D93A1662)
      • cmd.exe (PID: 5064 cmdline: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 4984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • PING.EXE (PID: 520 cmdline: ping 1.1.1.1 -n 1 -w 3000 MD5: 2F46799D79D22AC72C241EC0322B011D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: setup_run.exe PID: 6156JoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
    Process Memory Space: setup_run.exe PID: 6156JoeSecurity_CredGrabberYara detected CredGrabberJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Ilya Krestinichev: Data: Command: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe", CommandLine: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\setup_run.exe", ParentImage: C:\Users\user\Desktop\setup_run.exe, ParentProcessId: 6156, ParentProcessName: setup_run.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe", ProcessId: 5064, ProcessName: cmd.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-04T15:16:24.223718+020020494411A Network Trojan was detected192.168.2.949705109.107.181.16215666TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-04T15:16:24.223718+020020508061A Network Trojan was detected192.168.2.949705109.107.181.16215666TCP
      2024-10-04T15:16:24.338303+020020508061A Network Trojan was detected192.168.2.949705109.107.181.16215666TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-10-04T15:16:24.223718+020020508071A Network Trojan was detected192.168.2.949705109.107.181.16215666TCP
      2024-10-04T15:16:24.338303+020020508071A Network Trojan was detected192.168.2.949705109.107.181.16215666TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: C:\Users\user\Desktop\setup_run.exe:a.dllAvira: detection malicious, Label: HEUR/AGEN.1354117
      Source: setup_run.exeReversingLabs: Detection: 13%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
      Source: C:\Users\user\Desktop\setup_run.exe:a.dllJoe Sandbox ML: detected
      Source: setup_run.exeJoe Sandbox ML: detected
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006FB20 CryptUnprotectData,LocalFree,1_2_000000014006FB20
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400D0060 OpenProcessToken,CryptProtectData,BitBlt,1_2_00000001400D0060
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400D0098 CryptProtectData,1_2_00000001400D0098
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140035E00 CryptUnprotectData,LocalFree,1_2_0000000140035E00
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006FE40 CryptProtectData,LocalFree,1_2_000000014006FE40
      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.9:49706 version: TLS 1.2
      Source: setup_run.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400B66D0 FindClose,FindFirstFileExW,GetLastError,1_2_00000001400B66D0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400B6780 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,1_2_00000001400B6780
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007EEF0 GetLogicalDriveStringsW,1_2_000000014007EEF0
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\migration\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\migration\wtr\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rbx0_2_00007FF650A291F6
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then cmp rdx, 01h0_2_00007FF650A3F160
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi0_2_00007FF650A49250
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi0_2_00007FF650A4A250
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi0_2_00007FF650A4A250
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi0_2_00007FF650A4A250
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi0_2_00007FF650A412A0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rbp0_2_00007FF650A3A3B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r120_2_00007FF650A515F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r120_2_00007FF650A515F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi0_2_00007FF650A41630
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi0_2_00007FF650A49730
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi0_2_00007FF650A49730
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi0_2_00007FF650A49730
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi0_2_00007FF650A4C700
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi0_2_00007FF650A4C700
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r150_2_00007FF650A3881E
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rbp0_2_00007FF650A3A9F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r120_2_00007FF650A50A70
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r120_2_00007FF650A50A70
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF650A54DF0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF650A54EE9
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then mov rcx, qword ptr [rcx]0_2_00007FF650A4AE40
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rbx1_2_00007FF650A291F6
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then cmp rdx, 01h1_2_00007FF650A3F160
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi1_2_00007FF650A49250
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi1_2_00007FF650A4A250
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi1_2_00007FF650A4A250
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi1_2_00007FF650A4A250
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi1_2_00007FF650A412A0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rbp1_2_00007FF650A3A3B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r121_2_00007FF650A515F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r121_2_00007FF650A515F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi1_2_00007FF650A41630
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi1_2_00007FF650A49730
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi1_2_00007FF650A49730
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rdi1_2_00007FF650A49730
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi1_2_00007FF650A4C700
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rsi1_2_00007FF650A4C700
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r151_2_00007FF650A3881E
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push rbp1_2_00007FF650A3A9F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r121_2_00007FF650A50A70
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then push r121_2_00007FF650A50A70
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then sub rsp, 28h1_2_00007FF650A54DF0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then sub rsp, 28h1_2_00007FF650A54EE9
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 4x nop then mov rcx, qword ptr [rcx]1_2_00007FF650A4AE40

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2049441 - Severity 1 - ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt : 192.168.2.9:49705 -> 109.107.181.162:15666
      Source: Network trafficSuricata IDS: 2050806 - Severity 1 - ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M2 : 192.168.2.9:49705 -> 109.107.181.162:15666
      Source: Network trafficSuricata IDS: 2050807 - Severity 1 - ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP) : 192.168.2.9:49705 -> 109.107.181.162:15666
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000
      Source: global trafficTCP traffic: 192.168.2.9:49705 -> 109.107.181.162:15666
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
      Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
      Source: Joe Sandbox ViewASN Name: TELEPORT-TV-ASRU TELEPORT-TV-ASRU
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: unknownDNS query: name: api.ipify.org
      Source: unknownDNS query: name: api.ipify.org
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007C570 recv,recv,closesocket,WSACleanup,1_2_000000014007C570
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
      Source: setup_run.exe, 00000001.00000003.1600289450.000002157B563000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1598373186.000002157B563000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1601265710.000002157B563000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1598513815.000002157B580000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1599915494.000002157B563000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
      Source: setup_run.exe, 00000001.00000003.2162308315.000002157D2A0000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.2162363651.000002157D2A0000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.2162448327.000002157D2A4000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1597864768.000002157D291000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.microsoft.t/Regi
      Source: setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
      Source: setup_run.exe, 00000001.00000002.2163940331.000002157B4A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
      Source: setup_run.exe, 00000001.00000002.2163940331.000002157B4A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
      Source: setup_run.exe, 00000001.00000002.2163940331.000002157B4A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/ocal
      Source: setup_run.exe, 00000001.00000003.1618471140.000002157D49E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208.
      Source: setup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696495411400900000.1&ci=1696495411208.12791&cta
      Source: setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
      Source: setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
      Source: setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
      Source: setup_run.exe, 00000001.00000003.1618471140.000002157D49E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
      Source: setup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
      Source: setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600042334.000002157D4C2000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600397344.000002157D4C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
      Source: setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600042334.000002157D4C2000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600397344.000002157D4C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
      Source: setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600042334.000002157D4C2000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600397344.000002157D4C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
      Source: setup_run.exeString found in binary or memory: https://gcc.gnu.org/bugs/):
      Source: setup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqd4plX4pbW1CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
      Source: setup_run.exe, 00000001.00000003.1606400571.000002157D580000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607442947.000002157D640000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D738000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D785000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607922547.000002157D78D000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1616945458.000002157E919000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D730000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607134875.000002157D4FA000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1608627327.000002157D804000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607134875.000002157D4F2000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1608627327.000002157D80C000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606400571.000002157D588000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
      Source: setup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
      Source: setup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GNzbMA16ssY5
      Source: setup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_e149f5d53c9263616797a13067f7a114fa287709b159d0a5
      Source: setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
      Source: setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
      Source: setup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
      Source: setup_run.exe, 00000001.00000003.1606400571.000002157D580000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607442947.000002157D640000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D738000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D785000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607922547.000002157D78D000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1616945458.000002157E919000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D730000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607134875.000002157D4FA000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1608627327.000002157D804000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607134875.000002157D4F2000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1608627327.000002157D80C000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606400571.000002157D588000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
      Source: setup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.HCe2hc5EPKfq
      Source: setup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.oX6J3D7V9Efv
      Source: setup_run.exe, 00000001.00000003.1609316820.000002157DFC5000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1608627327.000002157D814000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606400571.000002157D58F000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607134875.000002157D502000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D740000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
      Source: setup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
      Source: setup_run.exe, 00000001.00000003.1609316820.000002157DFC5000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1608627327.000002157D814000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606400571.000002157D58F000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607134875.000002157D502000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D740000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
      Source: setup_run.exe, 00000001.00000003.1609316820.000002157DFC5000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1608627327.000002157D814000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606400571.000002157D58F000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607134875.000002157D502000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D740000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
      Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
      Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.9:49706 version: TLS 1.2
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007D670 GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetDC,GetDeviceCaps,GetDeviceCaps,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SHCreateMemStream,SelectObject,DeleteDC,ReleaseDC,DeleteObject,EnterCriticalSection,LeaveCriticalSection,IStream_Size,IStream_Reset,IStream_Read,SelectObject,DeleteDC,ReleaseDC,DeleteObject,1_2_000000014007D670
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A124B0 GetModuleFileNameW,LoadLibraryA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wcslen,wcslen,LdrLoadDll,GetProcAddress,GetCurrentProcess,NtAllocateVirtualMemory,memcpy,memcpy,0_2_00007FF650A124B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A11E00 memcpy,wcslen,CreateFileW,NtWriteFile,CloseHandle,free,CloseHandle,0_2_00007FF650A11E00
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400D0670 GdipCreateBitmapFromHBITMAP,GdiplusStartup,NtQueryObject,1_2_00000001400D0670
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400D06D8 NtQuerySystemInformation,1_2_00000001400D06D8
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400D06E8 NtAllocateVirtualMemory,1_2_00000001400D06E8
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140081880 GetModuleHandleA,GetProcAddress,OpenProcess,NtQuerySystemInformation,NtQuerySystemInformation,GetCurrentProcess,NtQueryObject,GetFinalPathNameByHandleA,CloseHandle,CloseHandle,1_2_0000000140081880
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140081FC0 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize,1_2_0000000140081FC0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A124B00_2_00007FF650A124B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A11E000_2_00007FF650A11E00
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A242200_2_00007FF650A24220
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A151400_2_00007FF650A15140
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A461B00_2_00007FF650A461B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A4E3800_2_00007FF650A4E380
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A115B00_2_00007FF650A115B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A2C7100_2_00007FF650A2C710
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A4C7000_2_00007FF650A4C700
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A4E6900_2_00007FF650A4E690
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A527400_2_00007FF650A52740
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A178900_2_00007FF650A17890
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A3A9F00_2_00007FF650A3A9F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A309D00_2_00007FF650A309D0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A159900_2_00007FF650A15990
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A3CB700_2_00007FF650A3CB70
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A12BB40_2_00007FF650A12BB4
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A2DDF00_2_00007FF650A2DDF0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A4CD400_2_00007FF650A4CD40
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A31FC00_2_00007FF650A31FC0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF8E7B207500_2_00007FF8E7B20750
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF8E7B1C5B00_2_00007FF8E7B1C5B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF8E7B044600_2_00007FF8E7B04460
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF8E7B063600_2_00007FF8E7B06360
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF8E7B1F1900_2_00007FF8E7B1F190
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF8E7B1AED00_2_00007FF8E7B1AED0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF8E7B12CF00_2_00007FF8E7B12CF0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF8E7B03C100_2_00007FF8E7B03C10
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014005F0E01_2_000000014005F0E0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400421601_2_0000000140042160
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007F1A01_2_000000014007F1A0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400841FB1_2_00000001400841FB
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400743301_2_0000000140074330
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007E3601_2_000000014007E360
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400866101_2_0000000140086610
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014002F6501_2_000000014002F650
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007D6701_2_000000014007D670
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014003B6E01_2_000000014003B6E0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400B67801_2_00000001400B6780
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014003C7801_2_000000014003C780
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140076B301_2_0000000140076B30
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007FB301_2_000000014007FB30
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014003AB801_2_000000014003AB80
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014009AC801_2_000000014009AC80
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140084C801_2_0000000140084C80
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007CD801_2_000000014007CD80
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014003CE201_2_000000014003CE20
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014009DF301_2_000000014009DF30
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014002EF601_2_000000014002EF60
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400920241_2_0000000140092024
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007E0401_2_000000014007E040
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006B0401_2_000000014006B040
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400360501_2_0000000140036050
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006A0A01_2_000000014006A0A0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014003A0B01_2_000000014003A0B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400300C61_2_00000001400300C6
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400061801_2_0000000140006180
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014009E1AC1_2_000000014009E1AC
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400282001_2_0000000140028200
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014009220C1_2_000000014009220C
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400B92701_2_00000001400B9270
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400532801_2_0000000140053280
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400962901_2_0000000140096290
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400562E01_2_00000001400562E0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400932D41_2_00000001400932D4
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400823101_2_0000000140082310
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400263401_2_0000000140026340
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400253501_2_0000000140025350
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006A3A01_2_000000014006A3A0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400A53F41_2_00000001400A53F4
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400923F41_2_00000001400923F4
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014009C4281_2_000000014009C428
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006E43A1_2_000000014006E43A
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014004C4A01_2_000000014004C4A0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400624B01_2_00000001400624B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400705401_2_0000000140070540
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400066101_2_0000000140006610
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400596501_2_0000000140059650
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006A6D01_2_000000014006A6D0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400666F01_2_00000001400666F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400907301_2_0000000140090730
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014009E7341_2_000000014009E734
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400658201_2_0000000140065820
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014009B8F81_2_000000014009B8F8
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400789D01_2_00000001400789D0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400269E01_2_00000001400269E0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006A9F01_2_000000014006A9F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140092A3C1_2_0000000140092A3C
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400A6A5C1_2_00000001400A6A5C
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140037AAD1_2_0000000140037AAD
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400BBB101_2_00000001400BBB10
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006DB601_2_000000014006DB60
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014002FC801_2_000000014002FC80
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014004ACD01_2_000000014004ACD0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140066CF31_2_0000000140066CF3
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006AD101_2_000000014006AD10
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140006D201_2_0000000140006D20
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014009BDA81_2_000000014009BDA8
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140005DB01_2_0000000140005DB0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006CDE01_2_000000014006CDE0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140075E001_2_0000000140075E00
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140072E601_2_0000000140072E60
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014009CEA81_2_000000014009CEA8
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006DFA01_2_000000014006DFA0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014004DFA01_2_000000014004DFA0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140038FB01_2_0000000140038FB0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140081FC01_2_0000000140081FC0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A242201_2_00007FF650A24220
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A151401_2_00007FF650A15140
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A461B01_2_00007FF650A461B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A4E3801_2_00007FF650A4E380
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A124B01_2_00007FF650A124B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A115B01_2_00007FF650A115B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A2C7101_2_00007FF650A2C710
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A4C7001_2_00007FF650A4C700
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A4E6901_2_00007FF650A4E690
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A527401_2_00007FF650A52740
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A178901_2_00007FF650A17890
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A3A9F01_2_00007FF650A3A9F0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A309D01_2_00007FF650A309D0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A159901_2_00007FF650A15990
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A3CB701_2_00007FF650A3CB70
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A12BB41_2_00007FF650A12BB4
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A2DDF01_2_00007FF650A2DDF0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A11E001_2_00007FF650A11E00
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A4CD401_2_00007FF650A4CD40
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A31FC01_2_00007FF650A31FC0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: String function: 00000001400300A0 appears 62 times
      Source: C:\Users\user\Desktop\setup_run.exeCode function: String function: 00007FF650A548B0 appears 250 times
      Source: C:\Users\user\Desktop\setup_run.exeCode function: String function: 00007FF650A52650 appears 54 times
      Source: C:\Users\user\Desktop\setup_run.exeCode function: String function: 00007FF650A54720 appears 88 times
      Source: C:\Users\user\Desktop\setup_run.exeCode function: String function: 0000000140034B20 appears 41 times
      Source: C:\Users\user\Desktop\setup_run.exeCode function: String function: 00007FF650A54810 appears 598 times
      Source: setup_run.exe_a.dll.0.drStatic PE information: Number of sections : 11 > 10
      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/2@1/2
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140083540 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,1_2_0000000140083540
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A12BB4 CreateToolhelp32Snapshot,Process32First,MultiByteToWideChar,Process32Next,MultiByteToWideChar,MultiByteToWideChar,0_2_00007FF650A12BB4
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014006CDE0 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,SysAllocStringByteLen,SysFreeString,SysAllocStringByteLen,SysFreeString,SysStringByteLen,SysFreeString,SysFreeString,SysStringByteLen,SysFreeString,SysFreeString,1_2_000000014006CDE0
      Source: C:\Users\user\Desktop\setup_run.exeFile created: C:\Users\user\Desktop\setup_run.exe:a.dllJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4984:120:WilError_03
      Source: C:\Users\user\Desktop\setup_run.exeMutant created: \Sessions\1\BaseNamedObjects\Mmm-A33C734061CA11EE8C18806E6F6E6963A15E1DEB
      Source: setup_run.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\setup_run.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: setup_run.exeReversingLabs: Detection: 13%
      Source: unknownProcess created: C:\Users\user\Desktop\setup_run.exe "C:\Users\user\Desktop\setup_run.exe"
      Source: C:\Users\user\Desktop\setup_run.exeProcess created: C:\Users\user\Desktop\setup_run.exe "C:\Users\user\Desktop\setup_run.exe"
      Source: C:\Users\user\Desktop\setup_run.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe"
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000
      Source: C:\Users\user\Desktop\setup_run.exeProcess created: C:\Users\user\Desktop\setup_run.exe "C:\Users\user\Desktop\setup_run.exe"Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe"Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: vaultcli.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
      Source: setup_run.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: setup_run.exeStatic file information: File size 1766400 > 1048576
      Source: setup_run.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x163000
      Source: setup_run.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A30D70 GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,0_2_00007FF650A30D70
      Source: setup_run.exeStatic PE information: section name: .xdata
      Source: setup_run.exe_a.dll.0.drStatic PE information: section name: .xdata
      Source: C:\Users\user\Desktop\setup_run.exeFile created: C:\Users\user\Desktop\setup_run.exe:a.dllJump to dropped file
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140074060 ExitProcess,OpenMutexA,ExitProcess,CreateMutexA,CreateMutexExA,ExitProcess,ReleaseMutex,CloseHandle,1_2_0000000140074060

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\Desktop\setup_run.exeFile created: C:\Users\user\Desktop\setup_run.exe:a.dllJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeProcess created: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe"
      Source: C:\Users\user\Desktop\setup_run.exeProcess created: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe"Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\setup_run.exeCode function: VMwareVMMicrosofVBoxVBox VMwareVMMicrosofVBoxVBox MicrosofVBoxVBox VBoxVBox VBox 0_2_00007FF650A129E0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: VMwareVMMicrosofVBoxVBox VMwareVMMicrosofVBoxVBox MicrosofVBoxVBox VBoxVBox VBox 1_2_00007FF650A129E0
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeDropped PE file which has not been started: C:\Users\user\Desktop\setup_run.exe:a.dllJump to dropped file
      Source: C:\Users\user\Desktop\setup_run.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-78951
      Source: C:\Users\user\Desktop\setup_run.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-78632
      Source: C:\Users\user\Desktop\setup_run.exeAPI coverage: 4.3 %
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400B66D0 FindClose,FindFirstFileExW,GetLastError,1_2_00000001400B66D0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400B6780 GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,1_2_00000001400B6780
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007EEF0 GetLogicalDriveStringsW,1_2_000000014007EEF0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400949C0 VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,1_2_00000001400949C0
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\migration\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\migration\wtr\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696497155j
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696497155
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696497155t
      Source: setup_run.exeBinary or memory string: VMwareVMMicrosofVBoxVBox
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
      Source: setup_run.exe, 00000001.00000003.1598492369.000002157B513000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.2161425879.000002157B515000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000002.2163940331.000002157B516000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696497155o
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
      Source: setup_run.exe, 00000001.00000002.2163940331.000002157B4A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696497155x
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696497155
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696497155
      Source: setup_run.exeBinary or memory string: 6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAEe6yy7UkVAntdll.dllLdrLoadDll:a.dllntdll.dllRtlInitUnicodeStLdrUnloaExecuteVMwareVMMicrosofVBoxVBox
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696497155f
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696497155t
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696497155s
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
      Source: setup_run.exe, 00000001.00000003.1604591298.000002157D598000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
      Source: C:\Users\user\Desktop\setup_run.exeAPI call chain: ExitProcess graph end nodegraph_1-78582
      Source: C:\Users\user\Desktop\setup_run.exeAPI call chain: ExitProcess graph end nodegraph_1-78586
      Source: C:\Users\user\Desktop\setup_run.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A124B0 GetModuleFileNameW,LoadLibraryA,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wcslen,wcslen,LdrLoadDll,GetProcAddress,GetCurrentProcess,NtAllocateVirtualMemory,memcpy,memcpy,0_2_00007FF650A124B0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014008D368 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_000000014008D368
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400B89D4 GetLastError,IsDebuggerPresent,OutputDebugStringW,1_2_00000001400B89D4
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A30D70 GetModuleHandleW,GetProcAddress,GetProcAddress,LoadLibraryW,GetProcAddress,0_2_00007FF650A30D70
      Source: C:\Users\user\Desktop\setup_run.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A11180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,0_2_00007FF650A11180
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014008D368 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_000000014008D368
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650A11180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,1_2_00007FF650A11180
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00007FF650BC13E0 SetUnhandledExceptionFilter,1_2_00007FF650BC13E0

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF8E7B01690 LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleFileNameA,CreateProcessA,FreeLibrary,FreeLibrary,FreeLibrary,VirtualAlloc,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,WaitForSingleObject,0_2_00007FF8E7B01690
      Source: C:\Users\user\Desktop\setup_run.exeNtWriteFile: Indirect: 0x7FF650A122C2Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeNtAllocateVirtualMemory: Indirect: 0x7FF650A12840Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeMemory written: C:\Users\user\Desktop\setup_run.exe base: 140000000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeThread register set: target process: 6156Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_0000000140072E60 ShellExecuteW,1_2_0000000140072E60
      Source: C:\Users\user\Desktop\setup_run.exeProcess created: C:\Users\user\Desktop\setup_run.exe "C:\Users\user\Desktop\setup_run.exe"Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe"Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 0_2_00007FF650A129E0 cpuid 0_2_00007FF650A129E0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: EnumSystemLocalesW,1_2_00000001400A402C
      Source: C:\Users\user\Desktop\setup_run.exeCode function: EnumSystemLocalesW,1_2_00000001400A40FC
      Source: C:\Users\user\Desktop\setup_run.exeCode function: EnumSystemLocalesW,1_2_00000001400992E4
      Source: C:\Users\user\Desktop\setup_run.exeCode function: GetLocaleInfoEx,FormatMessageA,1_2_00000001400B6340
      Source: C:\Users\user\Desktop\setup_run.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_00000001400A4538
      Source: C:\Users\user\Desktop\setup_run.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,1_2_00000001400A4714
      Source: C:\Users\user\Desktop\setup_run.exeCode function: GetLocaleInfoW,1_2_0000000140099828
      Source: C:\Users\user\Desktop\setup_run.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,1_2_00000001400A3CE0
      Source: C:\Users\user\Desktop\setup_run.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation TimeZoneKeyNameJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_00000001400940C0 GetSystemTimeAsFileTime,1_2_00000001400940C0
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007DC50 GetUserNameW,1_2_000000014007DC50
      Source: C:\Users\user\Desktop\setup_run.exeCode function: 1_2_000000014007F1A0 GetTimeZoneInformation,GlobalMemoryStatusEx,wcsftime,GetModuleFileNameA,1_2_000000014007F1A0

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: Process Memory Space: setup_run.exe PID: 6156, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: setup_run.exe PID: 6156, type: MEMORYSTR
      Source: setup_run.exe, 00000001.00000002.2163940331.000002157B497000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum-LTC\config
      Source: setup_run.exe, 00000001.00000002.2163940331.000002157B497000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ElectronCash\wallets
      Source: setup_run.exe, 00000001.00000003.1600289450.000002157B563000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: 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
      Source: setup_run.exe, 00000001.00000002.2163940331.000002157B497000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodus\exodus.wallet
      Source: setup_run.exe, 00000001.00000002.2163940331.000002157B497000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
      Source: setup_run.exe, 00000001.00000002.2163940331.000002157B497000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
      Source: C:\Users\user\Desktop\setup_run.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-coreJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\prefs.jsJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqliteJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\key4.dbJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\cookies.sqliteJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOCKJump to behavior
      Source: C:\Users\user\Desktop\setup_run.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: Process Memory Space: setup_run.exe PID: 6156, type: MEMORYSTR
      Source: Yara matchFile source: Process Memory Space: setup_run.exe PID: 6156, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
      Native API
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      1
      Deobfuscate/Decode Files or Information
      1
      OS Credential Dumping
      12
      System Time Discovery
      Remote Services1
      Archive Collected Data
      2
      Ingress Tool Transfer
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Abuse Elevation Control Mechanism
      1
      Abuse Elevation Control Mechanism
      LSASS Memory1
      Account Discovery
      Remote Desktop Protocol2
      Data from Local System
      21
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      2
      Obfuscated Files or Information
      Security Account Manager4
      File and Directory Discovery
      SMB/Windows Admin Shares1
      Screen Capture
      1
      Non-Standard Port
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      Access Token Manipulation
      1
      DLL Side-Loading
      NTDS34
      System Information Discovery
      Distributed Component Object Model1
      Email Collection
      2
      Non-Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script311
      Process Injection
      1
      File Deletion
      LSA Secrets1
      Query Registry
      SSHKeylogging3
      Application Layer Protocol
      Scheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Masquerading
      Cached Domain Credentials121
      Security Software Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      Virtualization/Sandbox Evasion
      DCSync1
      Virtualization/Sandbox Evasion
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      Access Token Manipulation
      Proc Filesystem2
      Process Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt311
      Process Injection
      /etc/passwd and /etc/shadow1
      System Owner/User Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
      NTFS File Attributes
      Network Sniffing1
      Remote System Discovery
      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture11
      System Network Configuration Discovery
      Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      setup_run.exe13%ReversingLabs
      setup_run.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\Desktop\setup_run.exe:a.dll100%AviraHEUR/AGEN.1354117
      C:\Users\user\Desktop\setup_run.exe:a.dll100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://api.ipify.org/0%URL Reputationsafe
      https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
      https://gcc.gnu.org/bugs/):0%URL Reputationsafe
      https://duckduckgo.com/ac/?q=0%URL Reputationsafe
      http://crl.microsoft0%URL Reputationsafe
      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
      https://www.ecosia.org/newtab/0%URL Reputationsafe
      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
      https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
      https://api.ipify.org0%URL Reputationsafe
      https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg0%URL Reputationsafe
      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
      https://support.mozilla.org0%URL Reputationsafe
      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      api.ipify.org
      172.67.74.152
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://api.ipify.org/false
        • URL Reputation: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://duckduckgo.com/chrome_newtabsetup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600042334.000002157D4C2000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600397344.000002157D4C3000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://gcc.gnu.org/bugs/):setup_run.exefalse
        • URL Reputation: safe
        unknown
        https://duckduckgo.com/ac/?q=setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600042334.000002157D4C2000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600397344.000002157D4C3000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://www.google.com/images/branding/product/ico/googleg_lodp.icosetup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://crl.microsoftsetup_run.exe, 00000001.00000003.1600289450.000002157B563000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1598373186.000002157B563000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1601265710.000002157B563000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1598513815.000002157B580000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1599915494.000002157B563000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600042334.000002157D4C2000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1600397344.000002157D4C3000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_e149f5d53c9263616797a13067f7a114fa287709b159d0a5setup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://www.ecosia.org/newtab/setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brsetup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208.setup_run.exe, 00000001.00000003.1618471140.000002157D49E000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://ac.ecosia.org/autocomplete?q=setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.ipify.orgsetup_run.exe, 00000001.00000002.2163940331.000002157B4A4000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.ipify.org/ocalsetup_run.exe, 00000001.00000002.2163940331.000002157B4A4000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgsetup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsetup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&usetup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696495411400900000.1&ci=1696495411208.12791&ctasetup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://support.mozilla.org/products/firefoxgro.allizom.troppus.GNzbMA16ssY5setup_run.exe, 00000001.00000003.1607922547.000002157D795000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpgsetup_run.exe, 00000001.00000003.1618471140.000002157D49E000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqd4plX4pbW1CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYisetup_run.exe, 00000001.00000003.1618691332.000002157D47B000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://support.mozilla.orgsetup_run.exe, 00000001.00000003.1606400571.000002157D580000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607442947.000002157D640000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D738000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D785000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607922547.000002157D78D000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1616945458.000002157E919000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606806483.000002157D730000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607134875.000002157D4FA000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1608627327.000002157D804000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1607134875.000002157D4F2000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1608627327.000002157D80C000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1606400571.000002157D588000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://ns.microsoft.t/Regisetup_run.exe, 00000001.00000003.2162308315.000002157D2A0000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.2162363651.000002157D2A0000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.2162448327.000002157D2A4000.00000004.00000020.00020000.00000000.sdmp, setup_run.exe, 00000001.00000003.1597864768.000002157D291000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=setup_run.exe, 00000001.00000003.1600397344.000002157D4DB000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            109.107.181.162
                            unknownRussian Federation
                            49973TELEPORT-TV-ASRUtrue
                            172.67.74.152
                            api.ipify.orgUnited States
                            13335CLOUDFLARENETUSfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1525818
                            Start date and time:2024-10-04 15:15:02 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 41s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:10
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:setup_run.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@8/2@1/2
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 94%
                            • Number of executed functions: 68
                            • Number of non-executed functions: 128
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Stop behavior analysis, all processes terminated
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size exceeded maximum capacity and may have missing network information.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: setup_run.exe
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            109.107.181.162file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              172.67.74.152file.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousRDPWrap ToolBrowse
                              • api.ipify.org/
                              Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                              • api.ipify.org/
                              2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                              • api.ipify.org/
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              api.ipify.orgQUOTATIONS#08673.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              c42oX67S73.ps1Get hashmaliciousUnknownBrowse
                              • 104.26.13.205
                              UwBqqeMnswLwstaa.ps1Get hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              CHDLSHtWbSRCfzJMtDO.ps1Get hashmaliciousUnknownBrowse
                              • 104.26.13.205
                              QUOTATIONS#08671.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              New order.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              WarzoneCheat.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 104.26.12.205
                              Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              Notaire-document.htmlGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              file.exeGet hashmaliciousRDPWrap ToolBrowse
                              • 104.26.12.205
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              TELEPORT-TV-ASRUfile.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 109.107.181.162
                              wqOq2pxuQB.exeGet hashmaliciousStealc, VidarBrowse
                              • 109.107.187.5
                              Wv3pZF5jI3.exeGet hashmaliciousRedLineBrowse
                              • 109.107.182.39
                              OgcktrbHkI.exeGet hashmaliciousTofseeBrowse
                              • 109.107.161.150
                              clik.exeGet hashmaliciousCredGrabber, PureLog StealerBrowse
                              • 109.107.181.83
                              leadiadequatepro.exeGet hashmaliciousCredGrabber, PureLog StealerBrowse
                              • 109.107.181.83
                              responsibilityleadpro.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 109.107.181.83
                              CE1KVxYp5t.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 109.107.181.83
                              Ve6VeFSgkz.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 109.107.181.83
                              fDTPlvsGfH.exeGet hashmaliciousDCRatBrowse
                              • 109.107.182.145
                              CLOUDFLARENETUShttps://beta.adiance.com/wp-content/plugins/arull.php?7088797967704b536932307464507a637a4c7a736c4d7a733752533837503155744a31586533634466584277413d1Get hashmaliciousHTMLPhisherBrowse
                              • 104.17.25.14
                              Payout Receipt.pptxGet hashmaliciousHTMLPhisherBrowse
                              • 104.26.12.69
                              Hollandco-File-871871493.pdfGet hashmaliciousUnknownBrowse
                              • 104.17.25.14
                              https://jhansalazar.weebly.com/Get hashmaliciousUnknownBrowse
                              • 104.18.36.155
                              msvcp110.dllGet hashmaliciousLummaCBrowse
                              • 172.67.208.181
                              https://hblitigation-news.com/Get hashmaliciousUnknownBrowse
                              • 104.16.117.116
                              https://www.google.com/url?sa=t&url=https%3A%2F%2F%6d%6f%73%63%76%61%64%75%6d%61%2e%70%72%6f%2F&usg=AOvVaw0d8WU-1rxjmcdGQTa3JxQL&opi=Get hashmaliciousHTMLPhisherBrowse
                              • 104.21.2.159
                              http://ipscanadvsf.comGet hashmaliciousUnknownBrowse
                              • 104.18.11.207
                              https://www.ceolaser.com.mxGet hashmaliciousUnknownBrowse
                              • 104.18.86.42
                              QUOTATIONS#08673.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              37f463bf4616ecd445d4a1937da06e19presupuesto urgente.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              • 172.67.74.152
                              -pdf.bat.exeGet hashmaliciousGuLoaderBrowse
                              • 172.67.74.152
                              PEDIDO-144797.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              • 172.67.74.152
                              -pdf.bat.exeGet hashmaliciousFormBookBrowse
                              • 172.67.74.152
                              TERMENII CONTRACTULUI (ACORD NOU#U0102 COMAND#U0102)-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              • 172.67.74.152
                              Cotizaci#U00f3n#12643283.exeGet hashmaliciousGuLoaderBrowse
                              • 172.67.74.152
                              BnxBRWQWhy.exeGet hashmaliciousStealc, VidarBrowse
                              • 172.67.74.152
                              file.exeGet hashmaliciousRDPWrap Tool, Amadey, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                              • 172.67.74.152
                              file.exeGet hashmaliciousLummaC, VidarBrowse
                              • 172.67.74.152
                              NJna3TEAEr.exeGet hashmaliciousStealc, VidarBrowse
                              • 172.67.74.152
                              No context
                              Process:C:\Users\user\Desktop\setup_run.exe
                              File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                              Category:dropped
                              Size (bytes):1430016
                              Entropy (8bit):7.540258570611695
                              Encrypted:false
                              SSDEEP:24576:BjSpDfQz9S49fmFrkhmMFj3NvG3hic74AS0iO2QC65k5lYN/x85eU:BjS9fQzI4vmAj3NvUEcldfb
                              MD5:4AB64F8774087D5ABEE3D3E9948A9300
                              SHA1:CB42ED04A1B24FDAF69E830CAD784C43D573D0C4
                              SHA-256:17F9D20B69FBB1A76558AD6A16629246F9834FB4E0C9813235C7190A3EEB0C02
                              SHA-512:7A3251844D7D633F150A623A8C208376E884BAA00CD4E7162220F8C568A6FCB5C8CE7A024A43D0B55FDE3A2280A74C21DA8B8667793DF6AB7A6F9F8091DE51AC
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...ht.f..........."...)............`........................................@...........`... ..............................................................................0..............................@...(...................@................................text...............................`..`.data....[...0...\..................@....rdata...........0...v..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..............................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc.......0......................@..B........................................................................................................................................................................
                              Process:C:\Windows\System32\PING.EXE
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):275
                              Entropy (8bit):4.825671547285939
                              Encrypted:false
                              SSDEEP:6:PzXULmWxHLTpUrraGbsW3CNcwAFeMmvVOIHJFxMVlmJHaVFtIk3:P+pTpcraGbsTDAFSkIrxMVlmJHaVPN
                              MD5:048DC6B94735C4768D20ED5E3F14F565
                              SHA1:6B92CCD1E038396F675090384C6E8DFC742614ED
                              SHA-256:6D0C347234F09E710D6B842ED14CD27792E71E5B906E9E806E77AFE8FF08E1BE
                              SHA-512:88DF2342FFD4D303BEF828A12F7BEB505DC06E0BE6E91FF7FDA74DE31FAA289089557C036293EE3B0EE55A62D62CC804953C0D89591E662A0B513525AA40093E
                              Malicious:false
                              Reputation:low
                              Preview:..Pinging 1.1.1.1 with 32 bytes of data:..Reply from 1.1.1.1: bytes=32 time=6ms TTL=51....Ping statistics for 1.1.1.1:.. Packets: Sent = 1, Received = 1, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 6ms, Maximum = 6ms, Average = 6ms..
                              File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                              Entropy (8bit):7.76666898865644
                              TrID:
                              • Win64 Executable (generic) (12005/4) 74.95%
                              • Generic Win/DOS Executable (2004/3) 12.51%
                              • DOS Executable Generic (2002/1) 12.50%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                              File name:setup_run.exe
                              File size:1'766'400 bytes
                              MD5:f9e546bb5a4898d65b61f8b3d93a1662
                              SHA1:a4f5d8c4fec7657211c71c31f92d347cad13b1c8
                              SHA256:b1a638cc1c6fab24c26193035daa72cdc459deebf7a11de130cf41a4218e81d0
                              SHA512:a98fdb03a485051f33ea092b0805d2c2f3e2d3a3a58697a120459139ab2b6c94c27910467cc863ad78defcbf7d90f2edd81fb2356daa9f76bb448e9cf609e037
                              SSDEEP:49152:ubo95a6iGYtRzPWn9jbijSv3ZXYUYpyc2y5BkA:eBP0OSvZXwpcy5Bk
                              TLSH:BF85F20BA16317A8DA7BF03C82DBEB775FB4B4260353760A56B4EDB30C20A54C27655E
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...wt.f...............).@.....................@.............................P......bh....`... ............................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x1400014a0
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x140000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x66FF7477 [Fri Oct 4 04:52:07 2024 UTC]
                              TLS Callbacks:0x40018a80, 0x1, 0x40018a50, 0x1
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:0f602b167ea2edb2862b80167a856ba6
                              Instruction
                              dec eax
                              sub esp, 28h
                              dec eax
                              mov eax, dword ptr [001A6255h]
                              mov dword ptr [eax], 00000001h
                              call 00007FD1ECD128EFh
                              nop
                              nop
                              dec eax
                              add esp, 28h
                              ret
                              nop dword ptr [eax]
                              dec eax
                              sub esp, 28h
                              dec eax
                              mov eax, dword ptr [001A6235h]
                              mov dword ptr [eax], 00000000h
                              call 00007FD1ECD128CFh
                              nop
                              nop
                              dec eax
                              add esp, 28h
                              ret
                              nop dword ptr [eax]
                              dec eax
                              sub esp, 28h
                              call 00007FD1ECD32F14h
                              dec eax
                              cmp eax, 01h
                              sbb eax, eax
                              dec eax
                              add esp, 28h
                              ret
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              dec eax
                              lea ecx, dword ptr [00000009h]
                              jmp 00007FD1ECD12BF9h
                              nop dword ptr [eax+00h]
                              ret
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              dec eax
                              mov ecx, dword ptr [001AEB19h]
                              dec eax
                              test ecx, ecx
                              je 00007FD1ECD12C36h
                              mov edx, 00000080h
                              jmp 00007FD1ECD5560Fh
                              nop word ptr [eax+eax+00000000h]
                              ret
                              nop word ptr [eax+eax+00000000h]
                              nop dword ptr [eax+00h]
                              dec eax
                              mov eax, ecx
                              mov ecx, edx
                              dec eax
                              ror eax, cl
                              ret
                              nop dword ptr [eax+00000000h]
                              dec eax
                              mov eax, dword ptr [edx]
                              dec eax
                              add eax, dword ptr [esp+28h]
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1b10000xc0c.idata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1a90000x2fdc.pdata
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b40000x454.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x1a6d400x28.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x1b12f80x2b8.idata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x43f700x440008d433492df9f502060d4f14164bb50d2False0.3938455020680147data6.170003517934829IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .data0x450000x2300x400830dd06eb053a46603697fd167559c45False0.107421875data0.8895331905131053IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rdata0x460000x162f400x1630006bd413a4b6a90979728a39c423ad2237False0.7709286971830986data7.859176318674573IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .pdata0x1a90000x2fdc0x3000b9dedd6068d92fee0b019287dfdb93f6False0.5152994791666666data5.678550646076363IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .xdata0x1ac0000x32a80x340004fbf7a6728bf7eae9ddf87253171fabFalse0.16180889423076922data4.4029397090966205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .bss0x1b00000xbb00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .idata0x1b10000xc0c0xe00e30d04166fad4560c9a1095813a69d1aFalse0.29910714285714285data3.9564641114749772IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .CRT0x1b20000x600x200f303315166bc328516c2f9cb549a03a4False0.06640625data0.3124937745953951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .tls0x1b30000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .reloc0x1b40000x4540x600565a12b38b27deb85ef54f02657041eaFalse0.4908854166666667GLS_BINARY_LSB_FIRST4.531455055422804IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              DLLImport
                              KERNEL32.dllCloseHandle, CreateFileW, CreateToolhelp32Snapshot, DeleteCriticalSection, EnterCriticalSection, FormatMessageA, GetCurrentProcess, GetLastError, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetStartupInfoA, GetThreadId, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, LocalFree, MultiByteToWideChar, Process32First, Process32Next, RaiseException, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetLastError, SetUnhandledExceptionFilter, Sleep, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualProtect, VirtualQuery, WideCharToMultiByte
                              msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _errno, _fmode, _initterm, _onexit, _strlwr, abort, calloc, exit, fprintf, fputc, fputs, free, fwrite, getenv, localeconv, malloc, memchr, memcmp, memcpy, memmove, memset, realloc, signal, strchr, strcmp, strcpy_s, strerror, strlen, strncmp, strstr, strtoul, vfprintf, wcslen, _read
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-10-04T15:16:24.223718+02002049441ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt1192.168.2.949705109.107.181.16215666TCP
                              2024-10-04T15:16:24.223718+02002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.949705109.107.181.16215666TCP
                              2024-10-04T15:16:24.223718+02002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.949705109.107.181.16215666TCP
                              2024-10-04T15:16:24.338303+02002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.949705109.107.181.16215666TCP
                              2024-10-04T15:16:24.338303+02002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.949705109.107.181.16215666TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Oct 4, 2024 15:16:17.225641012 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:17.823184967 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:17.823337078 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:19.672213078 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:19.672255993 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:19.672373056 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:19.682329893 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:19.682353020 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:20.170902967 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:20.171010971 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:20.228884935 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:20.228908062 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:20.229357004 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:20.229423046 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:20.230668068 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:20.275402069 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:20.340538025 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:20.340696096 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:20.340713024 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:20.340769053 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:20.340811014 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:20.340850115 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:20.340866089 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:20.340910912 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:20.340980053 CEST49706443192.168.2.9172.67.74.152
                              Oct 4, 2024 15:16:20.340993881 CEST44349706172.67.74.152192.168.2.9
                              Oct 4, 2024 15:16:24.223717928 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.338181019 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.338195086 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.338206053 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.338253975 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.338303089 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.338314056 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.338319063 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.338371038 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.338393927 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.338587999 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.338598013 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.338625908 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.338655949 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.338834047 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.338907957 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.339050055 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.339123011 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.343328953 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343341112 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343363047 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343378067 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343403101 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343411922 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343411922 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.343422890 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343497038 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.343501091 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343550920 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.343668938 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343684912 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343714952 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.343728065 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.343883991 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.343936920 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.343961000 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.344007969 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.344078064 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.344124079 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.348452091 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.348507881 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.348561049 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.348571062 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.348623037 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.348639011 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.348639965 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.348697901 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.348750114 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.348789930 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.349087954 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349098921 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349107981 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349112034 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349119902 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349128962 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349137068 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349149942 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.349153996 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349163055 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349167109 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.349172115 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.349198103 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.349210978 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.349350929 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353409052 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353420019 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353427887 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353470087 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353477955 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353523970 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353542089 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353543997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353552103 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353595972 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353602886 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353611946 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353621006 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353630066 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353635073 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353657961 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353712082 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353744984 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353754997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353765011 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353801966 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353836060 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353916883 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.353919029 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353966951 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.353986025 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354032993 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354526043 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354536057 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354543924 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354552984 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354561090 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354568958 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354578018 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354579926 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354582071 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354589939 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354598999 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354608059 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354610920 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354614973 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354621887 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354624033 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354634047 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354643106 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354644060 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354650974 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354660034 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354684114 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354702950 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354809999 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354820013 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354827881 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354835987 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354856014 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354861975 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354866982 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354872942 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354886055 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354893923 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354902029 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354911089 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354918957 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354921103 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354928017 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354937077 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354944944 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354949951 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.354953051 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354962111 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354969978 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.354984999 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.355012894 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.355025053 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.355118990 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355128050 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355135918 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355144978 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355153084 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355160952 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355169058 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355169058 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.355178118 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355190992 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.355192900 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355226040 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.355227947 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.355240107 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.355289936 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358320951 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358429909 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358504057 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358553886 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358598948 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358608007 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358618021 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358634949 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358642101 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358666897 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358711958 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358721018 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358725071 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358730078 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358752966 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358761072 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358766079 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358768940 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358778000 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358786106 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358803988 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358831882 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358872890 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358882904 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358900070 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358910084 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358912945 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358923912 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358949900 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.358953953 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.358994007 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.359510899 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359569073 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.359587908 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359597921 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359607935 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359625101 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359633923 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359642982 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359647036 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359651089 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359658957 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.359661102 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359668970 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359669924 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.359683990 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.359708071 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.359733105 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360061884 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360080004 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360089064 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360097885 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360106945 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360115051 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360124111 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360133886 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360160112 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360176086 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360183954 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360192060 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360194921 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360213041 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360217094 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360220909 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360230923 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360268116 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360302925 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360304117 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360312939 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360321045 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360331059 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360348940 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360352993 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360357046 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360373020 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360379934 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360383034 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360399961 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360407114 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360409021 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360418081 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360431910 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360435009 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360440969 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360449076 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360467911 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360487938 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360569000 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360599995 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360610008 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360620975 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360641956 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360651016 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360651970 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360658884 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360667944 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360672951 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360676050 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360685110 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360692978 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360697031 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360702991 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360704899 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360713005 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360721111 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360723019 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360728979 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360737085 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360760927 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360790014 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360920906 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360929966 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360939026 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360948086 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360955954 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360964060 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360964060 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.360971928 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.360980988 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361027002 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.361196041 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361206055 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361212969 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361234903 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361241102 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.361243010 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361252069 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361259937 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361268044 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361285925 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.361299992 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.361320972 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.361355066 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.361514091 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.361979961 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362000942 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362010956 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362019062 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362054110 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362070084 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362077951 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362116098 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362137079 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362181902 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362191916 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362200022 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362207890 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362231970 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362281084 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362282038 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362324953 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362324953 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362334967 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362344027 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362353086 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362363100 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362396002 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362426043 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362479925 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362489939 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362498999 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362507105 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362515926 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362524033 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362551928 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362580061 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362607956 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362617970 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362626076 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362633944 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362694025 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362770081 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362780094 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.362803936 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.362828016 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.363032103 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363042116 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363049984 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363079071 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.363128901 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.363492012 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363502026 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363509893 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363571882 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.363858938 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363868952 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363877058 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363886118 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363893986 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363902092 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363909006 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.363933086 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.363957882 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.363986015 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.363995075 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364002943 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364012003 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364018917 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364027977 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364036083 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364043951 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364052057 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364052057 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364062071 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364070892 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364079952 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364084005 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364088058 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364111900 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364141941 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364207983 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364249945 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364253044 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364262104 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364289999 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364299059 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364305019 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364335060 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364384890 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364394903 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364403009 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364428997 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364458084 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364521980 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364531040 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364540100 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364542961 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364551067 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364562035 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364569902 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364578009 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364586115 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364588022 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364619970 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364634991 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364784956 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364794970 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364844084 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364880085 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364888906 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364897013 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364929914 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364929914 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364938021 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.364947081 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.364985943 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365017891 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365026951 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365036011 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365067005 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365113020 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365125895 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365214109 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365222931 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365236044 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365258932 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365267038 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365287066 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365295887 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365305901 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365328074 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365336895 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365345955 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365355968 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365370989 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365398884 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365401030 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365410089 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365448952 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365502119 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365511894 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365520000 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365542889 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365571976 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365626097 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365670919 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365675926 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365684986 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365732908 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.365891933 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365900993 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.365945101 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366014957 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366024971 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366046906 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366055965 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366061926 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366064072 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366072893 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366081953 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366089106 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366120100 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366146088 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366180897 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366189957 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366219997 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366245031 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366254091 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366261959 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366317034 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366384029 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366429090 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366436005 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366445065 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366453886 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366461992 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366482973 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366554022 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366594076 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366602898 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366611958 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366647959 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366691113 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366700888 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366708994 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366718054 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366727114 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366738081 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366767883 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366827011 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366837025 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366844893 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366852999 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366861105 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366868973 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366873026 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366877079 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366885900 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366894007 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.366904974 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366930962 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.366986036 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367039919 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367059946 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367069006 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367077112 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367082119 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367085934 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367094994 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367103100 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367105961 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367111921 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367120981 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367130041 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367131948 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367150068 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367158890 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367161036 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367176056 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367188931 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367191076 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367199898 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367208004 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367216110 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367219925 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367223978 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367232084 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367239952 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367240906 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367244005 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367253065 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367261887 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367275000 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367294073 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367306948 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367307901 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367317915 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367326021 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367335081 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367342949 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367351055 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367357016 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367358923 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367367029 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367374897 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367377043 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367398024 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367405891 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367414951 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367423058 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367424011 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367433071 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367440939 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367448092 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367449045 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367460012 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367466927 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367480993 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367496014 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367522955 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367556095 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367563963 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367573023 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367580891 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367588997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367597103 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367621899 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367646933 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367681026 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367691040 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367700100 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367707968 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367716074 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367723942 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367732048 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367739916 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367744923 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367757082 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367788076 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367842913 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367851973 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367860079 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367862940 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.367882013 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.367908955 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.409904003 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.410099030 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.410468102 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.410522938 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.410569906 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.410650969 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.410696983 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.410778999 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.410826921 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.410888910 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.410934925 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.411000013 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.411043882 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.430862904 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.431138039 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.431219101 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.431274891 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.431337118 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.431366920 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.436793089 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.436959982 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.437036991 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.437081099 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.477863073 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.480473042 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.524430990 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.524657011 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.524988890 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525051117 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525114059 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525207043 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525260925 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525335073 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525381088 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525441885 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525489092 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525557995 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525605917 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525675058 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.525691032 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.529597998 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.532226086 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.569827080 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.572506905 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.572638988 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.572700977 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.572741985 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.584822893 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.584836960 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.585284948 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.585386992 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.585428953 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.590338945 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.592976093 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.593077898 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.593127012 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.633894920 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.633996964 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.658504963 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.658622980 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.658668995 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.658718109 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.658768892 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.658824921 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.658890009 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.658935070 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.658987045 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.659008026 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.666376114 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.668431044 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.706270933 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.708364964 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.727895021 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.728184938 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.728209019 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.728296995 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.728358030 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.728408098 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.728458881 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.728518963 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.728566885 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.728631020 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.728653908 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.736793041 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.740534067 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.740603924 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.740652084 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.740711927 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.740762949 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.740824938 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.740844011 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.776287079 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.777931929 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.791346073 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.792576075 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.792654991 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793061972 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793128014 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793167114 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793222904 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793263912 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793308973 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793348074 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793399096 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793437958 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793484926 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793538094 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793587923 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.793637037 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.804815054 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804828882 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804836988 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804846048 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804853916 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804862976 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804872036 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804898024 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.804899931 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804910898 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804919958 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804928064 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804934025 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.804951906 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.804976940 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.804985046 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.804994106 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805002928 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805021048 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805037022 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805051088 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805057049 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805059910 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805068970 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805072069 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805088997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805099010 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805099010 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805125952 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805152893 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805372000 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805382013 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805401087 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805409908 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805427074 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805449009 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805525064 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805609941 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805654049 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805675983 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805685997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805726051 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805773973 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805783033 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805828094 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805830956 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805849075 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805893898 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805901051 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805910110 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805931091 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.805948973 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805969000 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.805999041 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806057930 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806061029 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.806081057 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806128979 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.806205988 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806294918 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806343079 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.806376934 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806557894 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806566954 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806603909 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806607008 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.806612968 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806622028 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806652069 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.806724072 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806731939 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.806734085 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806742907 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.806781054 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.806798935 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807003975 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807018042 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807027102 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807035923 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807044983 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807070971 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807076931 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807084084 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807086945 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807095051 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807104111 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807112932 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807121038 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807136059 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807176113 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807204008 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807214022 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807264090 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807707071 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807718992 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807727098 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807738066 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807745934 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807754993 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807763100 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807770967 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807771921 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807780027 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807789087 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807797909 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807799101 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807806015 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807815075 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807822943 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807832003 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807833910 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807841063 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807848930 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807857990 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807873011 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807893038 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807904959 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.807959080 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807967901 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807976961 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807985067 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.807992935 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808001995 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808010101 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808011055 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.808020115 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808022022 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.808028936 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808037996 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808067083 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.808079004 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.808151960 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808162928 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808171034 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808181047 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808188915 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808197975 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808203936 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.808206081 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808216095 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808223963 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808232069 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.808233023 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808240891 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.808271885 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.808311939 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.812525034 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.812604904 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.812863111 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.812963963 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.813400984 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813410997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813450098 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.813502073 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813512087 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813519955 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813529015 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813538074 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813543081 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.813545942 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813555002 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813564062 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813570976 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.813571930 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813580990 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.813606024 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.813627005 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.814007044 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814017057 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814058065 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.814121008 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814130068 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814137936 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814146996 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814155102 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814165115 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814172983 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814177036 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.814182043 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814189911 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814198017 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814207077 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814208031 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.814214945 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.814237118 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.814273119 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.842304945 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843875885 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843885899 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843894958 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843904018 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843911886 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843919992 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843928099 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843936920 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843945026 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.843952894 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844156981 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844166994 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844175100 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844177961 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844187975 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844197035 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844204903 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844213009 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844213963 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844223022 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844274044 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844316959 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844361067 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844405890 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844472885 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844512939 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844521999 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844540119 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844548941 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844558001 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844558954 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844567060 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844575882 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844599962 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844609022 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844619036 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844628096 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844635963 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844644070 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844645023 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844652891 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844661951 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844671011 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844681025 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844686985 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844688892 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844698906 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844715118 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844738960 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844747066 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844749928 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844758987 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844768047 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844777107 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844784975 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844793081 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844794035 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844801903 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844819069 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844827890 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844835997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844846010 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844849110 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844856024 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844863892 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.844891071 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.844958067 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845010996 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845086098 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845092058 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845096111 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845103979 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845108032 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845112085 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845118046 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845122099 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845130920 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845140934 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845150948 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845159054 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845170975 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845171928 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845180035 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845189095 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845196962 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845206022 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845206976 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845215082 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845223904 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845223904 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845232010 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845241070 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845251083 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845251083 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845259905 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845268965 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845272064 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845278025 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845284939 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845288992 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845299006 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845309973 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845318079 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845319033 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845323086 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845326900 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845330000 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845346928 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845360994 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845371962 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845376968 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845386028 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845393896 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845402956 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845411062 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845419884 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845427990 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845438004 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845447063 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845453978 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845457077 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845465899 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845474005 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845488071 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845524073 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845643997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845654011 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845662117 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845670938 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.845691919 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.845711946 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.852946997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.852957964 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853060961 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853174925 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853184938 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853193998 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853197098 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853200912 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853204012 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853208065 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853238106 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853245974 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853255033 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853266954 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853287935 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853312016 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853317976 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853327036 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853360891 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853400946 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853416920 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853425980 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853435040 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853455067 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853462934 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853480101 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853485107 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853499889 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853507996 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853509903 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853518963 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853528023 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853530884 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853537083 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853547096 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853600025 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853601933 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853609085 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853617907 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853626966 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.853665113 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.853698969 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.854995966 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.855005026 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.855015039 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.855024099 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.855032921 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.855072021 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.855099916 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856164932 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856175900 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856184006 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856188059 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856192112 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856208086 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856218100 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856236935 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856245041 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856247902 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856255054 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856262922 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856271982 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856273890 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856281996 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856292009 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856300116 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856298923 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856307983 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856317997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856321096 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856324911 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856333971 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856337070 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856343031 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856350899 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856359959 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856360912 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856369019 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856374025 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856384993 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856394053 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856398106 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856403112 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856415033 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856420040 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856429100 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856437922 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856446981 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856453896 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856458902 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856468916 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856487989 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856488943 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856498003 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856502056 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856507063 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856515884 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856530905 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856539965 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856540918 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856548071 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856556892 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856564999 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856573105 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856581926 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856585979 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856590033 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856599092 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856606960 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856616020 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856623888 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856637955 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856642962 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856652021 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856652975 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856662035 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856663942 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856672049 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856681108 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.856707096 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.856722116 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.857337952 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.857350111 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.857359886 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.857367992 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.857377052 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.857420921 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.858011961 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858022928 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858032942 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858042955 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858051062 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858052969 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.858059883 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858068943 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858077049 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858086109 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858095884 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858103037 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.858103991 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858113050 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858122110 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858130932 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858133078 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.858139992 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858148098 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858151913 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.858158112 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858165979 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858175039 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858184099 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858191967 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858202934 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.858215094 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.858234882 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.858269930 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860027075 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860037088 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860044956 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860049009 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860052109 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860059977 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860069036 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860078096 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860100031 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860110044 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860121012 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860130072 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860133886 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860137939 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860141993 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860145092 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860150099 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860158920 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860167980 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860196114 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860208035 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860218048 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860225916 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860234976 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860236883 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860243082 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860251904 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860251904 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860260963 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860270023 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860281944 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860290051 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860299110 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860301018 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860307932 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860316038 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860326052 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860331059 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860335112 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860342979 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860352039 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860356092 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860359907 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860372066 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860379934 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860388041 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860389948 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860397100 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860403061 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860405922 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860414982 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860423088 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860433102 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860435009 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860441923 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860450983 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860460043 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860466957 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860482931 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860488892 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860500097 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860502005 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860507965 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860517025 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860527039 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860533953 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860542059 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860551119 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860558987 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860583067 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860591888 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860605001 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.860935926 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.860996008 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.861087084 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861095905 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861104012 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861113071 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861155033 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.861165047 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861175060 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861181974 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861191034 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861192942 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.861200094 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861208916 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861217022 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861226082 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861233950 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861234903 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.861243010 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861252069 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861258030 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.861260891 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861268997 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861278057 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861285925 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861289978 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861293077 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.861299038 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.861308098 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.861340046 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.866218090 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.866481066 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.866491079 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.866650105 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.866666079 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.866704941 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.866874933 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.866962910 CEST1566649705109.107.181.162192.168.2.9
                              Oct 4, 2024 15:16:24.866965055 CEST4970515666192.168.2.9109.107.181.162
                              Oct 4, 2024 15:16:24.867142916 CEST4970515666192.168.2.9109.107.181.162
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Oct 4, 2024 15:16:19.658694029 CEST192.168.2.91.1.1.10x378dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Oct 4, 2024 15:16:19.666352987 CEST1.1.1.1192.168.2.90x378dNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                              Oct 4, 2024 15:16:19.666352987 CEST1.1.1.1192.168.2.90x378dNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                              Oct 4, 2024 15:16:19.666352987 CEST1.1.1.1192.168.2.90x378dNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.949706172.67.74.1524436156C:\Users\user\Desktop\setup_run.exe
                              TimestampBytes transferredDirectionData
                              2024-10-04 13:16:20 UTC100OUTGET / HTTP/1.1
                              Accept: text/html; text/plain; */*
                              Host: api.ipify.org
                              Cache-Control: no-cache
                              2024-10-04 13:16:20 UTC211INHTTP/1.1 200 OK
                              Date: Fri, 04 Oct 2024 13:16:20 GMT
                              Content-Type: text/plain
                              Content-Length: 11
                              Connection: close
                              Vary: Origin
                              CF-Cache-Status: DYNAMIC
                              Server: cloudflare
                              CF-RAY: 8cd57222bbc243b8-EWR
                              2024-10-04 13:16:20 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                              Data Ascii: 8.46.123.33


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:09:16:16
                              Start date:04/10/2024
                              Path:C:\Users\user\Desktop\setup_run.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\setup_run.exe"
                              Imagebase:0x7ff650a10000
                              File size:1'766'400 bytes
                              MD5 hash:F9E546BB5A4898D65B61F8B3D93A1662
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:09:16:16
                              Start date:04/10/2024
                              Path:C:\Users\user\Desktop\setup_run.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\setup_run.exe"
                              Imagebase:0x7ff650a10000
                              File size:1'766'400 bytes
                              MD5 hash:F9E546BB5A4898D65B61F8B3D93A1662
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:7
                              Start time:09:17:15
                              Start date:04/10/2024
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\setup_run.exe"
                              Imagebase:0x7ff7087c0000
                              File size:289'792 bytes
                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:8
                              Start time:09:17:15
                              Start date:04/10/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff70f010000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:9
                              Start time:09:17:16
                              Start date:04/10/2024
                              Path:C:\Windows\System32\PING.EXE
                              Wow64 process (32bit):false
                              Commandline:ping 1.1.1.1 -n 1 -w 3000
                              Imagebase:0x7ff611d00000
                              File size:22'528 bytes
                              MD5 hash:2F46799D79D22AC72C241EC0322B011D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:1.3%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:28.6%
                                Total number of Nodes:273
                                Total number of Limit Nodes:10
                                execution_graph 29198 7ff8e7b011d0 29199 7ff8e7b011f3 29198->29199 29200 7ff8e7b01248 29198->29200 29204 7ff8e7b0126a 29199->29204 29223 7ff8e7b177c0 29199->29223 29201 7ff8e7b177c0 15 API calls 29200->29201 29202 7ff8e7b0124d 29201->29202 29202->29204 29250 7ff8e7b01010 29202->29250 29206 7ff8e7b01202 29206->29204 29209 7ff8e7b012a5 29206->29209 29210 7ff8e7b01288 Sleep 29206->29210 29207 7ff8e7b01266 29207->29204 29208 7ff8e7b012d9 29207->29208 29215 7ff8e7b01318 29207->29215 29208->29204 29267 7ff8e7b17480 29208->29267 29211 7ff8e7b012b7 _amsg_exit 29209->29211 29212 7ff8e7b013b0 29209->29212 29210->29206 29211->29204 29262 7ff8e7b1f7b0 29212->29262 29215->29204 29216 7ff8e7b01350 Sleep 29215->29216 29217 7ff8e7b0136c 29215->29217 29216->29215 29218 7ff8e7b01390 29217->29218 29219 7ff8e7b0137e _amsg_exit 29217->29219 29220 7ff8e7b1f7b0 3 API calls 29218->29220 29219->29204 29220->29204 29221 7ff8e7b013d5 29221->29204 29221->29217 29222 7ff8e7b01438 Sleep 29221->29222 29222->29221 29224 7ff8e7b177e1 29223->29224 29225 7ff8e7b177f8 29223->29225 29224->29206 29225->29224 29226 7ff8e7b17af0 29225->29226 29232 7ff8e7b179f8 29225->29232 29242 7ff8e7b17870 29225->29242 29226->29224 29227 7ff8e7b17af9 29226->29227 29231 7ff8e7b17b1d 29227->29231 29273 7ff8e7b17650 12 API calls 29227->29273 29229 7ff8e7b17b46 29276 7ff8e7b175e0 12 API calls 29229->29276 29274 7ff8e7b175e0 12 API calls 29231->29274 29233 7ff8e7b17a38 29232->29233 29236 7ff8e7b17b30 29232->29236 29233->29236 29271 7ff8e7b17650 12 API calls 29233->29271 29235 7ff8e7b17a58 29235->29236 29238 7ff8e7b17a4a 29235->29238 29275 7ff8e7b175e0 12 API calls 29236->29275 29237 7ff8e7b17b76 29237->29206 29238->29235 29238->29236 29272 7ff8e7b17650 12 API calls 29238->29272 29240 7ff8e7b17b52 29240->29237 29243 7ff8e7b17b97 EnterCriticalSection LeaveCriticalSection 29240->29243 29242->29224 29242->29229 29242->29231 29242->29232 29242->29235 29242->29236 29245 7ff8e7b178e2 29242->29245 29243->29237 29245->29236 29245->29242 29246 7ff8e7b17650 12 API calls 29245->29246 29247 7ff8e7b17960 29245->29247 29249 7ff8e7b1795d 29245->29249 29246->29245 29247->29224 29248 7ff8e7b17994 VirtualProtect 29247->29248 29248->29224 29248->29249 29249->29247 29249->29248 29251 7ff8e7b01026 29250->29251 29253 7ff8e7b010a0 29250->29253 29254 7ff8e7b01050 Sleep 29251->29254 29255 7ff8e7b0106c 29251->29255 29261 7ff8e7b01088 29251->29261 29252 7ff8e7b010e6 29260 7ff8e7b01180 _initterm 29252->29260 29252->29261 29253->29252 29256 7ff8e7b010d1 Sleep 29253->29256 29253->29261 29254->29251 29257 7ff8e7b01140 29255->29257 29258 7ff8e7b0107e _amsg_exit 29255->29258 29256->29253 29259 7ff8e7b1f7b0 3 API calls 29257->29259 29258->29261 29259->29261 29260->29261 29261->29207 29263 7ff8e7b1f7c4 29262->29263 29264 7ff8e7b1f80d 29263->29264 29265 7ff8e7b1f805 free 29263->29265 29277 7ff8e7b22200 29263->29277 29264->29204 29265->29264 29268 7ff8e7b17490 29267->29268 29269 7ff8e7b174a0 29267->29269 29268->29221 29285 7ff8e7b222c0 29269->29285 29271->29238 29272->29238 29273->29227 29274->29236 29275->29229 29276->29240 29278 7ff8e7b22218 29277->29278 29279 7ff8e7b2220d 29277->29279 29282 7ff8e7b183a0 TlsFree 29278->29282 29279->29263 29283 7ff8e7b183b8 GetLastError 29282->29283 29284 7ff8e7b183ae 29282->29284 29284->29263 29286 7ff8e7b222dd 29285->29286 29288 7ff8e7b22486 strtoul 29286->29288 29289 7ff8e7b22355 malloc 29286->29289 29290 7ff8e7b223af memcmp 29286->29290 29288->29286 29290->29286 29291 7ff8e7b01a10 29296 7ff8e7b01500 29291->29296 29293 7ff8e7b01a21 29299 7ff8e7b01690 LoadLibraryA LoadLibraryA 29293->29299 29311 7ff8e7b21c20 29296->29311 29298 7ff8e7b01524 29298->29293 29300 7ff8e7b01744 29299->29300 29301 7ff8e7b018b2 29299->29301 29300->29301 29302 7ff8e7b0174d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 29300->29302 29303 7ff8e7b01837 29302->29303 29304 7ff8e7b018a0 FreeLibrary FreeLibrary 29302->29304 29303->29304 29305 7ff8e7b0184c GetModuleFileNameA CreateProcessA 29303->29305 29304->29301 29306 7ff8e7b018c6 VirtualAlloc GetThreadContext 29305->29306 29307 7ff8e7b0189b 29305->29307 29306->29304 29308 7ff8e7b018fb VirtualAllocEx WriteProcessMemory 29306->29308 29307->29304 29309 7ff8e7b01960 WriteProcessMemory WriteProcessMemory 29308->29309 29310 7ff8e7b019cc SetThreadContext ResumeThread WaitForSingleObject 29308->29310 29309->29309 29309->29310 29310->29304 29312 7ff8e7b21c34 malloc 29311->29312 29313 7ff8e7b21c41 29312->29313 29314 7ff8e7b21c47 29312->29314 29313->29298 29314->29312 29315 7ff8e7b21c55 29314->29315 29326 7ff8e7b21d00 26 API calls 29315->29326 29317 7ff8e7b21c5f 29327 7ff8e7b22120 23 API calls 29317->29327 29319 7ff8e7b21c83 malloc 29320 7ff8e7b21cde 29319->29320 29321 7ff8e7b21ca7 29319->29321 29328 7ff8e7b212c0 26 API calls 29320->29328 29321->29298 29323 7ff8e7b21ce8 29323->29321 29329 7ff8e7b22230 17 API calls 29323->29329 29326->29317 29327->29319 29328->29323 29330 7ff650a114a0 29333 7ff650a11180 29330->29333 29332 7ff650a114b6 29334 7ff650a11440 GetStartupInfoA 29333->29334 29335 7ff650a111b2 29333->29335 29342 7ff650a1139e 29334->29342 29336 7ff650a111d9 Sleep 29335->29336 29337 7ff650a111e9 29335->29337 29336->29335 29338 7ff650a1140c _initterm 29337->29338 29339 7ff650a1121c 29337->29339 29337->29342 29338->29339 29351 7ff650a28e10 29339->29351 29341 7ff650a11244 SetUnhandledExceptionFilter 29344 7ff650a11267 29341->29344 29342->29332 29343 7ff650a112fe malloc 29343->29342 29345 7ff650a11329 29343->29345 29344->29343 29346 7ff650a11330 strlen malloc memcpy 29345->29346 29346->29346 29347 7ff650a11362 29346->29347 29376 7ff650a289b0 29347->29376 29352 7ff650a28e31 29351->29352 29353 7ff650a28e48 29351->29353 29352->29341 29353->29352 29354 7ff650a29140 29353->29354 29360 7ff650a29048 29353->29360 29370 7ff650a28ec0 29353->29370 29354->29352 29355 7ff650a29149 29354->29355 29359 7ff650a2916d 29355->29359 29395 7ff650a28ca0 8 API calls 29355->29395 29357 7ff650a29196 29398 7ff650a28c30 8 API calls 29357->29398 29396 7ff650a28c30 8 API calls 29359->29396 29361 7ff650a29088 29360->29361 29364 7ff650a29180 29360->29364 29361->29364 29393 7ff650a28ca0 8 API calls 29361->29393 29362 7ff650a291a2 29362->29341 29363 7ff650a290a8 29363->29364 29366 7ff650a2909a 29363->29366 29397 7ff650a28c30 8 API calls 29364->29397 29366->29363 29366->29364 29394 7ff650a28ca0 8 API calls 29366->29394 29370->29352 29370->29357 29370->29359 29370->29360 29370->29363 29370->29364 29372 7ff650a28f32 29370->29372 29371 7ff650a28ca0 8 API calls 29371->29372 29372->29364 29372->29370 29372->29371 29373 7ff650a28fb0 29372->29373 29375 7ff650a28fad 29372->29375 29373->29352 29374 7ff650a28fe4 VirtualProtect 29373->29374 29374->29352 29374->29375 29375->29373 29375->29374 29377 7ff650a11378 29376->29377 29378 7ff650a289d0 29376->29378 29380 7ff650a54560 29377->29380 29399 7ff650a54b60 29378->29399 29381 7ff650a289b0 3 API calls 29380->29381 29382 7ff650a54569 29381->29382 29405 7ff650a129e0 29382->29405 29385 7ff650a5457b 29410 7ff650a11b80 29385->29410 29386 7ff650a54572 29459 7ff650a12aa0 GetModuleHandleA 29386->29459 29389 7ff650a54577 29389->29385 29391 7ff650a54585 29389->29391 29391->29342 29393->29366 29394->29366 29395->29355 29396->29364 29397->29357 29398->29362 29400 7ff650a54b7d 29399->29400 29401 7ff650a54d26 strtoul 29400->29401 29403 7ff650a54bf5 malloc 29400->29403 29404 7ff650a54c4f memcmp 29400->29404 29401->29400 29404->29400 29406 7ff650a12a28 29405->29406 29407 7ff650a12a2c strcmp 29406->29407 29408 7ff650a12a80 29406->29408 29407->29408 29409 7ff650a12a56 strcmp 29407->29409 29408->29385 29408->29386 29409->29408 29460 7ff650a53f30 29410->29460 29412 7ff650a11b90 29475 7ff650a11a80 29412->29475 29415 7ff650a11a80 35 API calls 29416 7ff650a11c0e 29415->29416 29417 7ff650a11a80 35 API calls 29416->29417 29418 7ff650a11c3e 29417->29418 29419 7ff650a11a80 35 API calls 29418->29419 29420 7ff650a11c75 29419->29420 29421 7ff650a11a80 35 API calls 29420->29421 29422 7ff650a11ca7 29421->29422 29423 7ff650a11a80 35 API calls 29422->29423 29424 7ff650a11cd1 29423->29424 29425 7ff650a11a80 35 API calls 29424->29425 29426 7ff650a11d0e 29425->29426 29427 7ff650a124b0 GetModuleFileNameW 29426->29427 29428 7ff650a12532 29427->29428 29429 7ff650a1254a 29428->29429 29528 7ff650a50230 41 API calls 29428->29528 29430 7ff650a12555 29429->29430 29432 7ff650a12890 memcpy 29429->29432 29494 7ff650a11e00 29430->29494 29434 7ff650a128aa 29432->29434 29529 7ff650a50230 41 API calls 29434->29529 29436 7ff650a128c2 memcpy 29437 7ff650a125bf 29438 7ff650a12602 LoadLibraryA GetModuleHandleA GetProcAddress GetProcAddress 29437->29438 29457 7ff650a12828 29437->29457 29440 7ff650a126cd GetProcAddress 29438->29440 29441 7ff650a126e4 29440->29441 29440->29457 29442 7ff650a126ed wcslen 29441->29442 29441->29457 29442->29434 29443 7ff650a12716 29442->29443 29443->29436 29444 7ff650a12728 wcslen 29443->29444 29445 7ff650a1298a 29444->29445 29446 7ff650a1277a 29444->29446 29530 7ff650a54810 41 API calls 29445->29530 29521 7ff650a50070 29446->29521 29450 7ff650a12785 29452 7ff650a127ec LdrLoadDll 29450->29452 29454 7ff650a127ff GetProcAddress 29452->29454 29452->29457 29455 7ff650a12820 GetCurrentProcess 29454->29455 29454->29457 29455->29457 29457->29391 29459->29389 29461 7ff650a53f44 malloc 29460->29461 29462 7ff650a53f51 29461->29462 29464 7ff650a53f57 29461->29464 29462->29412 29463 7ff650a53f65 29484 7ff650a54010 26 API calls 29463->29484 29464->29461 29464->29463 29466 7ff650a53f6f 29485 7ff650a54430 23 API calls 29466->29485 29468 7ff650a53f93 malloc 29469 7ff650a53fb7 29468->29469 29470 7ff650a53fee 29468->29470 29469->29412 29486 7ff650a32b70 26 API calls 29470->29486 29472 7ff650a53ff8 29472->29469 29487 7ff650a545a0 17 API calls 29472->29487 29488 7ff650a118e0 29475->29488 29478 7ff650a11b4d 29478->29415 29481 7ff650a11aac 29481->29478 29482 7ff650a11b43 29481->29482 29493 7ff650a115b0 strlen 29481->29493 29483 7ff650a53f30 28 API calls 29482->29483 29483->29478 29484->29466 29485->29468 29486->29472 29489 7ff650a11a12 29488->29489 29491 7ff650a1192e 29488->29491 29489->29478 29492 7ff650a115b0 strlen 29489->29492 29490 7ff650a11960 6 API calls 29490->29491 29491->29489 29491->29490 29492->29481 29493->29481 29495 7ff650a53f30 28 API calls 29494->29495 29496 7ff650a11e23 memcpy 29495->29496 29497 7ff650a11e90 29496->29497 29497->29497 29502 7ff650a11ef5 29497->29502 29531 7ff650a50230 41 API calls 29497->29531 29499 7ff650a120ab wcslen 29532 7ff650a4fec0 43 API calls 29499->29532 29501 7ff650a1210c 29503 7ff650a50070 45 API calls 29501->29503 29509 7ff650a1244f 29501->29509 29502->29499 29507 7ff650a121d2 29502->29507 29504 7ff650a12137 29503->29504 29506 7ff650a50070 45 API calls 29504->29506 29504->29509 29505 7ff650a54810 41 API calls 29505->29509 29510 7ff650a12160 29506->29510 29507->29509 29520 7ff650a121ec 29507->29520 29508 7ff650a121b1 29508->29509 29512 7ff650a50070 45 API calls 29508->29512 29509->29505 29534 7ff650a2a0a0 RtlCaptureContext RtlUnwindEx abort 29509->29534 29510->29508 29513 7ff650a12330 29510->29513 29512->29507 29533 7ff650a4b1b0 49 API calls 29513->29533 29514 7ff650a12252 CreateFileW 29516 7ff650a1228e 29514->29516 29519 7ff650a122d4 29514->29519 29517 7ff650a122c9 CloseHandle 29516->29517 29518 7ff650a12320 CloseHandle 29516->29518 29517->29519 29518->29519 29519->29437 29520->29514 29522 7ff650a5008d 29521->29522 29523 7ff650a500c8 29522->29523 29524 7ff650a50096 29522->29524 29535 7ff650a502b0 44 API calls 29523->29535 29525 7ff650a500b0 29524->29525 29527 7ff650a500a5 memcpy 29524->29527 29525->29450 29527->29525 29528->29429 29529->29436 29531->29502 29532->29501 29533->29520 29535->29525 29536 7ff650a54510 29537 7ff650a5451d 29536->29537 29538 7ff650a54528 29536->29538 29541 7ff650a29bf0 TlsFree 29538->29541 29542 7ff650a29c08 GetLastError 29541->29542 29543 7ff650a29bfe 29541->29543

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: AddressLibraryProcProcess$MemoryThreadWrite$AllocContextFreeLoadVirtual$CreateFileModuleNameObjectResumeSingleWait
                                • String ID: @$VirtualA$kernel32ntdll.dlCreatePr$lloc
                                • API String ID: 4114231647-2595456714
                                • Opcode ID: 8f029ea0af0b6cdcc6dd1127ecba04c35eabaa87f70611b312bbaf9f5290573f
                                • Instruction ID: c75bf81705d6f1a83dd13aef2f55332c8a0dd71cc35b13f4853b0c18f79ef3eb
                                • Opcode Fuzzy Hash: 8f029ea0af0b6cdcc6dd1127ecba04c35eabaa87f70611b312bbaf9f5290573f
                                • Instruction Fuzzy Hash: D9916832618B8182EB648B56F8447AEB7A5FB98BC4F004125EEDD53B68DF7CD185CB01

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 14 7ff650a124b0-7ff650a12548 GetModuleFileNameW call 7ff650a318c0 17 7ff650a1254a-7ff650a12553 14->17 18 7ff650a12570-7ff650a1258d call 7ff650a50230 14->18 19 7ff650a12592-7ff650a12595 17->19 20 7ff650a12555-7ff650a12565 17->20 18->19 24 7ff650a1259b 19->24 25 7ff650a12890-7ff650a128a0 memcpy 19->25 22 7ff650a1259f-7ff650a125ca call 7ff650a11e00 20->22 29 7ff650a125db-7ff650a125e6 22->29 30 7ff650a125cc-7ff650a125d6 call 7ff650a53f20 22->30 24->22 28 7ff650a128aa-7ff650a128dc call 7ff650a50230 25->28 39 7ff650a128e4-7ff650a128e7 28->39 33 7ff650a125e8-7ff650a125f4 call 7ff650a53f20 29->33 34 7ff650a125f9-7ff650a125fc 29->34 30->29 33->34 37 7ff650a1286a-7ff650a12885 34->37 38 7ff650a12602-7ff650a126de LoadLibraryA GetModuleHandleA GetProcAddress * 3 34->38 38->37 43 7ff650a126e4-7ff650a126e7 38->43 40 7ff650a128e9-7ff650a128f9 memcpy 39->40 41 7ff650a12901 39->41 40->41 44 7ff650a1290a-7ff650a1290d 41->44 43->37 45 7ff650a126ed-7ff650a12710 wcslen 43->45 44->39 45->28 46 7ff650a12716-7ff650a12722 45->46 46->44 47 7ff650a12728-7ff650a12774 wcslen 46->47 48 7ff650a1298a-7ff650a129d1 call 7ff650a54810 call 7ff650a449a0 call 7ff650a2a0a0 call 7ff650a4b190 call 7ff650a2a0a0 47->48 49 7ff650a1277a-7ff650a12794 call 7ff650a50070 47->49 54 7ff650a1279a-7ff650a127a3 49->54 55 7ff650a1290f-7ff650a12922 49->55 59 7ff650a127a8-7ff650a127cd 54->59 57 7ff650a12952-7ff650a12957 55->57 58 7ff650a12924-7ff650a1292b 55->58 65 7ff650a1295b-7ff650a1296c 57->65 61 7ff650a12939-7ff650a1293d 58->61 62 7ff650a1292d-7ff650a12933 58->62 63 7ff650a127cf-7ff650a127dc call 7ff650a53f20 59->63 64 7ff650a127e1-7ff650a127fd LdrLoadDll 59->64 61->59 67 7ff650a12943-7ff650a1294d 61->67 62->61 63->64 74 7ff650a127ff-7ff650a1281e GetProcAddress 64->74 75 7ff650a12850-7ff650a12858 64->75 65->65 69 7ff650a1296e-7ff650a12975 65->69 67->59 69->58 74->75 78 7ff650a12820-7ff650a1283b GetCurrentProcess call 7ff650bc1328 call 7ff650a11d40 74->78 75->37 77 7ff650a1285a-7ff650a12869 call 7ff650a53f20 75->77 77->37 86 7ff650a12840-7ff650a12842 78->86 86->75 87 7ff650a12844-7ff650a12849 86->87 87->75
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: AddressProc$LoadModulewcslen$CurrentFileHandleLibraryNameProcess
                                • String ID: :a.dll$LdrLoadDll$LdrUnloaExecute$basic_string::append$dDll$ntdll.dll$ringdDll
                                • API String ID: 1847622883-2830737291
                                • Opcode ID: 73b5bf2017dc7c5df71ce153f8624740e1d338af0706b29fe35351e0ffb6e9af
                                • Instruction ID: 81a1e65ffafbe6834f329f6b92ff0b5c4e9b3893a43279533fdc11bfbc6efa4f
                                • Opcode Fuzzy Hash: 73b5bf2017dc7c5df71ce153f8624740e1d338af0706b29fe35351e0ffb6e9af
                                • Instruction Fuzzy Hash: 04C17137608B8791EA24CB56E4507AAA761FBC5BC4F488131EE8E97B9ADF3CD055C700

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 148 7ff650a11e00-7ff650a11e8c call 7ff650a53f30 memcpy 151 7ff650a11e90-7ff650a11ebd 148->151 151->151 152 7ff650a11ebf-7ff650a11ef3 151->152 153 7ff650a11f30-7ff650a11f64 call 7ff650a50230 152->153 154 7ff650a11ef5-7ff650a11f06 152->154 159 7ff650a120ab-7ff650a12126 wcslen call 7ff650a4fec0 153->159 163 7ff650a11f6a-7ff650a11f75 153->163 156 7ff650a12398-7ff650a1239b 154->156 157 7ff650a11f0c-7ff650a11f0e 154->157 156->159 158 7ff650a11f10-7ff650a11f21 157->158 158->158 161 7ff650a11f23 158->161 167 7ff650a1212c-7ff650a1214c call 7ff650a50070 159->167 168 7ff650a12464-7ff650a1246b call 7ff650a54810 159->168 161->159 165 7ff650a11f77-7ff650a11f7a 163->165 166 7ff650a11f7c-7ff650a11f80 163->166 165->157 165->166 169 7ff650a11f86-7ff650a11f9a 166->169 170 7ff650a12413-7ff650a12419 166->170 174 7ff650a12470-7ff650a12477 call 7ff650a54810 167->174 179 7ff650a12152-7ff650a12187 call 7ff650a50070 167->179 168->174 172 7ff650a11fa0-7ff650a11fca 169->172 177 7ff650a12420-7ff650a12425 170->177 172->172 176 7ff650a11fcc-7ff650a11fdd 172->176 182 7ff650a1247c-7ff650a1249b call 7ff650a54810 call 7ff650a4b190 * 2 174->182 176->159 180 7ff650a11fe3-7ff650a11fee 176->180 181 7ff650a12429-7ff650a1243b 177->181 195 7ff650a1218d-7ff650a12195 179->195 196 7ff650a123a0-7ff650a123a4 179->196 184 7ff650a11ff0-7ff650a1202f 180->184 185 7ff650a12031-7ff650a12040 180->185 181->181 186 7ff650a1243d 181->186 188 7ff650a1244f-7ff650a1245f call 7ff650a53f20 call 7ff650a2a0a0 182->188 184->159 184->185 185->159 191 7ff650a12042-7ff650a12053 185->191 187 7ff650a1238e-7ff650a12396 186->187 186->188 192 7ff650a123d5-7ff650a123dc 187->192 188->168 191->159 197 7ff650a12055-7ff650a12066 191->197 202 7ff650a123ea-7ff650a123ee 192->202 203 7ff650a123de-7ff650a123e4 192->203 200 7ff650a121b1-7ff650a121c1 195->200 205 7ff650a12197-7ff650a1219a 195->205 199 7ff650a123aa-7ff650a123ad 196->199 196->200 197->159 198 7ff650a12068-7ff650a12079 197->198 198->159 206 7ff650a1207b-7ff650a1208c 198->206 208 7ff650a121a0 199->208 209 7ff650a123b3 199->209 200->182 207 7ff650a121c7-7ff650a121e6 call 7ff650a50070 200->207 211 7ff650a121fa-7ff650a1221f 202->211 212 7ff650a123f4-7ff650a123fe 202->212 203->202 205->208 214 7ff650a12408-7ff650a1240e 205->214 206->159 216 7ff650a1208e-7ff650a1209f 206->216 228 7ff650a121ec-7ff650a121f5 207->228 229 7ff650a123c0-7ff650a123d3 207->229 215 7ff650a121a8-7ff650a121ab 208->215 209->207 219 7ff650a12221-7ff650a1222e call 7ff650a53f20 211->219 220 7ff650a12233-7ff650a1223e 211->220 212->211 214->215 215->200 221 7ff650a12330-7ff650a12356 call 7ff650a4b1b0 215->221 216->159 222 7ff650a120a1-7ff650a120a7 216->222 219->220 226 7ff650a12240-7ff650a1224d call 7ff650a53f20 220->226 227 7ff650a12252-7ff650a12288 CreateFileW 220->227 221->228 240 7ff650a1235c-7ff650a1236f 221->240 222->159 226->227 232 7ff650a1228e-7ff650a122c7 call 7ff650a11d60 227->232 233 7ff650a12310-7ff650a1231a 227->233 228->211 229->177 229->192 242 7ff650a122c9-7ff650a122cf CloseHandle 232->242 243 7ff650a12320-7ff650a12328 CloseHandle 232->243 234 7ff650a1231c 233->234 235 7ff650a122de-7ff650a122e8 call 7ff650a53f20 233->235 239 7ff650a122ed-7ff650a1230f call 7ff650a53f20 234->239 235->239 240->192 245 7ff650a12371-7ff650a12376 240->245 246 7ff650a122d4-7ff650a122dc 242->246 243->246 248 7ff650a1237a-7ff650a1238c 245->248 246->235 246->239 248->187 248->248
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: mallocmemcpywcslen
                                • String ID: basic_string::append$y7UkVAEe
                                • API String ID: 918279302-3485675714
                                • Opcode ID: fc6dff767d0b5108a5859a4582fb60012bff74da300d820909054df24a79d096
                                • Instruction ID: b2c8dca293f69401ceb18edec36703f5936ca8448a5248399c3ce7b0b47651ec
                                • Opcode Fuzzy Hash: fc6dff767d0b5108a5859a4582fb60012bff74da300d820909054df24a79d096
                                • Instruction Fuzzy Hash: 32F1E737A19A83A1DA20CBA5E4103AE7761FB85B90F888731DA5DA77D6EF3CD155C300

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 249 7ff650a11180-7ff650a111ac 250 7ff650a11440-7ff650a11443 GetStartupInfoA 249->250 251 7ff650a111b2-7ff650a111cd 249->251 255 7ff650a11450-7ff650a11468 call 7ff650a317c0 250->255 252 7ff650a111e0-7ff650a111e7 251->252 253 7ff650a111e9-7ff650a111f7 252->253 254 7ff650a111d0-7ff650a111d3 252->254 258 7ff650a113f7-7ff650a11406 call 7ff650a317b8 253->258 259 7ff650a111fd-7ff650a11201 253->259 256 7ff650a111d9-7ff650a111de Sleep 254->256 257 7ff650a113e0-7ff650a113f1 254->257 256->252 257->258 257->259 266 7ff650a1140c-7ff650a11427 _initterm 258->266 267 7ff650a1121c-7ff650a1121e 258->267 262 7ff650a11207-7ff650a11216 259->262 263 7ff650a11470-7ff650a11489 call 7ff650a317d0 259->263 262->266 262->267 275 7ff650a1148e 263->275 269 7ff650a1142d-7ff650a11432 266->269 270 7ff650a11224-7ff650a11231 266->270 267->269 267->270 269->270 272 7ff650a1123f-7ff650a11287 call 7ff650a28e10 SetUnhandledExceptionFilter call 7ff650a30e00 call 7ff650a28c20 call 7ff650a30d20 270->272 273 7ff650a11233-7ff650a1123b 270->273 286 7ff650a11289 272->286 287 7ff650a112a2-7ff650a112a8 272->287 273->272 277 7ff650a11496-7ff650a11498 call 7ff650a317f8 275->277 282 7ff650a1149d-7ff650a1149e 277->282 288 7ff650a112e0-7ff650a112e6 286->288 289 7ff650a112aa-7ff650a112b8 287->289 290 7ff650a11290-7ff650a11292 287->290 291 7ff650a112e8-7ff650a112f2 288->291 292 7ff650a112fe-7ff650a11323 malloc 288->292 295 7ff650a1129e 289->295 293 7ff650a112d9 290->293 294 7ff650a11294-7ff650a11297 290->294 296 7ff650a112f8 291->296 297 7ff650a113d0-7ff650a113d5 291->297 292->275 298 7ff650a11329-7ff650a1132f 292->298 293->288 299 7ff650a11299 294->299 300 7ff650a112c0-7ff650a112c2 294->300 295->287 296->292 297->296 301 7ff650a11330-7ff650a11360 strlen malloc memcpy 298->301 299->295 300->293 302 7ff650a112c4 300->302 301->301 303 7ff650a11362-7ff650a11399 call 7ff650a289b0 call 7ff650a54560 301->303 304 7ff650a112c8-7ff650a112d2 302->304 309 7ff650a1139e-7ff650a113ac 303->309 304->293 306 7ff650a112d4-7ff650a112d7 304->306 306->293 306->304 309->277 310 7ff650a113b2-7ff650a113ba 309->310 310->255 311 7ff650a113c0-7ff650a113cd 310->311
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
                                • String ID:
                                • API String ID: 649803965-0
                                • Opcode ID: 02f56bbec029d51f23834e3a73079cb737bf4528bee579ecc5a0e7da80d8e805
                                • Instruction ID: 7f177994ce274f1010933cc97953bc824d870fab4cae35aaee98f75bc09c4fb4
                                • Opcode Fuzzy Hash: 02f56bbec029d51f23834e3a73079cb737bf4528bee579ecc5a0e7da80d8e805
                                • Instruction Fuzzy Hash: E2816A36E09647A6FB519B96E4907B923A1BF46B80F4C4435DA0EE7392DF3DE800C740

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: mallocmemcmpstrtoul
                                • String ID: .$.eh_pool$:$=$=$GLIBCXX_TUNABLES$glibcxx.$obj_count$obj_size$obj_size
                                • API String ID: 920383374-3633263654
                                • Opcode ID: 6a49c943fb4a4462079c45002831cc426f180767bd56bfe962260e807522214e
                                • Instruction ID: ce10c2fb7b33645822549f10d0e8784628c0c44ddca8afc72ab9dd57273dba3a
                                • Opcode Fuzzy Hash: 6a49c943fb4a4462079c45002831cc426f180767bd56bfe962260e807522214e
                                • Instruction Fuzzy Hash: 25519D37A0EA43A6FF518BA1F4403B96AA0FB85788F5C4135D94DE6396EE3DE580C300

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: mallocmemcmpstrtoul
                                • String ID: .$.eh_pool$:$=$=$GLIBCXX_TUNABLES$glibcxx.$obj_count$obj_size$obj_size
                                • API String ID: 920383374-3633263654
                                • Opcode ID: 5a332e903c781fc982e7646cb44707ac431f27f5668ce2891eaba40441686165
                                • Instruction ID: 823f39da99e4c1af35e474ab859bead50a9c49f2eec6bf3abfda16cbe4d5c3a1
                                • Opcode Fuzzy Hash: 5a332e903c781fc982e7646cb44707ac431f27f5668ce2891eaba40441686165
                                • Instruction Fuzzy Hash: 0151C031E0E6C689FB118B90F8413BE76D8EF987C4F954035EA6D86295EE3EE544C342

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 312 7ff8e7b011d0-7ff8e7b011f1 313 7ff8e7b011f3-7ff8e7b011fb 312->313 314 7ff8e7b01248-7ff8e7b01253 call 7ff8e7b177c0 312->314 316 7ff8e7b011fd-7ff8e7b01226 call 7ff8e7b177c0 call 7ff8e7b014b0 call 7ff8e7b18ba0 313->316 317 7ff8e7b0126a 313->317 322 7ff8e7b012e2-7ff8e7b012f4 call 7ff8e7b014b0 314->322 323 7ff8e7b01259-7ff8e7b01268 call 7ff8e7b01010 314->323 316->317 337 7ff8e7b01228-7ff8e7b01241 316->337 319 7ff8e7b0126c-7ff8e7b01282 317->319 322->319 331 7ff8e7b012fa-7ff8e7b0130c call 7ff8e7b18ba0 322->331 323->317 332 7ff8e7b012c8-7ff8e7b012d7 call 7ff8e7b18ba0 323->332 331->319 339 7ff8e7b012d9-7ff8e7b012dc 332->339 340 7ff8e7b01318-7ff8e7b0131b 332->340 341 7ff8e7b01290-7ff8e7b012a3 337->341 339->322 344 7ff8e7b013d0 call 7ff8e7b17480 339->344 340->317 345 7ff8e7b01321-7ff8e7b01329 340->345 342 7ff8e7b012a5-7ff8e7b012b1 341->342 343 7ff8e7b01288-7ff8e7b0128d Sleep 341->343 346 7ff8e7b012b7-7ff8e7b012c1 _amsg_exit 342->346 347 7ff8e7b013b0-7ff8e7b013c5 call 7ff8e7b1f7b0 342->347 343->341 351 7ff8e7b013d5-7ff8e7b013e9 call 7ff8e7b014b0 344->351 345->317 349 7ff8e7b0132f-7ff8e7b01348 345->349 346->319 347->319 352 7ff8e7b01357-7ff8e7b0136a 349->352 351->319 361 7ff8e7b013ef-7ff8e7b01411 call 7ff8e7b014b0 call 7ff8e7b18ba0 351->361 353 7ff8e7b01350-7ff8e7b01355 Sleep 352->353 354 7ff8e7b0136c 352->354 353->352 357 7ff8e7b01370-7ff8e7b0137c 354->357 359 7ff8e7b01390-7ff8e7b013a5 call 7ff8e7b1f7b0 357->359 360 7ff8e7b0137e-7ff8e7b01388 _amsg_exit 357->360 359->317 360->317 361->317 368 7ff8e7b01417-7ff8e7b01430 361->368 369 7ff8e7b0143f-7ff8e7b01452 368->369 370 7ff8e7b01454 369->370 371 7ff8e7b01438-7ff8e7b0143d Sleep 369->371 370->357 371->369
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: Sleep_amsg_exit
                                • String ID:
                                • API String ID: 1015461914-0
                                • Opcode ID: fa4cdccd0cc9a4bfc092056aca07d8228318a12993dcb0466b4364e0d20e8905
                                • Instruction ID: 22f88272a8c3ff02cbadb1e35b41dd0147965a390ee0da5d486f18165aff9093
                                • Opcode Fuzzy Hash: fa4cdccd0cc9a4bfc092056aca07d8228318a12993dcb0466b4364e0d20e8905
                                • Instruction Fuzzy Hash: 5F517C30A0D24BCAF7189BE6D94037E72956FD6BC0F444034DE2DAB7D2EE2CA5419342

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: malloc
                                • String ID:
                                • API String ID: 2803490479-0
                                • Opcode ID: f9fc79fd16bcaafb964f66e3b340d7e38e474c5a59071ff019fbd2d497fd9303
                                • Instruction ID: 794321e2bd0c8684620a762d3df0783799e043e75fcb455ed8e99da365d6a69b
                                • Opcode Fuzzy Hash: f9fc79fd16bcaafb964f66e3b340d7e38e474c5a59071ff019fbd2d497fd9303
                                • Instruction Fuzzy Hash: 0411A377F1670362FE689BE5B5213B85291AF49790F4C4A34D91DEA3C3EE2CE4848300

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: malloc
                                • String ID:
                                • API String ID: 2803490479-0
                                • Opcode ID: 5c9ccfee4c7606e935e0eb480a30eada8749d5be36f3775607aeed9adcfc3606
                                • Instruction ID: f61a9555266d3cdd653711aea62f47a2f19023f5908509927f20edd33956e927
                                • Opcode Fuzzy Hash: 5c9ccfee4c7606e935e0eb480a30eada8749d5be36f3775607aeed9adcfc3606
                                • Instruction Fuzzy Hash: E0118E71F0B78A45FE99A7E5E5213BD22919F887D0FC45634DA3D4A3C6EE2DA4808312

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: Free
                                • String ID:
                                • API String ID: 3978063606-0
                                • Opcode ID: e08ad56c4f69a8d42c1ff91a8fbe35465cd7f76a2abe746ad9bb7050e3aff2c0
                                • Instruction ID: 278230b9889a3692decc781df885bdf399bee76b98a69d58bfb242fedb6a6fa6
                                • Opcode Fuzzy Hash: e08ad56c4f69a8d42c1ff91a8fbe35465cd7f76a2abe746ad9bb7050e3aff2c0
                                • Instruction Fuzzy Hash: F3C04C25F29993E1E6581B635CC616111D4BB86B44FDC4470C509E1750DD1DD1E74619

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: Free
                                • String ID:
                                • API String ID: 3978063606-0
                                • Opcode ID: 2403c3f680003cc6744a459c94804d2104b62cb3c3384cede454446d855f93de
                                • Instruction ID: 2351d99fb874f6d3817e22629d20a0b693bdf10dd9585792c3ef4dae5102c65b
                                • Opcode Fuzzy Hash: 2403c3f680003cc6744a459c94804d2104b62cb3c3384cede454446d855f93de
                                • Instruction Fuzzy Hash: 20C04C14F5A942C3E7541BE2ACC262921947F44B91F944070D52991251DD2C91D64612

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: free
                                • String ID:
                                • API String ID: 1294909896-0
                                • Opcode ID: 0c35b97ced1bec1fa693b917d1a2d0d85617581464d43c5e25326eda2600a28e
                                • Instruction ID: 0e164faefa86be33724803a9a558cb8bbb25c5bfff134f99ee2e1a8cd00a92dc
                                • Opcode Fuzzy Hash: 0c35b97ced1bec1fa693b917d1a2d0d85617581464d43c5e25326eda2600a28e
                                • Instruction Fuzzy Hash: 39F0B422F1B29645FE151AB1E5043BD6210AFD0BD0F088531DE6C16785DF6CE4E2C302
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$strlen
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace_aux$basic_string::_S_create$basic_string::replace
                                • API String ID: 2619041689-978392061
                                • Opcode ID: ad347a581c51219f3ebd1fe922085dfa7ebf9c69cbca82f9903a275e60e2c978
                                • Instruction ID: faa213ee2f43fee7f32c302ba999b05d4bc1a53211d1aa77cd698755e51695d3
                                • Opcode Fuzzy Hash: ad347a581c51219f3ebd1fe922085dfa7ebf9c69cbca82f9903a275e60e2c978
                                • Instruction Fuzzy Hash: F013F373B09687A5EA109FA6E8446F96750AF09BD4F8C4132EE1DAB7D7DE2CE541C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace_aux$basic_string::_S_create$basic_string::assign$basic_string::insert
                                • API String ID: 3510742995-982419628
                                • Opcode ID: 3fb3654419f22eb41f902027822ad6c65d4425b4dd7f10748506ba9397f60741
                                • Instruction ID: 026f9f2a0767619a5ca21d7e63cfa555931e102d155c71449775b16ea9854115
                                • Opcode Fuzzy Hash: 3fb3654419f22eb41f902027822ad6c65d4425b4dd7f10748506ba9397f60741
                                • Instruction Fuzzy Hash: 68F2EE73B19693A6EE108FA5D8442F86352AB09BD8F5C4632DF1DA77D6DE2CE581C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$strlen
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::_M_replace$basic_string::_M_replace_aux$basic_string::assign$basic_string::insert$basic_string::replace
                                • API String ID: 2619041689-3257055785
                                • Opcode ID: 6597908d0564716c34a933cd06f107a6d212fef4fb1283043b682b0cbbd5743d
                                • Instruction ID: f63c3c7a0e4bc12ff9c65df1d9eb841540df447b6e32331e134dd224f2508060
                                • Opcode Fuzzy Hash: 6597908d0564716c34a933cd06f107a6d212fef4fb1283043b682b0cbbd5743d
                                • Instruction Fuzzy Hash: 0FA2F577B09A93B1EB218BA5D5501BD6360AB85FD8F4C4132DE9DA7787DE2CE442C301
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace$basic_string::_M_replace_aux$basic_string::replace
                                • API String ID: 3510742995-861133903
                                • Opcode ID: 77bffc9c44677dd885895164bea7c836fb91486146dd5c80afc9853afd0d72bb
                                • Instruction ID: 996bea92f76af674c01c37f31e1e750298a824d83d4d4384795ac8fc82e5384e
                                • Opcode Fuzzy Hash: 77bffc9c44677dd885895164bea7c836fb91486146dd5c80afc9853afd0d72bb
                                • Instruction Fuzzy Hash: DCC2F17BB09A87B5EA208FA5E8014B96351EB45BD4F8C5232DE9DA73D6DE3CE541C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$wcslen
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::_M_replace$basic_string::_M_replace_aux$basic_string::assign$basic_string::insert$basic_string::replace
                                • API String ID: 1844840824-3257055785
                                • Opcode ID: 4430c1d49038f62544e5d55a1b648353797ab09431bb0f562d28308367f00175
                                • Instruction ID: 1cef47d5e34b7f0dd503594fe1e0db16d762a0533abe64ac45dcc5d373702a2a
                                • Opcode Fuzzy Hash: 4430c1d49038f62544e5d55a1b648353797ab09431bb0f562d28308367f00175
                                • Instruction Fuzzy Hash: 71C2D177B19A83B1EA208FA5D4405B96361EB45BD4F8C8232EE9DA7796DF3CE541C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$strlen
                                • String ID: basic_string::_M_create$basic_string::_M_create$basic_string::append$basic_string::append$basic_string::append
                                • API String ID: 2619041689-2020352992
                                • Opcode ID: 642a0b9ae0c68a5c8d628f6ece2f36a97626f9bbead64cbc7655f63a29d18d03
                                • Instruction ID: 4e54a05cc72177f8ab953c94be031b8045c6f9d39fff453d546ccae2712110f0
                                • Opcode Fuzzy Hash: 642a0b9ae0c68a5c8d628f6ece2f36a97626f9bbead64cbc7655f63a29d18d03
                                • Instruction Fuzzy Hash: FCC2AF3BB09A87A1EE209FA5E40427D6361BB45B98F4C8532EE1DA77D6DE3CE445C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$mallocmemset
                                • String ID: basic_string::_M_replace_aux$basic_string::_S_create$basic_string::at: __n (which is %zu) >= this->size() (which is %zu)
                                • API String ID: 368144878-3359409074
                                • Opcode ID: 9acc31bb879f4c36085e4c3c27a8c1445f61703c4c097d474a5ad37bfd968003
                                • Instruction ID: b1ae7363d1ea0af8b88beb5e55e09dd3323f4b37bce461077c51428d5b278c09
                                • Opcode Fuzzy Hash: 9acc31bb879f4c36085e4c3c27a8c1445f61703c4c097d474a5ad37bfd968003
                                • Instruction Fuzzy Hash: 7712B073B0A743AAEA208F66D4402FD6761AB49B94F4C4636DE5DA73D6DE3CE484C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID: .
                                • API String ID: 1992160199-248832578
                                • Opcode ID: f2335e7aae4a5d6319f253de6a1438e5547aa12490883e51a64923facd17ed70
                                • Instruction ID: 7caa64b3ce54c49aa18825e40145768571ec17cf4b86231050e38acff178bd8d
                                • Opcode Fuzzy Hash: f2335e7aae4a5d6319f253de6a1438e5547aa12490883e51a64923facd17ed70
                                • Instruction Fuzzy Hash: 3222A573A1864396F7688F66D85077937A2EB44B48F1D9235CA0DE778ACE3DE940CB40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID: .
                                • API String ID: 1992160199-248832578
                                • Opcode ID: d39005f12024fb3bc23f412d7ac4ffb7e71369ea58af91583f7d31a02580f966
                                • Instruction ID: d7cec204b653337e6a5184440c7dc5843eceb9d0219045ec150c87e47cefc216
                                • Opcode Fuzzy Hash: d39005f12024fb3bc23f412d7ac4ffb7e71369ea58af91583f7d31a02580f966
                                • Instruction Fuzzy Hash: 3222D973A192468AE7298F65D05077E77A2EB98BC8F158135DA2D477C8DB3DEC00C742
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: strlenstrncmp
                                • String ID: Z$Z$_$_$_$_GLOBAL_
                                • API String ID: 1310274236-662103887
                                • Opcode ID: de67cd54f0d5c1e7e52df8fbd8c50eff78b9b61c3f7bc7ad141975b83d845251
                                • Instruction ID: 799624b20c447fe1c0a866900b9de7dc890b8882dd9926f242665b57b2a774d2
                                • Opcode Fuzzy Hash: de67cd54f0d5c1e7e52df8fbd8c50eff78b9b61c3f7bc7ad141975b83d845251
                                • Instruction Fuzzy Hash: D762A173A09683AAF7648EB6C8543FD36A1FB05788F584035DE19ABB86DF39D941C700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: strlenstrncmp
                                • String ID: Z$Z$_$_$_$_GLOBAL_
                                • API String ID: 1310274236-662103887
                                • Opcode ID: 63d13f81488defea6193c4730907306bfe67195dde6e0b4718243abcb2fb856b
                                • Instruction ID: 8ec85071caf8b4d6049230aeb54b4674640b511d98dcd77f3e857c4c29c22d85
                                • Opcode Fuzzy Hash: 63d13f81488defea6193c4730907306bfe67195dde6e0b4718243abcb2fb856b
                                • Instruction Fuzzy Hash: 5462C172A086828AFB658EA5D4543FD37A0FB857C8F144035DA2E0BB85EF3DDA45C742
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$wcslen
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace_aux$basic_string::append
                                • API String ID: 1844840824-2502837630
                                • Opcode ID: 5726786ff597dbe7ed00c72fad8f8f6611503ae7ab9d10e2ab9ea3e0c90c808d
                                • Instruction ID: 8b70e66937f4ac417ee0fa5c16ff528841acc9397ab8572d9147d9de8c659f41
                                • Opcode Fuzzy Hash: 5726786ff597dbe7ed00c72fad8f8f6611503ae7ab9d10e2ab9ea3e0c90c808d
                                • Instruction Fuzzy Hash: 8EF1BE77A09B57B1EA508FA5D4401B86361EB45F94B9C8632DE9DA73D2EF3CE482C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::basic_string$string::string
                                • API String ID: 3510742995-126128797
                                • Opcode ID: f9561b54137bed5e2290b107386d817ba6bc8ae73c0a4b99f2edf06160560d97
                                • Instruction ID: f5c4efe6aa4f157ba7e1ec7eb3c3497c4dfb05c158a28b7f724961abe52d55ca
                                • Opcode Fuzzy Hash: f9561b54137bed5e2290b107386d817ba6bc8ae73c0a4b99f2edf06160560d97
                                • Instruction Fuzzy Hash: 1EC1D777A09A82A5EB128F65F4802ACB760E765B98F4C8131CF9D97796DE3CD5D2C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::basic_string$string::string
                                • API String ID: 3510742995-126128797
                                • Opcode ID: d5979409dbc0b0a88eb28cc7d5e6714f6cc43b7faaa5e49ab3fd699f1dd425c1
                                • Instruction ID: 98bfc75703510b4e5bb0a4a74098bd0070a3750d8f93e42dfc2678e20added10
                                • Opcode Fuzzy Hash: d5979409dbc0b0a88eb28cc7d5e6714f6cc43b7faaa5e49ab3fd699f1dd425c1
                                • Instruction Fuzzy Hash: E7C1D777A09A82A5EB225F65F4802E8B660E715B98F4C8131CF9D97796DE3CD9D3C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::basic_string$string::string
                                • API String ID: 3510742995-126128797
                                • Opcode ID: e316af2f793b7d33bc1d4bb5bc66ceff962d6734e10f4cb33afc806da87190f1
                                • Instruction ID: 57089fa483fc6bf096947e8cd0bb6a046b82fe864c5541e4c4f2de8ff42101ad
                                • Opcode Fuzzy Hash: e316af2f793b7d33bc1d4bb5bc66ceff962d6734e10f4cb33afc806da87190f1
                                • Instruction Fuzzy Hash: 4AC1B037A05643A5EE259FA5E8404B97360BB05BE4F5C4632DE6D977D6EE3CE482C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::basic_string$string::string
                                • API String ID: 3510742995-126128797
                                • Opcode ID: b97e0c47007e84956c0877af1a779d18a511d936b347d5b8fdbeec243bdee94e
                                • Instruction ID: 6b8f79e7a889ac266a033df807274c096e81432dafd407dc888f34f3bd67436e
                                • Opcode Fuzzy Hash: b97e0c47007e84956c0877af1a779d18a511d936b347d5b8fdbeec243bdee94e
                                • Instruction Fuzzy Hash: C3C19037A05643B5EE259F65E8400B8A360BB05BE4F5C4632EE6D977D6EE3CE586C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: AddressProc$HandleLibraryLoadModule
                                • String ID: SystemFunction036$advapi32.dll$msvcrt.dll$rand_s
                                • API String ID: 384173800-4041758303
                                • Opcode ID: 3cddb3a2635239156a5bab0903d121020f4bf08e224885fbcd19eca981a7a39b
                                • Instruction ID: 4b187b97d1c37faa22ec880ca1521f52128b25107d210956ad36dd80d38ca069
                                • Opcode Fuzzy Hash: 3cddb3a2635239156a5bab0903d121020f4bf08e224885fbcd19eca981a7a39b
                                • Instruction Fuzzy Hash: 15F01D21E5AA07F2EE059B91FCE04B427A4BF4A794B4C0532CC0EB6360EE2DE446C350
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$strlen
                                • String ID: basic_string::assign
                                • API String ID: 2619041689-2385367300
                                • Opcode ID: 33be3c84a5e8c55ba64ea6511b8cd3aea9e620432794035fffeaff630c844bd4
                                • Instruction ID: f1ea9be9eeae27bdb6ea2854435844b271240523de0deb60771515c4e53ae560
                                • Opcode Fuzzy Hash: 33be3c84a5e8c55ba64ea6511b8cd3aea9e620432794035fffeaff630c844bd4
                                • Instruction Fuzzy Hash: 9FD1B233B09667A5EE118F59D0842FC6760AB69B94F5C4532CF1DA77DADF2DE8828300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$strlen
                                • String ID: basic_string::_M_create$basic_string::append
                                • API String ID: 2619041689-3923985592
                                • Opcode ID: 8ddfacf99ab984d79040ce783a34ce513ab25da3cf743b6d395fd072a9e2d9a9
                                • Instruction ID: 9914f97295d95a4d0da11bb81f7eb40a40e0cde385bc5aef64c08faa9461db54
                                • Opcode Fuzzy Hash: 8ddfacf99ab984d79040ce783a34ce513ab25da3cf743b6d395fd072a9e2d9a9
                                • Instruction Fuzzy Hash: 8291D477B19A97B1EF108A65D4102B96321AB55F98F8C8532DEADA73C7DE2DE442C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: VBox$VMwareVMMicrosofVBoxVBox$t Hv$ware
                                • API String ID: 1004003707-3138586379
                                • Opcode ID: 37b597a5689494ed26fb4dc04e1f2368f416c8d10741643781c684460306bb89
                                • Instruction ID: 4b5992923ab4acb051f81fb93047a873270492670f9135ce4f97ac7e7109e1d9
                                • Opcode Fuzzy Hash: 37b597a5689494ed26fb4dc04e1f2368f416c8d10741643781c684460306bb89
                                • Instruction Fuzzy Hash: 32113D72A1C78796EB208B55E48035ABBA0FB85784F0C0135EA8D86B59EF7DD154CF04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID: $ $Infinity$NaN
                                • API String ID: 0-3274152445
                                • Opcode ID: 6dd44949b3ed188a193b1039b318fc06643e791fb88510f01d96adc3b2bee92f
                                • Instruction ID: 42dc3da66a1aebafa8593fb9c54ecccc1d87eaba82f91bad831c51358d1a6a4e
                                • Opcode Fuzzy Hash: 6dd44949b3ed188a193b1039b318fc06643e791fb88510f01d96adc3b2bee92f
                                • Instruction Fuzzy Hash: 42E29433A0C6839BE725CF66E84136AB791FB85784F184135EA49A7B96DF3DE4418F00
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID: $ $Infinity$NaN
                                • API String ID: 0-3274152445
                                • Opcode ID: e29387f2615a8604735f1304234b78629540e37ec92509e9e94c7aeb374f1150
                                • Instruction ID: 1521f25f8080ec42e3fb015aac1c0d8fea5c7e7b6d66d23ab260865697db32df
                                • Opcode Fuzzy Hash: e29387f2615a8604735f1304234b78629540e37ec92509e9e94c7aeb374f1150
                                • Instruction Fuzzy Hash: ABE2A672A1C6818AE725CF69E00436EBBA1FBC57C4F144135EA9987B99DB3DE441CF01
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$CaptureContextCreateFirstProcess32SnapshotToolhelp32Unwindabort
                                • String ID:
                                • API String ID: 3731711962-0
                                • Opcode ID: a07ec6b41b8bfde8ab265026ccf2d0eb5a7eb21344be689f0646cb224e3cd7d7
                                • Instruction ID: 5db3601c1086dec5664670791f720d89b52af0eefb21c2415726f1d0164c468b
                                • Opcode Fuzzy Hash: a07ec6b41b8bfde8ab265026ccf2d0eb5a7eb21344be689f0646cb224e3cd7d7
                                • Instruction Fuzzy Hash: 44A10333A0868351DA209BA5E4102BEA7A1FF85B90F4C8335EE5DA37D6EF2CD4658700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$strlen
                                • String ID: basic_string::assign
                                • API String ID: 2619041689-2385367300
                                • Opcode ID: 824c0f1de1c3f10338e5efd760fb8b621a617974b0f669c98ea53029e00b8e7a
                                • Instruction ID: a19ab5c418b2bb15ed6b2ba13ca0b14f071aa58aafe4b31ac5c2ad82e4f38251
                                • Opcode Fuzzy Hash: 824c0f1de1c3f10338e5efd760fb8b621a617974b0f669c98ea53029e00b8e7a
                                • Instruction Fuzzy Hash: 5191A37BB09657B6EE118F5AD4402BC6760AB45B98F9C4531CB4EA77D2EF2CE881C340
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID: CCG
                                • API String ID: 0-1584390748
                                • Opcode ID: 5b4558dc0b14a29d94faa6f26a699a1a020ba34987c3d39b1551dcd82f0197bb
                                • Instruction ID: ee02ba75c6f2017fa2944a0bd5492e6c293bae28d84bf4a563b860aa0fa2c2e3
                                • Opcode Fuzzy Hash: 5b4558dc0b14a29d94faa6f26a699a1a020ba34987c3d39b1551dcd82f0197bb
                                • Instruction Fuzzy Hash: F6218933E0D103B6FE6892E688503F831819F9AB50F9C4936C91DE63D7DD1DE8818305
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: basic_string::assign
                                • API String ID: 3510742995-2385367300
                                • Opcode ID: 38d2025bd9f841618dfc88e1d3291f0677eb03729608cdf29431157117b58588
                                • Instruction ID: 0d9593b5442ae41b07a16859e06253dc66864d3bd41c2fdb9119e6cf181c4be3
                                • Opcode Fuzzy Hash: 38d2025bd9f841618dfc88e1d3291f0677eb03729608cdf29431157117b58588
                                • Instruction Fuzzy Hash: A6A1CE3BB09647A5EE218F59E14477CA761AB41B98F9C4131CF8DA7792DF2DE880C740
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: mallocmemcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_S_create$basic_string::erase
                                • API String ID: 4276657696-874136391
                                • Opcode ID: d9868581179df336c8d7b0f943e4eb259893e80005fd116112d0dfabd90edca6
                                • Instruction ID: 84501b94077881e3e6db77355c2a83787bcab8f1b028ceed2995d2b8082cd05f
                                • Opcode Fuzzy Hash: d9868581179df336c8d7b0f943e4eb259893e80005fd116112d0dfabd90edca6
                                • Instruction Fuzzy Hash: 9351B273B19603A2FE008B94D4452FD6751AB49BA8F8C4632DA2D973D6DF6CD445C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: basic_string::_M_replace_aux
                                • API String ID: 2221118986-2536181960
                                • Opcode ID: 1a403599859ca1899f855ff9512b7a7dfc7b4e5b2654c0c6726e7655f74d281a
                                • Instruction ID: c5a2cf14a4efd804c00b0bb504e90399baed576048cb26c3cdca4e30825de018
                                • Opcode Fuzzy Hash: 1a403599859ca1899f855ff9512b7a7dfc7b4e5b2654c0c6726e7655f74d281a
                                • Instruction Fuzzy Hash: 74512777B19652B5EA11CFA9D4044BD6361AB01BE4F9C8731DA6CA77E2EF39E442C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: basic_string::_M_create
                                • API String ID: 3510742995-3122258987
                                • Opcode ID: 1526b098f5c54defdeafe3e140b4236d86ea297812fa3ff0e8b03ebd585d1a9d
                                • Instruction ID: c24c28f6bb44e80dd11eb10bc9f8f9672174e60d40fa22a4a291d689304e096e
                                • Opcode Fuzzy Hash: 1526b098f5c54defdeafe3e140b4236d86ea297812fa3ff0e8b03ebd585d1a9d
                                • Instruction Fuzzy Hash: A051D477A09A82B1DB19CF55D4002BD7761BB4AB94F588636CE6E973D6CF38E451C300
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: CriticalLeaveSectionSleepmalloc
                                • String ID:
                                • API String ID: 1993596536-0
                                • Opcode ID: 2c36061d1760b51322d7b515d591171073cd59cacb9d64a07b8c3b57f11c525d
                                • Instruction ID: 562d25c864b299d2a1d0890de024d5b6d4de350e0d1e5730110c38efaa171cda
                                • Opcode Fuzzy Hash: 2c36061d1760b51322d7b515d591171073cd59cacb9d64a07b8c3b57f11c525d
                                • Instruction Fuzzy Hash: 615107B2E1820386EB5C4F55F464F7A3A51FBA4784F499138CA0967BD1CE3DD641CB40
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: CriticalLeaveSectionSleepmalloc
                                • String ID:
                                • API String ID: 1993596536-0
                                • Opcode ID: 6399a656ab116061ad14ceb5f3512d172d916b2186e21018828a1aad1d3fc565
                                • Instruction ID: a7050c19406f874715aa0778a53577314b73a74f267e78e816eefeea43fe199e
                                • Opcode Fuzzy Hash: 6399a656ab116061ad14ceb5f3512d172d916b2186e21018828a1aad1d3fc565
                                • Instruction Fuzzy Hash: 9F51D3B1A192428AE72D8F55F404B7E3A91EBE07C4F519239DA1E0BB94CB3DD641CB81
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a789a7e1906a6075df58b085b7bca922bf40180320497dae8d1e5630d7266773
                                • Instruction ID: 7187f13808dd8d0b8912156aef44a28aa5ec1318641a6dcca90e1cdae0d3c10b
                                • Opcode Fuzzy Hash: a789a7e1906a6075df58b085b7bca922bf40180320497dae8d1e5630d7266773
                                • Instruction Fuzzy Hash: AC328333A0DBC7A5EA748A95A4413FEA790FB89784F0C4135EA8DA7797EE3CD5409700
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 75202502c96c6c6311f8483e592c34ccd1763e61bf6a8445c6a23aed2556d219
                                • Instruction ID: 8e06527b5dab777c25e89d0bdf5ebba68e9b5f9664f329042b74e52f81371b56
                                • Opcode Fuzzy Hash: 75202502c96c6c6311f8483e592c34ccd1763e61bf6a8445c6a23aed2556d219
                                • Instruction Fuzzy Hash: 06327F72E0E7C585EA609A95F0453BEB791FBC97C4F944136EA9E07B99DE3CD0408B02
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: strlen
                                • String ID:
                                • API String ID: 39653677-0
                                • Opcode ID: 277f68a8ef33fd892ad4b58a64bfb347b3fd29acc75adeb1ffad4ee53ec1b8c2
                                • Instruction ID: d70f3fa34046e34219ad0f01b1a71af4860c689574c7cd8f797655b239003cff
                                • Opcode Fuzzy Hash: 277f68a8ef33fd892ad4b58a64bfb347b3fd29acc75adeb1ffad4ee53ec1b8c2
                                • Instruction Fuzzy Hash: 62511BE7FA774003FE5887E5692435E92935A953D6E85FC389E8D4BB0EFD3DA2814040
                                Strings
                                • random_device::random_device(const std::string&): unsupported token, xrefs: 00007FF650A54E61
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: CaptureContextUnwindabortmallocstrlen
                                • String ID: random_device::random_device(const std::string&): unsupported token
                                • API String ID: 467726954-222443098
                                • Opcode ID: 3f77018be4266621ae8b32caf86d1aa6f517c412206a536e5a4a9b30a61fb4cd
                                • Instruction ID: 17320159455007bda739806142bac4b7ef9079a4d6983084f36900289ee9edd3
                                • Opcode Fuzzy Hash: 3f77018be4266621ae8b32caf86d1aa6f517c412206a536e5a4a9b30a61fb4cd
                                • Instruction Fuzzy Hash: F521A577E1964372EE24AFA2B8511BA6764BF49BC4F8C0031ED4EA7797DE2CE1018340
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 26e0fa4ba8de209f33d981733c211bfc04209555fe558efc360ad56f06d6f81b
                                • Instruction ID: bab37cb81e15273f19aeaaea480becab6d28f828323ed94a28e6d565388f993d
                                • Opcode Fuzzy Hash: 26e0fa4ba8de209f33d981733c211bfc04209555fe558efc360ad56f06d6f81b
                                • Instruction Fuzzy Hash: DD12A1B3E0AB83E0FB5587A0A4417BA26D6DB51780F9D8435CA5C67787EF3CE5818780
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 26e0fa4ba8de209f33d981733c211bfc04209555fe558efc360ad56f06d6f81b
                                • Instruction ID: ac36e1cd5d6b37e7b0ca0484b4060e0b4bfcf5441cdfc02a755edcbe3781e447
                                • Opcode Fuzzy Hash: 26e0fa4ba8de209f33d981733c211bfc04209555fe558efc360ad56f06d6f81b
                                • Instruction Fuzzy Hash: E01290B2A1AB82C0FB658780E4457BE36D5ABD37C0F558435CA6C27785DE3CE9828342
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8e4314aa25bf8cd1932cbf5c45235f216c023b8993aa11dae999a1b1a2f4857f
                                • Instruction ID: 54ffca8060714c9ec45fcbaeb56c1ade0eafb804a7bb34c37a66f2d0f7a4c72a
                                • Opcode Fuzzy Hash: 8e4314aa25bf8cd1932cbf5c45235f216c023b8993aa11dae999a1b1a2f4857f
                                • Instruction Fuzzy Hash: E912BFB3A09743A6EB64CF61A44437A37A1FB44B88F5C8135CA4D97786DF3CE8918780
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 91d1045d800ad18b8a767b6d33ba05748f72f4317c74184e8fc2a0b96ab76432
                                • Instruction ID: 2cf55213dd4b54ef986d599502a80ac77b63b9bcda34c4f5af0774dc78177dea
                                • Opcode Fuzzy Hash: 91d1045d800ad18b8a767b6d33ba05748f72f4317c74184e8fc2a0b96ab76432
                                • Instruction Fuzzy Hash: F112B2B2A09742C5EB688F51D44437E36A1EB97BC8F548135CA2D1B789DF3CEC928781
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b057cbbb8f210a0f42a14319dea50cbe7b6f0892c6a6c6128709ea7b62745ec8
                                • Instruction ID: ec978e37c8a36b6155616264e6126c425066b234ad8da5d38734ba51f6f69a38
                                • Opcode Fuzzy Hash: b057cbbb8f210a0f42a14319dea50cbe7b6f0892c6a6c6128709ea7b62745ec8
                                • Instruction Fuzzy Hash: F402F973D0D24765FB668AA5960137E26E29F51BC4F5CA031CA4EA77C7DF2CE8918380
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b057cbbb8f210a0f42a14319dea50cbe7b6f0892c6a6c6128709ea7b62745ec8
                                • Instruction ID: 0110bb6657840e3a2b1105aeae8f2807c1255f95728c34c5a34a27af12373fee
                                • Opcode Fuzzy Hash: b057cbbb8f210a0f42a14319dea50cbe7b6f0892c6a6c6128709ea7b62745ec8
                                • Instruction Fuzzy Hash: CB02C371D0C286C5FB689A95D4053BD36999FD3BC8F488031CA6D677CADE2CE891A342
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: CaptureContextUnwindabort
                                • String ID:
                                • API String ID: 747564614-0
                                • Opcode ID: 051012ccbcc7b5faea14bd53a47746a31af2af7663974757354e2f3f032db126
                                • Instruction ID: 1c82caa613971b0c9eb63222c76723573e629d85590d9ada2c7432a1b4964915
                                • Opcode Fuzzy Hash: 051012ccbcc7b5faea14bd53a47746a31af2af7663974757354e2f3f032db126
                                • Instruction Fuzzy Hash: CCD09E66F5E003A2E814ABF268514B853602F66B88F5C1431D91EF7393AE1CE5514309
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fwrite$fputs$abortfree$fputcmemcpystrlen
                                • String ID: what(): $terminate called after throwing an instance of '$terminate called recursively$terminate called without an active exception
                                • API String ID: 802779101-808685626
                                • Opcode ID: 82efe803838a8d037a76eabb839b4317706212d83b69d01b170799ebd747e01d
                                • Instruction ID: 38b6df62057ceb23360ded53b2c61bf6796763ce60b9c0ebd1f63adc3181de8b
                                • Opcode Fuzzy Hash: 82efe803838a8d037a76eabb839b4317706212d83b69d01b170799ebd747e01d
                                • Instruction Fuzzy Hash: 57417E36F0811326FA10A7F2A8257FA5691AF89BC4F4C4135E90EE77C3EE2DE5018781
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: fwrite$fputs$abortfree$fputcmemcpystrlen
                                • String ID: what(): $terminate called after throwing an instance of '$terminate called recursively$terminate called without an active exception
                                • API String ID: 802779101-808685626
                                • Opcode ID: edf95c3c8eb852e668d785d020afc51512c552d478493648ad0ea523f3eccf66
                                • Instruction ID: 9f5eb26119dfa7cfe22337b8b1b591bd8a9f0ebcf65f0d40db26e4f605c64671
                                • Opcode Fuzzy Hash: edf95c3c8eb852e668d785d020afc51512c552d478493648ad0ea523f3eccf66
                                • Instruction Fuzzy Hash: C7418030F1A19605FB10A7E1E8257BE6696AFD67C0F804136E92E477C2DE2DE5028713
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: Byte$CharLeadMultiWide___lc_codepage_func___mb_cur_max_func_errno
                                • String ID:
                                • API String ID: 3183172368-0
                                • Opcode ID: 8ab632f43d6acf1946b61802747c5be28d51b72408049796820b803039f0fca0
                                • Instruction ID: c7c2c73887d227b39ac16850421fbbfad841ef091e94d342f76bf48014749c41
                                • Opcode Fuzzy Hash: 8ab632f43d6acf1946b61802747c5be28d51b72408049796820b803039f0fca0
                                • Instruction Fuzzy Hash: 85B19373A0C643A6E7A08F91E4403FA6690FB59788F0C4035EA8DEBB86DF7DE5058740
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: Byte$CharLeadMultiWide___lc_codepage_func___mb_cur_max_func_errno
                                • String ID:
                                • API String ID: 3183172368-0
                                • Opcode ID: 4f52c65fb300fda4aa6b42498341c75719a94bc644baadafcd56d94d8acb21db
                                • Instruction ID: fcaf2e671f7db401ba52557325aafe4ff4b4f211e14bdb97ead6544806eda17d
                                • Opcode Fuzzy Hash: 4f52c65fb300fda4aa6b42498341c75719a94bc644baadafcd56d94d8acb21db
                                • Instruction Fuzzy Hash: 53B1AE32A1E6428EE7608F91E44037E7BA0BB957C8F088035EAAD47784EF7DE555C702
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID: UUUU
                                • API String ID: 1992160199-1798160573
                                • Opcode ID: 3b85de55c72d650216168256f511233200dee7a2bcb32fa0b97bc0524bea5549
                                • Instruction ID: 7cc0676dd6ca11b5820f892e6df0037614cb6c7c09ba4f9843635c75756ba2d5
                                • Opcode Fuzzy Hash: 3b85de55c72d650216168256f511233200dee7a2bcb32fa0b97bc0524bea5549
                                • Instruction Fuzzy Hash: CE126373D291079BE7648F66C55077937E1EB95B54F2D8239CA0DA63CADE3CE8408B40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID: UUUU
                                • API String ID: 1992160199-1798160573
                                • Opcode ID: 6b68097bf7420150babb894e36c6aeaff896fa196c61cd1df292c1f48f671bb8
                                • Instruction ID: 574b68ed67f227efba5db05e43784d6373f948eef2d8c1121db33bb21f24a7b5
                                • Opcode Fuzzy Hash: 6b68097bf7420150babb894e36c6aeaff896fa196c61cd1df292c1f48f671bb8
                                • Instruction Fuzzy Hash: 5E120072A091828AE768CF64C15477D37E1EBD5B98F258239CA2D472C9DB3DF841CB42
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$strlen
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_replace_aux$basic_string::append
                                • API String ID: 2619041689-2502837630
                                • Opcode ID: 48419a8f08ca8c08c9906f507af28e38fcaf8763e241285874e94f5c930be9c0
                                • Instruction ID: 3cec3de4c3ba9354a4612cddd4e5f2f88d7ce4eb64f320fdcd3566b73afa1224
                                • Opcode Fuzzy Hash: 48419a8f08ca8c08c9906f507af28e38fcaf8763e241285874e94f5c930be9c0
                                • Instruction Fuzzy Hash: 0CE1D577A09A87B1EF208FA9D4501B86360AB45F98F8C8532DE9DA77C7DE6CD442C300
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: CriticalSection$DeleteEnterErrorInitializeLastLeaveValuefree
                                • String ID:
                                • API String ID: 100439675-0
                                • Opcode ID: 9d870255927499374f5c0de93d0108a320339cf10cb9145e98a0e1dfec17ba73
                                • Instruction ID: dd6ee13e92fc1a72f7f3e21a4d260e047749ab939c3ba25276386d7674f9d077
                                • Opcode Fuzzy Hash: 9d870255927499374f5c0de93d0108a320339cf10cb9145e98a0e1dfec17ba73
                                • Instruction Fuzzy Hash: 8F412A32F19643A5FA569F52A8802B863A0BF56F89F8C4430DD0EF7792DF2DE8458704
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: CriticalSection$DeleteEnterErrorInitializeLastLeaveValuefree
                                • String ID:
                                • API String ID: 100439675-0
                                • Opcode ID: 4766b8e9fd29cc773eb12eff48182ef52404bb47ad56aa230f7c8f0114981fc5
                                • Instruction ID: 71298113258c4a239cccaf609580a51049c672fd805c6ca36f8b003a72777fa0
                                • Opcode Fuzzy Hash: 4766b8e9fd29cc773eb12eff48182ef52404bb47ad56aa230f7c8f0114981fc5
                                • Instruction Fuzzy Hash: 5E412832A4964786FB559F91E88077D33A8AFA4BD1F584431CD3D4B290DE3CE885D302
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: ExceptionRaiseUnwindabort
                                • String ID: CCG $CCG!$CCG!$CCG"
                                • API String ID: 4140830120-3707373406
                                • Opcode ID: fde0313c25a5494f8e4f383ceaa978a1d11fd6de5f1a372e9350cc734f2aaca8
                                • Instruction ID: 8178733c5bf1f5a70ab8dcab5f251860db29b36b12b4c9a43926a938dcb5e395
                                • Opcode Fuzzy Hash: fde0313c25a5494f8e4f383ceaa978a1d11fd6de5f1a372e9350cc734f2aaca8
                                • Instruction Fuzzy Hash: D951F533A08B8292E7608B55E8406AD7370F789B98F585236EF8DA3758DF3DD581C740
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: ExceptionRaiseUnwindabort
                                • String ID: CCG $CCG!$CCG!$CCG"
                                • API String ID: 4140830120-3707373406
                                • Opcode ID: 90bb83fa7776ed93d0da856b8a3e6ce9c4dbb2454710fb748a419578ffc60a1a
                                • Instruction ID: 159b6f691d5ff27d12ab30a59232969873a043c5f403e4444e0b8905b7829621
                                • Opcode Fuzzy Hash: 90bb83fa7776ed93d0da856b8a3e6ce9c4dbb2454710fb748a419578ffc60a1a
                                • Instruction Fuzzy Hash: 8051C072A09B8082E7608B95E484BAD7371FB89BE8F504236EE9D53758DF3CD582C741
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: QueryVirtual
                                • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                • API String ID: 1804819252-1534286854
                                • Opcode ID: 02d614dfa8185db52efcd01afb4849760be1b7bc499b1083443bb5334d1fc27a
                                • Instruction ID: d1ca22259d4b2c2f2cfc603330b4c426d7c3322038e107293ebe389a891bdbff
                                • Opcode Fuzzy Hash: 02d614dfa8185db52efcd01afb4849760be1b7bc499b1083443bb5334d1fc27a
                                • Instruction Fuzzy Hash: BB51C433A0AA4BA2EB108B52EC806A97760FB99B94F4C4131EE4DA7395DF3DE545C740
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: QueryVirtual
                                • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                • API String ID: 1804819252-1534286854
                                • Opcode ID: 28f240d08aa4f89baa3871d4531be182b0c14c0bdf7d081bf6bfcfc7e573e459
                                • Instruction ID: 2f28048250e42f3754f7718d40e40d65e77c457d1b853083731093f7482b1cf1
                                • Opcode Fuzzy Hash: 28f240d08aa4f89baa3871d4531be182b0c14c0bdf7d081bf6bfcfc7e573e459
                                • Instruction Fuzzy Hash: 5051AD72A49A8682EB108B91E8407AEBBA4FFD9BD4F544131DE6C07394DE3CE485C741
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID:
                                • API String ID: 1992160199-0
                                • Opcode ID: d2623296c75c8317225f068edeea6053287046020c41a073c712053802fb2e7c
                                • Instruction ID: 4c0de70765c23a4b44ec356a647c6635510175e01643895f3cc0dfe4a541bb8f
                                • Opcode Fuzzy Hash: d2623296c75c8317225f068edeea6053287046020c41a073c712053802fb2e7c
                                • Instruction Fuzzy Hash: FBE182B3A1810397F7648F66C94077977E1EB58B58F298235CB09A778ADE3CEC408B40
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID:
                                • API String ID: 1992160199-0
                                • Opcode ID: 6455380b65f2535aa43ea52f4673dc818bd6c141cbea47eaf03f434f54f19436
                                • Instruction ID: acfe8d278df180c46443f491cd6b30a49c5eacdca859672c33272b347dc1c5d7
                                • Opcode Fuzzy Hash: 6455380b65f2535aa43ea52f4673dc818bd6c141cbea47eaf03f434f54f19436
                                • Instruction Fuzzy Hash: 03E15EB2A182428AE764CF65C15473D7BF1EBD5B98F258239CA194B688DB3CFC41CB41
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: ExceptionRaise$abort
                                • String ID: CCG $CCG"$CCG"
                                • API String ID: 3325032505-1179968548
                                • Opcode ID: 6155bbc2972aea80dd357c6f9dd873a51dfca5167871fe7239fcb68a4b93464d
                                • Instruction ID: de114f8f8baedef4ee310fe9da109ffac8f1c91c9cb726a1ef9d48bee7734a7e
                                • Opcode Fuzzy Hash: 6155bbc2972aea80dd357c6f9dd873a51dfca5167871fe7239fcb68a4b93464d
                                • Instruction Fuzzy Hash: D7214F33A24B8183E3508B55E4403A96771F7DA788F24E22AEA8E57764DF7EC5928700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: ExceptionRaise$abort
                                • String ID: CCG $CCG"$CCG"
                                • API String ID: 3325032505-1179968548
                                • Opcode ID: 53613a2d622f21e71032688e725efff7241a844c5a6880d00138c6d8c33be4d6
                                • Instruction ID: a659bd7fab235ac8dd9988b7cb519900e03ad22ccc45980654d51de691be9d6d
                                • Opcode Fuzzy Hash: 53613a2d622f21e71032688e725efff7241a844c5a6880d00138c6d8c33be4d6
                                • Instruction Fuzzy Hash: 11217F33A25B8183E3508B94E4403A97761F7D9B88F20A22AEA9D17364DF7DC1928700
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: CriticalLeaveSectionfree
                                • String ID:
                                • API String ID: 1679108487-0
                                • Opcode ID: 0adf30420a38456bda5cec22cb01bc4186c16200f06ece984035fd22919c0e84
                                • Instruction ID: 49315b482da39879c35815381fe6cd50f109a0d2d966622b1624ae59883529ab
                                • Opcode Fuzzy Hash: 0adf30420a38456bda5cec22cb01bc4186c16200f06ece984035fd22919c0e84
                                • Instruction Fuzzy Hash: 6B918332A19A03A6FB558B95D9A07B932A0FF49B84F4C4131DA0EB7796DF3DE4518340
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: CriticalLeaveSectionfree
                                • String ID:
                                • API String ID: 1679108487-0
                                • Opcode ID: 1b8962f21e1c4b96ba69e026f945ac79706ff6e337c3f80089efbab90e5c3a60
                                • Instruction ID: 8c41aebdb29eb29625f401ceaca34c1e3f7cea147ee029112fa7dc2eade36690
                                • Opcode Fuzzy Hash: 1b8962f21e1c4b96ba69e026f945ac79706ff6e337c3f80089efbab90e5c3a60
                                • Instruction Fuzzy Hash: 77916A31A49A8385FB608BA5E58037D37A5BF94BC6F484531DA2E8BB94DF3CB4518302
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: basic_string::_M_create
                                • API String ID: 2221118986-3122258987
                                • Opcode ID: 0e09e788f27b9f177f356dc5e55521f0ba2b3d79d8a11c7610ff5ba8fb92f5b8
                                • Instruction ID: dc6075a206e6f23a84761fcb1394c471e9263f4be3133be1d858bc7a492ad38f
                                • Opcode Fuzzy Hash: 0e09e788f27b9f177f356dc5e55521f0ba2b3d79d8a11c7610ff5ba8fb92f5b8
                                • Instruction Fuzzy Hash: A881CA77B09A8265EF269F66F8802B8A650A759BD4F5C8135CFDD87392DE3CD482C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$wcslen
                                • String ID: basic_string::_M_create$basic_string::append
                                • API String ID: 1844840824-3923985592
                                • Opcode ID: e9448da7214d55d46f3a6dd9be7a987f2e7ac8cb33f78541989cd8544dd67dfe
                                • Instruction ID: 0b213b233420ec3d3528cb5e97f739ea2e46d9aa836a593df350244dae10ace7
                                • Opcode Fuzzy Hash: e9448da7214d55d46f3a6dd9be7a987f2e7ac8cb33f78541989cd8544dd67dfe
                                • Instruction Fuzzy Hash: 6A91817BA09657A1EE108BA5E4101BD2361BB46BA4F5C8532DE1DA73D6EE3CE442C340
                                APIs
                                • VirtualProtect.KERNEL32(?,?,?,00007FF8E7C58A34,?,?,?,?,00007FF8E7B0124D), ref: 00007FF8E7B179A3
                                Strings
                                • Unknown pseudo relocation bit size %d., xrefs: 00007FF8E7B17B24
                                • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF8E7B17B3A
                                • Unknown pseudo relocation protocol version %d., xrefs: 00007FF8E7B17B46
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                • API String ID: 544645111-1286557213
                                • Opcode ID: 176a619fb0b680867fe6370efde1010fe92bd4fe8d17e4c6ea9cfe6904e18e5e
                                • Instruction ID: d3ecdcce8a12102a5f1c9f49f2d6392f45bb62351f20b082b481a3739dc510e9
                                • Opcode Fuzzy Hash: 176a619fb0b680867fe6370efde1010fe92bd4fe8d17e4c6ea9cfe6904e18e5e
                                • Instruction Fuzzy Hash: BEA19C32E5855382FB108BA5D85077E72A5AFE4BE4F148231D93D57BD8EE3CE8429342
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcmp$strlen
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::compare
                                • API String ID: 3738950036-1697194757
                                • Opcode ID: 8eba21a0c5b588d9bccf02a7cb7609698d9b576d1b4c986afc1b9fc8a3d0aea6
                                • Instruction ID: c0dfd38bf47466cc76e55a02da19f9e55e365c89738832ba390235f7d2b85214
                                • Opcode Fuzzy Hash: 8eba21a0c5b588d9bccf02a7cb7609698d9b576d1b4c986afc1b9fc8a3d0aea6
                                • Instruction Fuzzy Hash: 6D51B063F4998762FE109AA6EC502E452509F4ABE4F5C8231EE2DF77D3DD1CE9868300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcmp$strlen
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::compare
                                • API String ID: 3738950036-1697194757
                                • Opcode ID: 198f3b227f30857ee76723fb75822729b1260bbce8665b74e23255c8d8515f24
                                • Instruction ID: 7128e35be919efa7b92110bdaeddd9353f53c5e6ce2fc972c21cf330607630d0
                                • Opcode Fuzzy Hash: 198f3b227f30857ee76723fb75822729b1260bbce8665b74e23255c8d8515f24
                                • Instruction Fuzzy Hash: 5351F773F0958362EE1486BAE8442F412555F1ABE5F9C5631EE2DE73D3EE1CEA818300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: FormatFreeLocalMessagememcpy
                                • String ID: Unknown $basic_string: construction from null is not valid$error co
                                • API String ID: 1463094090-4228307607
                                • Opcode ID: 787b955189c560e162dac32be70720551e745198ad51b2b75e3c363664ed0b07
                                • Instruction ID: 814dab3e60a4eececd179da62aadfd038ddd98e7a2fe25e09ce7df1ec2fdf3b3
                                • Opcode Fuzzy Hash: 787b955189c560e162dac32be70720551e745198ad51b2b75e3c363664ed0b07
                                • Instruction Fuzzy Hash: 30417C33608B4291E7118F65E4503AEB7A5EB89BC8F588031EB8D97B99DF3DD456C300
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID:
                                • API String ID: 1992160199-0
                                • Opcode ID: 5a2601bb742be21d7d0ed194e9666a6ba37078df609cf0cda1f1cf3f5c2d7d2e
                                • Instruction ID: 00ac4e084526f59be4378a8d3d5e2c6acfff411579ad904a37f64c3dd94ca8f5
                                • Opcode Fuzzy Hash: 5a2601bb742be21d7d0ed194e9666a6ba37078df609cf0cda1f1cf3f5c2d7d2e
                                • Instruction Fuzzy Hash: 1EF1B573E1858357E7658F6699047392A91AF24BA8F5D8235CA1DB7BCACE3CEC41C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID:
                                • API String ID: 1992160199-0
                                • Opcode ID: 67e0c1fe5ae666fd804cf944b37e3220ac5a14e8281472bc3b8760f1b714fa65
                                • Instruction ID: 95ca2d9ac645c51ea6081bdbd6dfd7c49f8c4114e307ae62e3621d3311c22442
                                • Opcode Fuzzy Hash: 67e0c1fe5ae666fd804cf944b37e3220ac5a14e8281472bc3b8760f1b714fa65
                                • Instruction Fuzzy Hash: A9F1C472E182C286FB658F65D00477D3A91BB95BE8F658234CA3D57BC4CA3CE941C742
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: basic_string::_M_create
                                • API String ID: 2221118986-3122258987
                                • Opcode ID: 4b44bbbeae9dc4b1646844eb1030e5491146d3e538e3ce0a53e4b25d53cf4c50
                                • Instruction ID: fc739c4103bb7a660014b788b5fd5d2ab518b31c27a224116e887fa61161e1b8
                                • Opcode Fuzzy Hash: 4b44bbbeae9dc4b1646844eb1030e5491146d3e538e3ce0a53e4b25d53cf4c50
                                • Instruction Fuzzy Hash: B9A194B7A08B82A5EB298F55F4802ADA690F755B94F5C8135CBAD87392DF3CD591C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: basic_string::_S_construct null not valid$basic_string::_S_create
                                • API String ID: 2221118986-1585226940
                                • Opcode ID: 55844057d3f7c5db19d15d6d90bb1f8ddb2260f8e69176d58b11f3855ca9b239
                                • Instruction ID: 2716a5fb2a46fcb71f270f590e350c2b4b88d326694e34e6b0c43322acc7410a
                                • Opcode Fuzzy Hash: 55844057d3f7c5db19d15d6d90bb1f8ddb2260f8e69176d58b11f3855ca9b239
                                • Instruction Fuzzy Hash: 53B10177B05683B5EA258F51E8402B936A0EB957E4F8C8335EE6D873D2EE38D585C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: basic_string::_S_construct null not valid$basic_string::_S_create
                                • API String ID: 2221118986-1585226940
                                • Opcode ID: e6ed32b3a5c6c1d762df7a3d10d15ca7f5c0089d545d4197bbf087d2a7cd484a
                                • Instruction ID: 5d69031dd82626421f9326b10b441bce44f0421e08fd5257fcf6bf01374bc8cf
                                • Opcode Fuzzy Hash: e6ed32b3a5c6c1d762df7a3d10d15ca7f5c0089d545d4197bbf087d2a7cd484a
                                • Instruction Fuzzy Hash: DFA11177B05682B5EA159F61E8402F836A0EB957B4F8C4335EE6C973D2EE38D584C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpywcslen
                                • String ID: basic_string::_M_create$basic_string::_M_replace
                                • API String ID: 982415701-3182797996
                                • Opcode ID: 68480958ced44fe4d218a67651c89615f425b4fa6ff5d62f5338f15568a5601a
                                • Instruction ID: 32c3bf4af64d9f0b318ae9dccfb3dea6ecf60180a4e36767c04f043a6914c4b3
                                • Opcode Fuzzy Hash: 68480958ced44fe4d218a67651c89615f425b4fa6ff5d62f5338f15568a5601a
                                • Instruction Fuzzy Hash: F6919737B09A47A0EE249BA5E4402B96361BB45BD4F4C8532EE0DD7796EF3CE846C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: basic_string::_M_create
                                • API String ID: 2221118986-3122258987
                                • Opcode ID: f851bbf691a1be4f93637b5c807fb9b1c4b727407fd193121e334bef4585c420
                                • Instruction ID: dc3909f34250c83c2b03040bef20e3967c036c731f9abcf6fea15afbebecae8f
                                • Opcode Fuzzy Hash: f851bbf691a1be4f93637b5c807fb9b1c4b727407fd193121e334bef4585c420
                                • Instruction Fuzzy Hash: 5971C777A0968291EF358F65F8803A9A660E7697D4F5C8135CBDD87796DE3CD482C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpystrlen
                                • String ID: basic_string::_M_create$basic_string::_M_replace
                                • API String ID: 3412268980-3182797996
                                • Opcode ID: 48abf738eba9e2a3f8189a12aaf7fd186d4ff5015c44ceeeab58cb8dc134f67b
                                • Instruction ID: 615f3e09f754fa399fe9e9e1100391f3fbf60875d3842f6b875a94cb482f6d9d
                                • Opcode Fuzzy Hash: 48abf738eba9e2a3f8189a12aaf7fd186d4ff5015c44ceeeab58cb8dc134f67b
                                • Instruction Fuzzy Hash: E1919437B09A57B5EF109BA5D4502BD6351AB54FD8F8C8532DE8DA778ADE2CE842C300
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: Byte$CharLeadMultiWide___lc_codepage_func___mb_cur_max_func
                                • String ID:
                                • API String ID: 2785433807-0
                                • Opcode ID: f4751aef1eafc67f76771c00819b599d7fb6752d026c6847df3114e022fb8c14
                                • Instruction ID: 5b98090a0ccc2dafd6776045765169486924158c6f1feeedeedd5adef2fe6aec
                                • Opcode Fuzzy Hash: f4751aef1eafc67f76771c00819b599d7fb6752d026c6847df3114e022fb8c14
                                • Instruction Fuzzy Hash: A7311733B0824359E7564B61A8403FA6694AB4A7E8F4C4336EEA9977C2DE7DD485C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: Byte$CharLeadMultiWide___lc_codepage_func___mb_cur_max_func
                                • String ID:
                                • API String ID: 2785433807-0
                                • Opcode ID: 5f39427e5e3fd4a3ee20e5b5c45756d92d827e3bf56739c64fefe41f8664ae75
                                • Instruction ID: 3a8edb488f633554d05fbccf7cdeb6d6016d0cf441a8e5813ad50a2164fe9a05
                                • Opcode Fuzzy Hash: 5f39427e5e3fd4a3ee20e5b5c45756d92d827e3bf56739c64fefe41f8664ae75
                                • Instruction Fuzzy Hash: B731F633A0A2428DE7525B61F8003AD7654AB917E8F444236EEB9477D4DF7CD581C701
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: Byte$CharLeadMultiWide___lc_codepage_func___mb_cur_max_func
                                • String ID:
                                • API String ID: 2785433807-0
                                • Opcode ID: e0ef47371ec9e278b31103b3fd6f656366c31e15180cfbc100e988709e094f72
                                • Instruction ID: 41b170cb45062b7713d363e8255e7d447dbfd9ec555f2f352dd448f67e2cd005
                                • Opcode Fuzzy Hash: e0ef47371ec9e278b31103b3fd6f656366c31e15180cfbc100e988709e094f72
                                • Instruction Fuzzy Hash: 0E31F273B0D7035AEB614A91A4013F96690AB497E8F4C0635EEADA7BC2EF7DD4458B00
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: Byte$CharLeadMultiWide___lc_codepage_func___mb_cur_max_func
                                • String ID:
                                • API String ID: 2785433807-0
                                • Opcode ID: a3287d4ffe005055a906fa946a28c476f793c0b8a98b9791bce0218bc2970884
                                • Instruction ID: c81964c16aa174b95526cb8230dfafca91c8c871c111e12141fce6f6e03497be
                                • Opcode Fuzzy Hash: a3287d4ffe005055a906fa946a28c476f793c0b8a98b9791bce0218bc2970884
                                • Instruction Fuzzy Hash: 8931CE72A0A60149EB614B91E4003BD7690AB86BE8F444235EEBD47BD5EFBCD884C702
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: strcpy_s$_strlwr$ByteCharMultiWide
                                • String ID:
                                • API String ID: 2752519838-0
                                • Opcode ID: b49aae15f71631d1fe2494b4ed0ca7c17df8e33b82628a1c7862367309f633f0
                                • Instruction ID: 35f42c2b71338f225c9545bc9a87efd872513896740a5e7f134f7c40fe21502a
                                • Opcode Fuzzy Hash: b49aae15f71631d1fe2494b4ed0ca7c17df8e33b82628a1c7862367309f633f0
                                • Instruction Fuzzy Hash: 66319272604B8692EB608F51F8407AA6761FB8AB94F4C4135EF4E63794CF3DC056D704
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpystrerrorstrlen
                                • String ID: __gnu_cxx::__concurrence_lock_error$basic_string: construction from null is not valid
                                • API String ID: 2955597728-1066207237
                                • Opcode ID: 836aa0fc2834f70cafe947f1e6ca398b506a69b679ba53fd7d483ca8a08dd999
                                • Instruction ID: a4d9b4ebc142b8ee52e4d2321d1651b55b07ed165432c5af04a59dbc78b7ba99
                                • Opcode Fuzzy Hash: 836aa0fc2834f70cafe947f1e6ca398b506a69b679ba53fd7d483ca8a08dd999
                                • Instruction Fuzzy Hash: 0A11B233A09B42A9EE509B61E8002BC2794AB4EBD8F4C4130DE4D97786DE3CE150C310
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID: basic_string::_M_create
                                • API String ID: 0-3122258987
                                • Opcode ID: f4b0626a091b5ff5dedc6222a4086b63f5ae70f49485ddd7f5157f6618e1ac69
                                • Instruction ID: 1de136087d1a6854f37cf7661876307ff702f457e089ee632f4671e40e58594e
                                • Opcode Fuzzy Hash: f4b0626a091b5ff5dedc6222a4086b63f5ae70f49485ddd7f5157f6618e1ac69
                                • Instruction Fuzzy Hash: 82A1B777B25647B5ED249F66E8400B8A260AB55BE0F5C8631DE5EE73D2DF2DE481C300
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2a67022de2d0f3e7fbb5a2b5da87f3078e3fa5e55b14ba386eecbdd5a6595ed1
                                • Instruction ID: da582dc7560fb168a9fed255f7244c3ee18e85c47922fba2bad78bb286e1db69
                                • Opcode Fuzzy Hash: 2a67022de2d0f3e7fbb5a2b5da87f3078e3fa5e55b14ba386eecbdd5a6595ed1
                                • Instruction Fuzzy Hash: FEC17EB3E2825797E7658E66C80477A6BA1EB04B54F5D8235CA1CA738ADF3CF841C740
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 9144cf1045d7e2c903a37bdb67ff89c02f36cefd9ce95b033c499c81022daf61
                                • Instruction ID: 48f9b87f98a971512f239abb7bf3afd18da7764d6c89205e719e294322bac7e3
                                • Opcode Fuzzy Hash: 9144cf1045d7e2c903a37bdb67ff89c02f36cefd9ce95b033c499c81022daf61
                                • Instruction Fuzzy Hash: 4DC1A0B3E196D286E7658F68C00437D7BA1EB84BD8F598235CA2C57789CB3CE841C742
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::append
                                • API String ID: 3510742995-4063909124
                                • Opcode ID: 372393b1e24b62b7c528af8aae081c131a78d624f828ddd5c46040396ee5eb2d
                                • Instruction ID: e1a85bd5712df4550c1254349acd5a14ff97b09432368b9112cb9c5ee8a55713
                                • Opcode Fuzzy Hash: 372393b1e24b62b7c528af8aae081c131a78d624f828ddd5c46040396ee5eb2d
                                • Instruction Fuzzy Hash: FA91D173B0A657A5EE10CF9AD4446BD6321AB69FC4F5C8531CF0DAB79ACE2DE4808340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$strlen
                                • String ID: basic_string::append
                                • API String ID: 2619041689-3811946249
                                • Opcode ID: 03d23536ebeb4d4294db75bf42d0466fa742dd0262f7fe9c41642cea724fb563
                                • Instruction ID: a23893f3f6626082782cbdc0cccdb4a49eb278434d610e2dfa49ab84347a918c
                                • Opcode Fuzzy Hash: 03d23536ebeb4d4294db75bf42d0466fa742dd0262f7fe9c41642cea724fb563
                                • Instruction Fuzzy Hash: 9181A333B0964796EE10CF9AD5842BD6351AB49FD8F6C8431DB0DE7796DE2DE4818340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$mallocstrlen
                                • String ID: basic_string::_S_construct null not valid$basic_string::_S_create
                                • API String ID: 2479879881-1585226940
                                • Opcode ID: 710194d4991f7a2f98d4c391bc7678ba07feb2b1053acad1e0f12206fa4c42b0
                                • Instruction ID: 71e25d8053d812397608e6c25aec2d00b9f8997ba509fcaa5ed8d2fb7c7e7604
                                • Opcode Fuzzy Hash: 710194d4991f7a2f98d4c391bc7678ba07feb2b1053acad1e0f12206fa4c42b0
                                • Instruction Fuzzy Hash: 55510477A0664375EA119F51E8402F82690EB997E0F8C4736EE6D973D2EF38D594C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$mallocstrlen
                                • String ID: basic_string::_S_construct null not valid$basic_string::_S_create
                                • API String ID: 2479879881-1585226940
                                • Opcode ID: ad90a48527fd3c0c35911f54050373d7dc964c86d66f23b1fdff391e4a4f1204
                                • Instruction ID: ba5eeb1fa854281417e63072320b28fe3c6d32939563166d7b484ff21cd74f16
                                • Opcode Fuzzy Hash: ad90a48527fd3c0c35911f54050373d7dc964c86d66f23b1fdff391e4a4f1204
                                • Instruction Fuzzy Hash: C5511373B15683A9EA159F51E8413F826A0AB597E0F8C4736EE2D973D2EF38D584C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$memset
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::replace
                                • API String ID: 438689982-3564965661
                                • Opcode ID: ae16e8adeca1e503202f87713b16739ba9d0129533bec58a53f1e86279340467
                                • Instruction ID: e0c46822a6172b66b5f168a19903b4e94a257eba42082f74fe7103cbc8d55121
                                • Opcode Fuzzy Hash: ae16e8adeca1e503202f87713b16739ba9d0129533bec58a53f1e86279340467
                                • Instruction Fuzzy Hash: E941AA72B09647A1EE10CF52E8442B927A1AB49BD4F8D4232DE1DA73E6EE3CE545C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpystrlen
                                • String ID: basic_string: construction from null is not valid$basic_string::_M_create
                                • API String ID: 3412268980-1223694479
                                • Opcode ID: 73c9ca1c5c9a256c84203b450f9d76c842154531fc75efa77a43ac5dd138d846
                                • Instruction ID: ee7b053c06326a5be38091e73a8de659b13926736667dad54bce5dac4773bf53
                                • Opcode Fuzzy Hash: 73c9ca1c5c9a256c84203b450f9d76c842154531fc75efa77a43ac5dd138d846
                                • Instruction Fuzzy Hash: A041D377A09783A5EE269F65F8802B8A650AB197C8F5C8531CF8D96393EF3CD552C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpystrlen
                                • String ID: basic_string: construction from null is not valid$basic_string::_M_create
                                • API String ID: 3412268980-1223694479
                                • Opcode ID: f0c37abbaba62541ab1a03470bd25d44678d9405c139f7e820df20979a977a86
                                • Instruction ID: d71bd991b34993c1c85b4a6c10a904b18a8811e744c3238b25ca3aec5a746d41
                                • Opcode Fuzzy Hash: f0c37abbaba62541ab1a03470bd25d44678d9405c139f7e820df20979a977a86
                                • Instruction Fuzzy Hash: 2B41D277A09783A5EE259F69F8402B86650AB6A788F9C8131CF9D96397DF3CD542C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpywcslen
                                • String ID: basic_string: construction from null is not valid$basic_string::_M_create
                                • API String ID: 982415701-1223694479
                                • Opcode ID: 7dcb490e9a617bd7580b4ff398885b597feb55f7b670acec863021936b865c0b
                                • Instruction ID: c208e101332fcc1c0de9995a03571b030ea33606a1e0ed2b7aa69ebcdaa11afd
                                • Opcode Fuzzy Hash: 7dcb490e9a617bd7580b4ff398885b597feb55f7b670acec863021936b865c0b
                                • Instruction Fuzzy Hash: 9A41A577A15A43A5EE259FA5E8405B82360BB45BA4F5C8631DE2E973D2FF3CD442C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpywcslen
                                • String ID: basic_string: construction from null is not valid$basic_string::_M_create
                                • API String ID: 982415701-1223694479
                                • Opcode ID: e4aa45ff48d31592d6089a704b5feb5c79ab75178d94b4030b005af8b3c3b0b5
                                • Instruction ID: 8d446bcaa0d58b25d8c5b46f019fa79ca1215e79edbbb581c31221f0ccb4fc6a
                                • Opcode Fuzzy Hash: e4aa45ff48d31592d6089a704b5feb5c79ab75178d94b4030b005af8b3c3b0b5
                                • Instruction Fuzzy Hash: 5E41A137A19B43A4EE259F65E8405B82360BF49BA4F5C8631DE2E963D6EF38D542C300
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: _strlwrstrcpy_s$strstr
                                • String ID:
                                • API String ID: 3965555556-0
                                • Opcode ID: efbcc2a3401eb8c21b32cfdc81362c962182d1041dcd3ac11cd720865a6a4742
                                • Instruction ID: 9a242e28a32a7a014b315b477c260acf1ecf303b804ea8c23733d7ff834b45f4
                                • Opcode Fuzzy Hash: efbcc2a3401eb8c21b32cfdc81362c962182d1041dcd3ac11cd720865a6a4742
                                • Instruction Fuzzy Hash: CDF08CA175469B56EA15AB12BD003E95714AB87FD1F4C40329E4E63795DD2CE2878304
                                APIs
                                • VirtualProtect.KERNEL32(00007FF650BC0060,00007FF650BC0068,00007FF650BC00B0,?,?,?,?,00000001,00007FF650A11244), ref: 00007FF650A28FF3
                                Strings
                                • Unknown pseudo relocation bit size %d., xrefs: 00007FF650A29174
                                • Unknown pseudo relocation protocol version %d., xrefs: 00007FF650A29196
                                • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF650A2918A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                • API String ID: 544645111-1286557213
                                • Opcode ID: bcffde39809061c7ea3fb1db8d3c9866b5d6e56b3355d360dec00a378ad89fc3
                                • Instruction ID: c23e71be915799c90a4d48421f6e6c1f992c0dabade35854995416764897522b
                                • Opcode Fuzzy Hash: bcffde39809061c7ea3fb1db8d3c9866b5d6e56b3355d360dec00a378ad89fc3
                                • Instruction Fuzzy Hash: 7691D433E1A517A2FB144BA6DD402796361BF95BA4F5C8331DE1DA37DADE3CE8128200
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: freememcpystrlen
                                • String ID:
                                • API String ID: 2208669145-0
                                • Opcode ID: bfd6b24141c09afc5479d5edd972624a462b0c0cdcee00c7c12b39fd30ec25df
                                • Instruction ID: cfbd55fd58e6c4d8521b8ffa6bf5de1c60c36906a1a20228ff45af18bcd266b7
                                • Opcode Fuzzy Hash: bfd6b24141c09afc5479d5edd972624a462b0c0cdcee00c7c12b39fd30ec25df
                                • Instruction Fuzzy Hash: D3319233E0A653A5FA665B936E003B95250AF85BE0F5C8230ED5DABBC6DE3CE4418240
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: freememcpystrlen
                                • String ID:
                                • API String ID: 2208669145-0
                                • Opcode ID: 54317f0fdeac30bcebbf66fa6848f9a36ed90ca35f5092cf1ed1f2acbf0d2b7e
                                • Instruction ID: 443bc390bc6fe50cf327cc7a19c32c06a224d3fb7c3d5716bdf590d362e1721d
                                • Opcode Fuzzy Hash: 54317f0fdeac30bcebbf66fa6848f9a36ed90ca35f5092cf1ed1f2acbf0d2b7e
                                • Instruction Fuzzy Hash: F7316472F5D64245FA665A91F60037EB651AFC5BE0F588230EE7E0BBC4DE2CA5438342
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID: basic_string::_M_create
                                • API String ID: 0-3122258987
                                • Opcode ID: ea43ae0f9df0b401bb8964806251c7eb8c81abb4b1b8570c762acf9a0f8e89c6
                                • Instruction ID: 762cd7807af7d2fa6eceeca4b7fbe611dccefea507cdc1f721c464b676397ae8
                                • Opcode Fuzzy Hash: ea43ae0f9df0b401bb8964806251c7eb8c81abb4b1b8570c762acf9a0f8e89c6
                                • Instruction Fuzzy Hash: C7C1E277A19B42A1EE188F65D4402BC62A0FB45BE4F5C8732DA2D977D5EF38D592C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: strlen
                                • String ID: t$ty$y
                                • API String ID: 39653677-1920740250
                                • Opcode ID: e43110739a29eee34cbe1b1be042f1a923287325b8ab67ec124107a2e7bbb47f
                                • Instruction ID: 925f3f994bc8eac163cd2d1ae8c39719cc903b7f40bdb329ec2c46dd270cf686
                                • Opcode Fuzzy Hash: e43110739a29eee34cbe1b1be042f1a923287325b8ab67ec124107a2e7bbb47f
                                • Instruction Fuzzy Hash: D1E1DA725087C286E7568F38C4143E93AA1EB29F4CF0C8135CB894B79ADBBE9495D361
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: strlen
                                • String ID: t$ty$y
                                • API String ID: 39653677-1920740250
                                • Opcode ID: 7cba5d3e039096a41f8a339d5ddadbf7cfaf77b8164e9bc0ce16bdb1ec47ffa2
                                • Instruction ID: 943bd50607620e5bec5b64d67aa07d05ced381fdc0f8edf351402a0aa4e5b13b
                                • Opcode Fuzzy Hash: 7cba5d3e039096a41f8a339d5ddadbf7cfaf77b8164e9bc0ce16bdb1ec47ffa2
                                • Instruction Fuzzy Hash: B2E10B725087C2C6E7568F34C0143ED3AA1EB66F4CF0C8135CB990B799DBBE94959362
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID: basic_string::_M_create
                                • API String ID: 0-3122258987
                                • Opcode ID: 7da6f4f36f1f73ec5b7a546f4762f1bfe277916da9ea98c50cf4b19c21c515e3
                                • Instruction ID: 658b49b0be5cff0375e6a6b1769b4664f779c07bb2872442574b4272466c3c3e
                                • Opcode Fuzzy Hash: 7da6f4f36f1f73ec5b7a546f4762f1bfe277916da9ea98c50cf4b19c21c515e3
                                • Instruction Fuzzy Hash: 2491E577A15642A0EE149F65D8402B863A4FB45FE4F9C8631DA2EA77D2FF28D592C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: (
                                • API String ID: 1004003707-3887548279
                                • Opcode ID: 9b5e40d95a969893f422e751823e152ca0812ee9feaaa9d1211389d9f718fa2e
                                • Instruction ID: e6726136220a0940c0eb10b4e0ccf743d1c488c12c0c3e9b46cb28a1ed79bf04
                                • Opcode Fuzzy Hash: 9b5e40d95a969893f422e751823e152ca0812ee9feaaa9d1211389d9f718fa2e
                                • Instruction Fuzzy Hash: EEA16B73A0878792EB659F66C8003E927A1EB55F88F4C8032CF5A5B796DF7DD8848350
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: (
                                • API String ID: 1004003707-3887548279
                                • Opcode ID: b43b284491c0c081eebab03375e6f86cd4740b6b55f0371bbbdcb6c4ad6fc5c4
                                • Instruction ID: 13dfe97d2f1bb50afde710ac7d5bc85fccf14c4ceece1813cbaec7a08d5e78e5
                                • Opcode Fuzzy Hash: b43b284491c0c081eebab03375e6f86cd4740b6b55f0371bbbdcb6c4ad6fc5c4
                                • Instruction Fuzzy Hash: 7DA16A72A08786C5EB558E65D4043ED37A1EB96BC8F488032CF6E0B796DF7DD8848361
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: strlen
                                • String ID: a$a$rm
                                • API String ID: 39653677-3573517395
                                • Opcode ID: cef21104d7ad3f74ec1e8ac962380a6aeb3cf4f49fc749b6bb651a17baed4aec
                                • Instruction ID: fee9fbcc075971fdbc3d3f001cce2dca2d1290de2372c82e0532eb785e625788
                                • Opcode Fuzzy Hash: cef21104d7ad3f74ec1e8ac962380a6aeb3cf4f49fc749b6bb651a17baed4aec
                                • Instruction Fuzzy Hash: AEB12E739087C2C5E7568F29C4043EC2A91EB25F4CF1C8136CB894B79ADFBE94569361
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: strlen
                                • String ID: a$a$rm
                                • API String ID: 39653677-3573517395
                                • Opcode ID: 002a69ba7db763090160bd936f752d77aff701eea4059a01ae40fa1a6c25be73
                                • Instruction ID: 511e65ad219861d27f19642129e44f70228c4e0769ddff8c1ae89425fda61ba5
                                • Opcode Fuzzy Hash: 002a69ba7db763090160bd936f752d77aff701eea4059a01ae40fa1a6c25be73
                                • Instruction Fuzzy Hash: 15B141729087C2C5E7568F28C0183ED3A91EB55F8CF1C8135CB990F799DBBE94969322
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: basic_string::_M_create
                                • API String ID: 3510742995-3122258987
                                • Opcode ID: bf741605dca7d7cde466f161eac2d8138d09c84fa8dd8dd3d4031ec908cf47e8
                                • Instruction ID: 523cd1de80d354b3b633fd54e0bd1309f80d8f612196996f4f14284f16d693cd
                                • Opcode Fuzzy Hash: bf741605dca7d7cde466f161eac2d8138d09c84fa8dd8dd3d4031ec908cf47e8
                                • Instruction Fuzzy Hash: 8461B37BA19657A1EE658B95D0006BD6360FF01BA8F8C8631DA1DA77D6EF3CE542C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: basic_string::append$basic_string::resize
                                • API String ID: 2221118986-1480708123
                                • Opcode ID: e2446b88623f549e9f119c118ec83f2e5278233a0583e365e4bdae2a0f000cbf
                                • Instruction ID: dc8daa46a044ff268bde906921e05a2ef7174861a865b7aff3dacf8a66d1e74f
                                • Opcode Fuzzy Hash: e2446b88623f549e9f119c118ec83f2e5278233a0583e365e4bdae2a0f000cbf
                                • Instruction Fuzzy Hash: FB51A173F49587A1FE10CEAAE8442F966526B49BD4F6C8131CB4DEB3C6DE2DD8808340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$malloc
                                • String ID: basic_string::_S_construct null not valid$basic_string::_S_create
                                • API String ID: 962570267-1585226940
                                • Opcode ID: bcd7b8e0bb605fd17f338f16916ea18180f09fe93d3b2168c78ba2775d3a8f27
                                • Instruction ID: 05528b5c099a9a612e89053641f159d2105250b24fff9bb5f7b9d32cca83fa02
                                • Opcode Fuzzy Hash: bcd7b8e0bb605fd17f338f16916ea18180f09fe93d3b2168c78ba2775d3a8f27
                                • Instruction Fuzzy Hash: E641D233B09783A9EE159F61E8503F82650AB987A4F8C4631EE2D973D2EE3CD584C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy$strlen
                                • String ID: basic_string::append
                                • API String ID: 2619041689-3811946249
                                • Opcode ID: 57455ca2856472766590b3e286d9c08752a8f009bac979aad79564663301f0f8
                                • Instruction ID: 554e8cbe7db1ff844ba934ec393972a6776c282528e2df0082606b76d60015b6
                                • Opcode Fuzzy Hash: 57455ca2856472766590b3e286d9c08752a8f009bac979aad79564663301f0f8
                                • Instruction Fuzzy Hash: 7351A23BB4AA47A5EE10CF9AD58427D2751AB45FC8F5C8431CF4DA7396EE2CE4828340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: basic_string::_M_create
                                • API String ID: 3510742995-3122258987
                                • Opcode ID: 11b0f2ff1f70f5827a1e3cb1054d91e79c3134cc77fb0c72c24e8241a8e948de
                                • Instruction ID: 76af1f1581f60437e9399a636ed4b6d0944af6538800f374bdb9de008e641433
                                • Opcode Fuzzy Hash: 11b0f2ff1f70f5827a1e3cb1054d91e79c3134cc77fb0c72c24e8241a8e948de
                                • Instruction Fuzzy Hash: BF41253BB0D68771EA618A99D5043BA2261AB45BD8F4C4232CE9DA77C7DF3CE451C300
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: Sleep_amsg_exit
                                • String ID:
                                • API String ID: 1015461914-0
                                • Opcode ID: 586b16ec889c17369a6c936b766b2ac355b7a3ff8624551193ed95b69be91b28
                                • Instruction ID: 0036a5487c67faf0b6fd30d2655abd0c05eec56c922ce47b4836ea2eb5571bb0
                                • Opcode Fuzzy Hash: 586b16ec889c17369a6c936b766b2ac355b7a3ff8624551193ed95b69be91b28
                                • Instruction Fuzzy Hash: B7416831A4928AC5F7298F86E88073E3395AF9ABC0F544031DE6C57390EE6DE8419353
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: basic_string::_M_create$basic_string::append
                                • API String ID: 3510742995-3923985592
                                • Opcode ID: f5b6580c2867755e87272c6e9276c66cc57067d14edbb6f793dd36406fb642a2
                                • Instruction ID: 10f84aede7fd4e90ca3f6c0abea978d30a2e627860a805cb58119f8ee6de3ea7
                                • Opcode Fuzzy Hash: f5b6580c2867755e87272c6e9276c66cc57067d14edbb6f793dd36406fb642a2
                                • Instruction Fuzzy Hash: 7931B037A19687A1EE20DF65E8502A96310FB45B98F4C8532EE1DA3396DF3CE446C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: $ : $new
                                • API String ID: 1004003707-2075650739
                                • Opcode ID: 19c102341e9ef1930413d3f4ab0fe5666a477e0eaf637c8d3b05c4b4a9bea946
                                • Instruction ID: 8ae6871e333d0472ec28433dc4313d0aa9f4762d83b87601ebb2ec7e369dd0ec
                                • Opcode Fuzzy Hash: 19c102341e9ef1930413d3f4ab0fe5666a477e0eaf637c8d3b05c4b4a9bea946
                                • Instruction Fuzzy Hash: 89416B73A44747A1EB259A56D8003E92750AB92FD4F4C4032CF0AAB797DF7DD4859350
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: $ : $new
                                • API String ID: 1004003707-2075650739
                                • Opcode ID: 405b407ec3b6bcd7ab3297b210cf5cf0696d8f345dc47c9aa0295716390fba65
                                • Instruction ID: 34fa0f3c7bc595ec3ea69aec749955e09a9d57f69ba81c185d6243397225e113
                                • Opcode Fuzzy Hash: 405b407ec3b6bcd7ab3297b210cf5cf0696d8f345dc47c9aa0295716390fba65
                                • Instruction Fuzzy Hash: 49419D72B4874681EB5A9B96E8103FD3651EB92FC4F484032CF291B7C6EE7CD8858352
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpystrlen
                                • String ID: basic_string::_S_construct null not valid$basic_string::_S_create
                                • API String ID: 3412268980-1585226940
                                • Opcode ID: a30b2714f8e9ece9f55c1bd623084c943f00f8f6ebb17da6efc21be67e6267d2
                                • Instruction ID: 8b02590f2584631fbdb09e7bca46a635a00e6f0c41f13ed25bbddac698b87842
                                • Opcode Fuzzy Hash: a30b2714f8e9ece9f55c1bd623084c943f00f8f6ebb17da6efc21be67e6267d2
                                • Instruction Fuzzy Hash: 2421F377A49A47B1EB119B5AE8801BD27A0EF56BC4F8C4431DD8DAB392EE3DD052C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: mallocmemcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_S_create$basic_string::substr
                                • API String ID: 4276657696-2722529413
                                • Opcode ID: 627f28bb7b7cbdf64b26f57ac1e737ce6b866fb099b00181185a8744c3fa0156
                                • Instruction ID: 7fcc626f7e484e06b21361e99bb098aa9db1c89375e113f74ad76ac98113f390
                                • Opcode Fuzzy Hash: 627f28bb7b7cbdf64b26f57ac1e737ce6b866fb099b00181185a8744c3fa0156
                                • Instruction Fuzzy Hash: 2221E433B05683A9EE109F65E4902E86760EB58BE4F8C4632DA6D9B3D6DE7CD584C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::substr
                                • API String ID: 3510742995-456333499
                                • Opcode ID: 08544d5542c51e39830f9cfac53499bac6c93912f3d2aa8dd0d7d6c5e194e743
                                • Instruction ID: 2332692e4a25abf9870d6c3a39c3956e60ded1f86b8352a68b795f882fc07767
                                • Opcode Fuzzy Hash: 08544d5542c51e39830f9cfac53499bac6c93912f3d2aa8dd0d7d6c5e194e743
                                • Instruction Fuzzy Hash: 1311C333B05647A5EE219F55E9804AD6320AB59FD0B5C4631DA5E973D2EE3CE581C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: basic_string::_M_create$basic_string::at: __n (which is %zu) >= this->size() (which is %zu)
                                • API String ID: 2221118986-670834496
                                • Opcode ID: 13457a7cb84797bb620f93aff2bbf038bf025e3f99da619d8659050687440b57
                                • Instruction ID: 82e42883b84a7b146d704d5a0e98649100a34c45379417f24e915551e8f56dbd
                                • Opcode Fuzzy Hash: 13457a7cb84797bb620f93aff2bbf038bf025e3f99da619d8659050687440b57
                                • Instruction Fuzzy Hash: B811C477E09647A1EE249B76F8810BC5261AB56BC0F9C8031CA4EAB353DEBDE5818340
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565550890.00007FF8E7B01000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF8E7B00000, based on PE: true
                                • Associated: 00000000.00000002.1565528874.00007FF8E7B00000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565578252.00007FF8E7B23000.00000008.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565675093.00007FF8E7C58000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565693657.00007FF8E7C59000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565711045.00007FF8E7C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565763074.00007FF8E7C60000.00000004.00000001.01000000.00000004.sdmpDownload File
                                • Associated: 00000000.00000002.1565831586.00007FF8E7C63000.00000002.00000001.01000000.00000004.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff8e7b00000_setup_run.jbxd
                                Similarity
                                • API ID: _lock_unlockcalloc
                                • String ID:
                                • API String ID: 3876498383-0
                                • Opcode ID: 53cfc9741e1959007db82f7a6280fff8cd2481f2bdb2585ed3602867377ef56e
                                • Instruction ID: 2f7e46069763590dd83b4f597956ec7e25b8e5159949857ba4f86473bdeb78c6
                                • Opcode Fuzzy Hash: 53cfc9741e1959007db82f7a6280fff8cd2481f2bdb2585ed3602867377ef56e
                                • Instruction Fuzzy Hash: C3119D71B0BA4189EA459BA1E4103BD3295AF85BD4F588534EE6D4B3C8EF6CE854C302
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: %s: __pos (which is %zu) > this->size() (which is %zu)$basic_string::_M_create$basic_string::substr
                                • API String ID: 3510742995-456333499
                                • Opcode ID: 39c907fb4268d103fb47ce20a90ce3545c025b3180355763355994c226830fba
                                • Instruction ID: fd77748da54e13ba382b43bdab4adf73eae1459061560096aeefaf7cd83ba354
                                • Opcode Fuzzy Hash: 39c907fb4268d103fb47ce20a90ce3545c025b3180355763355994c226830fba
                                • Instruction Fuzzy Hash: 3E115473A09643A2FE219FA6E4901F9A360EB59B84F5C8435DA8D97342DE2DE581C340
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID:
                                • String ID: random_device could not be read
                                • API String ID: 0-883157155
                                • Opcode ID: df090de8d1215837fcb7bb7027643a02f4d100092a77f229298efe81c47d043f
                                • Instruction ID: 5c6ec5f0cec7c45e5e5f1deef451add7f3de875ab571cf775a72d08ec3d721e2
                                • Opcode Fuzzy Hash: df090de8d1215837fcb7bb7027643a02f4d100092a77f229298efe81c47d043f
                                • Instruction Fuzzy Hash: 6801DB3BB09113BAF6215B69E4801786350AB4A7A5F4C4530DE5DB37D2DE3CE886C700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-3474627141
                                • Opcode ID: fb2494df61a781927dc97855f126e01a0f933b16e083b8aa5efe5ec374127a84
                                • Instruction ID: 04073b71d383277a99d131e567959cdab4427129ec9e22c8cd7fcc43798b2fb1
                                • Opcode Fuzzy Hash: fb2494df61a781927dc97855f126e01a0f933b16e083b8aa5efe5ec374127a84
                                • Instruction Fuzzy Hash: 64018262908E8AD2D6068F1CD8411EA7374FF9A79AF285331EA8D66321DF2ED543C700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-2187435201
                                • Opcode ID: f96e668b9466e6867bcc662321d02f2f4ad65ed2d4b379b632894493d2a5a3d4
                                • Instruction ID: 1c959bc0d44b4e6e77c0580abf1e032c1612424836b410c78e2ccec62faffd3d
                                • Opcode Fuzzy Hash: f96e668b9466e6867bcc662321d02f2f4ad65ed2d4b379b632894493d2a5a3d4
                                • Instruction Fuzzy Hash: F8F04F67908E8992D2028F19E4400EBB371FF5E789F285725EA8D7A665DF2DD5428700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-4064033741
                                • Opcode ID: 8ac10f9a21144d61385e748f58a86b48f28a53e346cba4490ef006117e42cd98
                                • Instruction ID: b5f8c2e49845d7c121951c91e69a87047935da8b35365ad1942d414f52acf919
                                • Opcode Fuzzy Hash: 8ac10f9a21144d61385e748f58a86b48f28a53e346cba4490ef006117e42cd98
                                • Instruction Fuzzy Hash: 69F04F63908E8992D2028F18E8400EBB370FF5E789F285735EA8D76665DF2DD5428700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-4283191376
                                • Opcode ID: 8de20a3abdc4ebcc6a70fcdf327e612a9c6f9fb86ae6a8a5895c362f73619deb
                                • Instruction ID: f962f6cd56dd3ac5c35840b4f08a18a2140faeef2ff05dcc7415a51cf81f4436
                                • Opcode Fuzzy Hash: 8de20a3abdc4ebcc6a70fcdf327e612a9c6f9fb86ae6a8a5895c362f73619deb
                                • Instruction Fuzzy Hash: 70F04F63908E8992D6028F18E8400EBB370FF5E789F285735EA8D76665DF2DD5428700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-2713391170
                                • Opcode ID: eae4db3c51d27c9f10e829195f5309f9fe04053ad4445b06bc0f5474d61dcecf
                                • Instruction ID: 4b7e24d14189a3a35a71dd35fab3b60a028d6d0949ab7e37489cc7bb9a85087a
                                • Opcode Fuzzy Hash: eae4db3c51d27c9f10e829195f5309f9fe04053ad4445b06bc0f5474d61dcecf
                                • Instruction Fuzzy Hash: 42F04F63908E8992D2028F1CE8400EBB370FF5E789F285735EA8D76665DF2DD5428700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-4273532761
                                • Opcode ID: 5d717b50cbbbcd3046eab9ade0a685ea58ef741d6b88ac452b9e502f3836b93c
                                • Instruction ID: 9286540916712ff04a65b4ea175990d7df70cf9ee9010d39927efbebd1fa7881
                                • Opcode Fuzzy Hash: 5d717b50cbbbcd3046eab9ade0a685ea58ef741d6b88ac452b9e502f3836b93c
                                • Instruction Fuzzy Hash: E3F04F67908E8992D6028F18E4400EBB370FF5E789F2C5725EA8D76625DF2DD5428700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1565335749.00007FF650A11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF650A10000, based on PE: true
                                • Associated: 00000000.00000002.1565314474.00007FF650A10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565370743.00007FF650A55000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565390076.00007FF650A56000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565494617.00007FF650BC1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1565511593.00007FF650BC4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff650a10000_setup_run.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-2468659920
                                • Opcode ID: 0b2b7bfa8aab3d0fe8c0960d9098e595bb0e9222e7c9299ecbdedb2ad25dbdab
                                • Instruction ID: 4d3d9c30d5581b6f06413cea5e95478546ab48f2afea52fe2f3370c36e323ebf
                                • Opcode Fuzzy Hash: 0b2b7bfa8aab3d0fe8c0960d9098e595bb0e9222e7c9299ecbdedb2ad25dbdab
                                • Instruction Fuzzy Hash: 4AF06223904E8982D2028F18E4400EBB370FF5E789F185325EE8D3A225DF29D5428700

                                Execution Graph

                                Execution Coverage:5.7%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:14.8%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:56
                                execution_graph 78216 14008738e 78221 140087c80 78216->78221 78220 1400873cb 78222 140087ca6 78221->78222 78224 140087396 78222->78224 78232 140068db0 78222->78232 78225 1400a9a30 78224->78225 78226 1400a9a39 78225->78226 78227 1400a9a44 78226->78227 78228 1400a9f2c IsProcessorFeaturePresent 78226->78228 78227->78220 78229 1400a9f44 78228->78229 78255 1400aa124 RtlCaptureContext RtlLookupFunctionEntry capture_current_context 78229->78255 78231 1400a9f57 78231->78220 78233 140068dfa 78232->78233 78242 140068e2a ctype 78232->78242 78234 140068e16 78233->78234 78238 140068e7a 78233->78238 78233->78242 78237 140068f56 78234->78237 78244 1400a9b78 78234->78244 78252 14002b510 70 API calls 2 library calls 78237->78252 78240 1400a9b78 std::_Facet_Register 70 API calls 78238->78240 78240->78242 78241 140068f5c 78243 140068f13 ISource 78242->78243 78251 14003e7b0 70 API calls ISource 78242->78251 78243->78224 78247 1400a9b83 std::_Facet_Register 78244->78247 78245 1400a9b9c 78245->78242 78246 1400a9bad 78254 14002b510 70 API calls 2 library calls 78246->78254 78247->78245 78247->78246 78253 1400aaaac RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 78247->78253 78250 1400a9bb3 78251->78237 78252->78241 78253->78246 78254->78250 78255->78231 78256 140040f64 78257 140040f77 78256->78257 78258 1400412cd 78256->78258 78270 140045bc0 78257->78270 78282 14003e7b0 70 API calls ISource 78258->78282 78261 1400412d8 78262 140040f84 78265 140040fef ISource 78262->78265 78281 140049970 70 API calls 2 library calls 78262->78281 78264 140041212 ISource 78267 1400a9a30 _Strcoll 3 API calls 78264->78267 78266 140041197 78265->78266 78268 140049970 70 API calls 78265->78268 78266->78258 78266->78264 78269 1400412af 78267->78269 78268->78265 78271 140045bf7 78270->78271 78272 140045c51 78270->78272 78274 140045c32 78271->78274 78275 140045c0e 78271->78275 78279 140045c00 78271->78279 78284 14002b510 70 API calls 2 library calls 78272->78284 78276 1400a9b78 std::_Facet_Register 70 API calls 78274->78276 78275->78272 78278 1400a9b78 std::_Facet_Register 70 API calls 78275->78278 78276->78279 78278->78279 78280 140045c77 ISource 78279->78280 78283 140049df0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 78279->78283 78280->78262 78281->78262 78282->78261 78283->78272 78284->78280 78285 1400690b0 78286 140069135 78285->78286 78287 1400690cf 78285->78287 78288 1400691a1 78286->78288 78289 14006913e 78286->78289 78290 140052130 70 API calls 78287->78290 78299 140052130 78288->78299 78291 14006916f 78289->78291 78292 14006914c 78289->78292 78294 1400690ed 78290->78294 78307 14006bef0 70 API calls 2 library calls 78291->78307 78295 140052130 70 API calls 78292->78295 78298 140069167 78295->78298 78297 1400691bf 78300 140052163 78299->78300 78301 1400a9b78 std::_Facet_Register 70 API calls 78300->78301 78302 140052178 78301->78302 78308 14003fc70 78302->78308 78304 140052195 78305 1400a9a30 _Strcoll 3 API calls 78304->78305 78306 1400521ae 78305->78306 78306->78297 78307->78298 78309 14003fc9e 78308->78309 78310 14003fcba ctype 78309->78310 78313 14003fcea 78309->78313 78314 14003fd42 78309->78314 78319 14003fd7d 78309->78319 78310->78304 78315 1400a9b78 std::_Facet_Register 70 API calls 78313->78315 78317 14003fd00 78313->78317 78316 1400a9b78 std::_Facet_Register 70 API calls 78314->78316 78315->78317 78316->78310 78317->78310 78320 14002b510 70 API calls 2 library calls 78317->78320 78321 14002b5d0 70 API calls 78319->78321 78320->78319 78322 140044f89 78323 140044fee 78322->78323 78324 140044fac 78322->78324 78325 1400a9b78 std::_Facet_Register 70 API calls 78323->78325 78324->78323 78326 140044fe1 78324->78326 78327 14004501d 78324->78327 78331 140044fd4 ISource ctype 78324->78331 78325->78331 78326->78323 78328 1400450a0 78326->78328 78329 1400a9b78 std::_Facet_Register 70 API calls 78327->78329 78332 14002b510 70 API calls 2 library calls 78328->78332 78329->78331 78332->78331 78333 1400414aa 78334 1400414bb 78333->78334 78336 1400414f1 78333->78336 78334->78336 78337 140041529 78334->78337 78343 1400414e3 ctype 78334->78343 78335 1400a9b78 std::_Facet_Register 70 API calls 78335->78343 78336->78335 78338 1400415a0 78336->78338 78339 1400a9b78 std::_Facet_Register 70 API calls 78337->78339 78346 14002b510 70 API calls 2 library calls 78338->78346 78339->78343 78341 140041577 ISource 78342 1400415a6 78343->78341 78345 14002b5d0 70 API calls 78343->78345 78346->78342 78347 140084787 78348 140084791 78347->78348 78353 140084c80 78348->78353 78351 1400a9a30 _Strcoll 3 API calls 78352 140084ae3 78351->78352 78356 140084cbf 78353->78356 78357 1400847a0 78353->78357 78355 140084f59 78367 1400444c0 78355->78367 78360 140084ebd 78356->78360 78366 140059570 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 78356->78366 78357->78351 78360->78357 78362 1400444c0 70 API calls 78360->78362 78363 140084fcd 78362->78363 78364 1400ac058 Concurrency::cancel_current_task 2 API calls 78363->78364 78365 140084fde 78364->78365 78366->78355 78368 140044517 78367->78368 78381 14002e800 78368->78381 78371 1400446a4 ISource 78373 140044724 78371->78373 78374 1400a9a30 _Strcoll 3 API calls 78371->78374 78372 140044555 ISource 78372->78373 78393 1400ab910 78372->78393 78375 140044716 78374->78375 78376 1400ac058 78375->78376 78377 1400ac077 Concurrency::cancel_current_task 78376->78377 78378 1400ac0a0 RtlPcToFileHeader 78377->78378 78379 1400ac0c2 RaiseException 78377->78379 78380 1400ac0b8 78378->78380 78379->78360 78380->78379 78382 14002e83b 78381->78382 78384 14002e970 78382->78384 78399 140045610 78382->78399 78385 14002ea13 ISource 78384->78385 78387 14002ea4c 78384->78387 78386 1400a9a30 _Strcoll 3 API calls 78385->78386 78388 14002ea38 78386->78388 78411 1400ab9a0 78387->78411 78388->78372 78391 1400ab9a0 __std_exception_destroy 11 API calls 78392 14002eaa2 ISource 78391->78392 78392->78372 78394 1400ab931 78393->78394 78398 1400ab97b 78393->78398 78397 1400ab966 78394->78397 78394->78398 78418 140094960 66 API calls 2 library calls 78394->78418 78419 14008ca40 11 API calls 2 library calls 78397->78419 78398->78371 78400 140045765 78399->78400 78403 14004563f 78399->78403 78415 14002b5d0 70 API calls 78400->78415 78402 14004576a 78416 14002b510 70 API calls 2 library calls 78402->78416 78406 140045697 78403->78406 78407 1400456d3 78403->78407 78409 1400456a4 78403->78409 78410 14004568a ISource ctype 78403->78410 78404 1400a9b78 std::_Facet_Register 70 API calls 78404->78410 78406->78402 78406->78409 78408 1400a9b78 std::_Facet_Register 70 API calls 78407->78408 78408->78410 78409->78404 78410->78384 78412 1400ab9af 78411->78412 78413 14002ea95 78411->78413 78417 14008ca40 11 API calls 2 library calls 78412->78417 78413->78391 78416->78410 78417->78413 78418->78397 78419->78398 78420 140035813 78426 14002d650 78420->78426 78422 140035846 FindNextFileW 78423 140035864 78422->78423 78424 1400a9a30 _Strcoll 3 API calls 78423->78424 78425 14003588b 78424->78425 78427 14002d668 ISource 78426->78427 78427->78422 78428 1400841fb 78429 14008420c 78428->78429 78430 140084221 78428->78430 78434 1400a9a30 _Strcoll 3 API calls 78429->78434 78431 14008422a 78430->78431 78438 1400843ef 78430->78438 78439 140084282 78431->78439 78453 14003fae0 78431->78453 78432 14008449f 78436 140084c80 70 API calls 78432->78436 78435 140084ae3 78434->78435 78440 1400844b8 78436->78440 78437 140084c80 70 API calls 78437->78438 78438->78432 78438->78437 78443 1400841a0 3 API calls 78438->78443 78441 140084352 78439->78441 78444 140084c80 70 API calls 78439->78444 78449 1400841a0 78439->78449 78442 1400841a0 3 API calls 78440->78442 78445 140084c80 70 API calls 78441->78445 78442->78429 78443->78438 78444->78439 78446 14008438b 78445->78446 78448 1400841a0 3 API calls 78446->78448 78448->78429 78450 1400841d0 78449->78450 78451 1400a9a30 _Strcoll 3 API calls 78450->78451 78452 140084ae3 78451->78452 78452->78439 78454 14003fb04 78453->78454 78455 14003faed 78453->78455 78456 14003fb1e memcpy_s 78454->78456 78459 140045780 78454->78459 78455->78439 78456->78439 78458 14003fb6c 78458->78439 78460 14004590f 78459->78460 78462 1400457af 78459->78462 78471 14002b5d0 70 API calls 78460->78471 78463 140045819 78462->78463 78467 140045848 78462->78467 78468 14004580c 78462->78468 78470 1400457ff ISource memcpy_s ctype 78462->78470 78465 1400a9b78 std::_Facet_Register 70 API calls 78463->78465 78464 140045914 78472 14002b510 70 API calls 2 library calls 78464->78472 78465->78470 78469 1400a9b78 std::_Facet_Register 70 API calls 78467->78469 78468->78463 78468->78464 78469->78470 78470->78458 78472->78470 78473 14009541c 78484 140095280 78473->78484 78476 140095442 78478 1400954b9 78490 1400952a8 78478->78490 78481 140095479 78481->78476 78481->78478 78502 140099f70 66 API calls 2 library calls 78481->78502 78482 1400954ad 78482->78478 78503 14009a64c 78482->78503 78485 140095289 78484->78485 78489 140095299 78484->78489 78508 140091afc 9 API calls _get_daylight 78485->78508 78487 14009528e 78509 14008d638 66 API calls _invalid_parameter_noinfo 78487->78509 78489->78476 78489->78481 78501 1400953a0 66 API calls ProcessCodePage 78489->78501 78491 140095280 _fread_nolock 66 API calls 78490->78491 78492 1400952cd 78491->78492 78493 1400952dc 78492->78493 78494 14009536d 78492->78494 78496 1400952fa 78493->78496 78499 140095318 78493->78499 78519 140098798 66 API calls 2 library calls 78494->78519 78518 140098798 66 API calls 2 library calls 78496->78518 78498 140095308 78498->78476 78499->78498 78510 14009b2a0 78499->78510 78501->78481 78502->78482 78553 140099238 78503->78553 78508->78487 78509->78489 78511 14009b2d0 78510->78511 78520 14009b0cc 78511->78520 78513 14009b2e9 78515 14009b30f 78513->78515 78527 14008b5f8 66 API calls 2 library calls 78513->78527 78516 14009b324 78515->78516 78528 14008b5f8 66 API calls 2 library calls 78515->78528 78516->78498 78518->78498 78519->78498 78521 14009b115 78520->78521 78525 14009b0f9 78520->78525 78522 14009b1a3 78521->78522 78524 14009b14d 78521->78524 78535 14008d568 66 API calls _invalid_parameter_noinfo 78522->78535 78524->78525 78529 14009b1f4 78524->78529 78525->78513 78527->78515 78528->78516 78536 1400a08f8 78529->78536 78532 14009b232 SetFilePointerEx 78533 14009b24a GetLastError 78532->78533 78534 14009b221 _fread_nolock 78532->78534 78533->78534 78534->78525 78535->78525 78537 1400a0901 78536->78537 78538 1400a0916 78536->78538 78548 140091adc 9 API calls _get_daylight 78537->78548 78545 14009b21b 78538->78545 78550 140091adc 9 API calls _get_daylight 78538->78550 78541 1400a0906 78549 140091afc 9 API calls _get_daylight 78541->78549 78542 1400a0951 78551 140091afc 9 API calls _get_daylight 78542->78551 78545->78532 78545->78534 78546 1400a0959 78552 14008d638 66 API calls _invalid_parameter_noinfo 78546->78552 78548->78541 78549->78545 78550->78542 78551->78546 78552->78545 78554 140099249 std::_Facet_Register wcsftime 78553->78554 78555 14009929a 78554->78555 78556 14009927e HeapAlloc 78554->78556 78565 140091afc 9 API calls _get_daylight 78555->78565 78556->78554 78557 140099298 78556->78557 78559 140098bd0 78557->78559 78560 140098c06 78559->78560 78561 140098bd5 HeapFree 78559->78561 78560->78478 78561->78560 78562 140098bf0 GetLastError 78561->78562 78563 140098bfd __free_lconv_num 78562->78563 78566 140091afc 9 API calls _get_daylight 78563->78566 78565->78557 78566->78560 78567 140074060 78631 140077330 GetCurrentProcess OpenProcessToken 78567->78631 78570 140074084 78809 140077670 71 API calls 2 library calls 78570->78809 78571 1400740ae 78638 140083540 GetCurrentProcess OpenProcessToken 78571->78638 78574 14007408e 78810 140082310 98 API calls _Strcoll 78574->78810 78577 140083540 8 API calls 78579 1400740c6 78577->78579 78578 140074097 78582 1400740a2 ExitProcess 78578->78582 78646 14007fb30 78579->78646 78581 1400740d0 78791 140074a80 78581->78791 78582->78571 78584 140074156 ISource 78585 140074194 OpenMutexA 78584->78585 78591 14007431d 78584->78591 78586 1400741cd ExitProcess 78585->78586 78587 1400741d9 CreateMutexA 78585->78587 78586->78587 78795 14006e790 78587->78795 78632 140077388 GetTokenInformation 78631->78632 78633 1400773c4 78631->78633 78632->78633 78634 1400773d1 CloseHandle 78633->78634 78635 1400773dd 78633->78635 78634->78635 78636 1400a9a30 _Strcoll 3 API calls 78635->78636 78637 140074080 78636->78637 78637->78570 78637->78571 78639 1400835ab LookupPrivilegeValueW 78638->78639 78640 140083616 78638->78640 78639->78640 78641 1400835cc AdjustTokenPrivileges 78639->78641 78642 14008362a 78640->78642 78643 14008361e CloseHandle 78640->78643 78641->78640 78644 1400a9a30 _Strcoll 3 API calls 78642->78644 78643->78642 78645 1400740ba 78644->78645 78645->78577 78811 14007e770 GetCurrentHwProfileW 78646->78811 78650 14007fc39 78651 14007fc83 78650->78651 79115 14008b8c8 73 API calls 78650->79115 78833 140085120 78651->78833 78654 14007fc93 78657 14007fcdc 78654->78657 78658 14007fd0c ISource ctype 78654->78658 79116 140094660 78654->79116 78656 14007fdda ISource 78660 1400a9a30 _Strcoll 3 API calls 78656->78660 78657->78658 78659 140094660 67 API calls 78657->78659 78658->78656 78662 14007fe1c 78658->78662 78659->78657 78661 14007fdff 78660->78661 78661->78581 78845 14007e040 78662->78845 78673 14007fb30 192 API calls 78674 14007febd 78673->78674 78888 14007dac0 78674->78888 78676 14007fec7 78677 140052130 70 API calls 78676->78677 78678 14007fef1 78677->78678 78892 14003ec00 78678->78892 78680 14007ff4b 78681 14003ec00 70 API calls 78680->78681 78682 14007ff8e 78681->78682 78683 140052130 70 API calls 78682->78683 78684 14007ffe7 78683->78684 78685 14003ec00 70 API calls 78684->78685 78686 140080036 78685->78686 78687 14003ec00 70 API calls 78686->78687 78688 140080085 78687->78688 78689 140052130 70 API calls 78688->78689 78690 1400800de 78689->78690 78691 14003ec00 70 API calls 78690->78691 78692 14008012c 78691->78692 78693 14003ec00 70 API calls 78692->78693 78694 14008017b 78693->78694 78695 140052130 70 API calls 78694->78695 78696 1400801d4 78695->78696 78697 14003ec00 70 API calls 78696->78697 78698 140080226 78697->78698 78699 14003ec00 70 API calls 78698->78699 78700 140080275 78699->78700 78701 1400802a5 GlobalMemoryStatusEx 78700->78701 78702 1400802ce 78701->78702 78703 14003ec00 70 API calls 78702->78703 78704 14008036e 78703->78704 78705 14003ec00 70 API calls 78704->78705 78706 1400803be 78705->78706 78707 140052130 70 API calls 78706->78707 78708 14008041a 78707->78708 78709 14003ec00 70 API calls 78708->78709 78710 140080468 78709->78710 78711 14003ec00 70 API calls 78710->78711 78712 1400804b7 78711->78712 78713 140052130 70 API calls 78712->78713 78714 14008050d 78713->78714 78715 14003ec00 70 API calls 78714->78715 78716 14008055b 78715->78716 78717 14003ec00 70 API calls 78716->78717 78718 14008061e 78717->78718 78906 14007d670 12 API calls 78718->78906 78724 140080694 78725 14003ec00 70 API calls 78724->78725 78726 1400806e2 78725->78726 78727 14003ec00 70 API calls 78726->78727 78728 14008079b ISource 78727->78728 78746 140081609 78728->78746 78941 14007d4a0 GetDesktopWindow GetWindowRect 78728->78941 78731 140042430 70 API calls 78732 140080885 78731->78732 78733 14003ec00 70 API calls 78732->78733 78734 1400808d3 78733->78734 78735 14003ec00 70 API calls 78734->78735 78736 140080a0d ISource 78735->78736 78736->78746 78951 1400940c0 GetSystemTimeAsFileTime 78736->78951 78738 140080a8e 78953 14009520c 78738->78953 78740 140080ab7 78741 140042430 70 API calls 78740->78741 78742 140080b06 78741->78742 78743 14003ec00 70 API calls 78742->78743 78744 140080b54 78743->78744 78745 14003ec00 70 API calls 78744->78745 78747 140080ba4 ISource memcpy_s 78745->78747 78747->78746 78748 140080c37 GetModuleFileNameA 78747->78748 78749 140080c7a 78748->78749 78750 140042160 70 API calls 78749->78750 78751 140080cb3 78750->78751 78752 140042430 70 API calls 78751->78752 78753 140080cc9 78752->78753 78754 14003ec00 70 API calls 78753->78754 78755 140080d17 78754->78755 78756 14003ec00 70 API calls 78755->78756 78757 140080dd0 ISource 78756->78757 78757->78746 78956 14007f1a0 78757->78956 78759 140080eaf 78760 140042160 70 API calls 78759->78760 78761 140080ecd 78760->78761 78762 140042430 70 API calls 78761->78762 78763 140080ee7 78762->78763 78764 14003ec00 70 API calls 78763->78764 78765 140080f2f 78764->78765 78766 14003ec00 70 API calls 78765->78766 78767 140080f73 ISource 78766->78767 78767->78746 78768 140042160 70 API calls 78767->78768 78769 14008106c 78768->78769 78770 140042430 70 API calls 78769->78770 78771 140081086 78770->78771 78772 14003ec00 70 API calls 78771->78772 78773 1400810ce 78772->78773 78774 14003ec00 70 API calls 78773->78774 78775 14008117a ISource 78774->78775 78775->78746 78776 140081210 78775->78776 78777 1400812e2 78775->78777 78779 140052130 70 API calls 78776->78779 79125 1400406d0 78777->79125 78781 14008122d 78779->78781 78780 1400812f3 78782 14003ec00 70 API calls 78780->78782 78783 14003ec00 70 API calls 78781->78783 78784 14008133e 78782->78784 78785 140081278 78783->78785 78787 14003ec00 70 API calls 78784->78787 78786 14003ec00 70 API calls 78785->78786 78788 1400812bc ISource 78786->78788 78787->78788 78788->78746 78789 1400a9a30 _Strcoll 3 API calls 78788->78789 78790 1400815e3 78789->78790 78790->78581 78792 140074aa2 78791->78792 78792->78792 78793 140063500 71 API calls 78792->78793 78794 140074ab6 78793->78794 78794->78584 78796 14006e7c1 78795->78796 79560 14006f560 70 API calls ISource 78796->79560 78798 14006eedc 78799 140041450 70 API calls 78798->78799 78800 14006ef1f 78799->78800 79561 140062160 78800->79561 78802 14006ef57 78803 14003ec00 70 API calls 78802->78803 78804 14006efa1 78803->78804 79568 1400622a0 78804->79568 78806 14006efb1 78807 14003ec00 70 API calls 78806->78807 78808 14006f018 78807->78808 78809->78574 78810->78578 78812 14007e7ba 78811->78812 78814 14007e819 78811->78814 79135 14006f870 78812->79135 78815 1400a9a30 _Strcoll 3 API calls 78814->78815 78817 14007e891 78815->78817 78819 14007dd90 78817->78819 78818 14007e7c9 78818->78814 79144 14008b8c8 73 API calls 78818->79144 79160 1400774f0 78819->79160 78823 14007df57 78824 14007de81 78826 1400a9a30 _Strcoll 3 API calls 78824->78826 78825 14007de33 ISource memcpy_s 78825->78823 78825->78824 79171 140070110 103 API calls 78825->79171 78827 14007df3e 78826->78827 78827->78650 78829 14007debd 79172 140070270 104 API calls 2 library calls 78829->79172 78831 14007dee4 79173 14003dfc0 78831->79173 78834 140085268 78833->78834 78837 140085169 78833->78837 79199 14002b5d0 70 API calls 78834->79199 78838 1400851a8 78837->78838 78839 1400851ca ctype 78837->78839 78841 140085206 78837->78841 78840 1400a9b78 std::_Facet_Register 70 API calls 78838->78840 78843 1400851c1 78838->78843 78839->78654 78840->78843 78842 1400a9b78 std::_Facet_Register 70 API calls 78841->78842 78842->78839 78843->78839 79198 14002b510 70 API calls 2 library calls 78843->79198 78846 14007e099 memcpy_s 78845->78846 78847 1400a9b78 std::_Facet_Register 70 API calls 78846->78847 78848 14007e103 78847->78848 79200 140047830 78848->79200 78850 14007e148 EnumDisplayDevicesW 78854 14007e209 78850->78854 78856 14007e165 ISource 78850->78856 78851 14006f870 70 API calls 78851->78856 78853 1400a9a30 _Strcoll 3 API calls 78857 14007e32e 78853->78857 78854->78853 78854->78854 78855 14007e1d1 EnumDisplayDevicesW 78855->78854 78855->78856 78856->78851 78856->78855 78858 14007e34f 78856->78858 79210 140085810 70 API calls 2 library calls 78856->79210 78859 14007df60 RegGetValueA 78857->78859 78860 14007dfdd 78859->78860 78861 1400a9a30 _Strcoll 3 API calls 78860->78861 78862 14007e01f 78861->78862 78863 14007e360 78862->78863 78864 14007e3ef ISource 78863->78864 78868 14007e74b 78864->78868 79212 1400b8284 GetNativeSystemInfo 78864->79212 78866 14007e4e3 79213 140063500 78866->79213 78869 1400a9a30 _Strcoll 3 API calls 78871 14007e72e 78869->78871 78870 14007e584 ISource 78870->78868 78870->78869 78872 14007dc50 78871->78872 79219 1400aa6f0 78872->79219 78875 14007dc9f 78877 14006f870 70 API calls 78875->78877 78876 14007dcac 78878 1400a9a30 _Strcoll 3 API calls 78876->78878 78877->78876 78879 14007dcde 78878->78879 78880 14007dcf0 78879->78880 78881 1400aa6f0 _Strcoll 78880->78881 78882 14007dd00 GetComputerNameW 78881->78882 78883 14007dd3f 78882->78883 78884 14007dd4c 78882->78884 78885 14006f870 70 API calls 78883->78885 78886 1400a9a30 _Strcoll 3 API calls 78884->78886 78885->78884 78887 14007dd7e 78886->78887 78887->78673 78889 14007dbc0 78888->78889 79221 14007cd80 78889->79221 78891 14007dbe4 ISource 78891->78676 78893 14003ec3f 78892->78893 78894 14003ec37 78892->78894 78898 14003ecd4 78893->78898 79254 140044740 78893->79254 79264 140044880 70 API calls 2 library calls 78894->79264 78897 14003ec5d 78897->78898 78899 14003ec90 ISource 78897->78899 78901 1400444c0 70 API calls 78898->78901 78900 1400a9a30 _Strcoll 3 API calls 78899->78900 78902 14003ecbf 78900->78902 78903 14003ed09 78901->78903 78902->78680 78904 1400ac058 Concurrency::cancel_current_task 2 API calls 78903->78904 78905 14003ed1a 78904->78905 78907 14007d828 78906->78907 78908 14007d7c0 SelectObject DeleteDC ReleaseDC DeleteObject 78906->78908 79266 140076480 78907->79266 78909 14007d820 78908->78909 78913 1400a9a30 _Strcoll 3 API calls 78909->78913 78911 14007d8d5 EnterCriticalSection LeaveCriticalSection 79275 140076610 GetObjectW 78911->79275 78915 14007da95 78913->78915 78930 140042160 78915->78930 78918 14007d968 78919 14007d9b5 IStream_Read 78918->78919 78922 14007d95a memcpy_s 78918->78922 79332 140088f30 70 API calls 5 library calls 78918->79332 78921 14007d9ca memcpy_s 78919->78921 79302 14003e090 78921->79302 78922->78919 78926 14007da0d SelectObject DeleteDC ReleaseDC DeleteObject 78927 14003dfc0 70 API calls 78926->78927 78928 14007da4a 78927->78928 79323 140076560 78928->79323 78931 14003fae0 70 API calls 78930->78931 78932 1400421ca 78931->78932 78933 14003fae0 70 API calls 78932->78933 78934 1400422dd 78933->78934 78935 140042430 78934->78935 78936 140042474 78935->78936 78937 1400a9b78 std::_Facet_Register 70 API calls 78936->78937 78938 140042489 78937->78938 78939 1400a9a30 _Strcoll 3 API calls 78938->78939 78940 1400424dd 78939->78940 78940->78724 79443 140075600 78941->79443 78944 140075600 3 API calls 78945 14007d50e 78944->78945 79447 140086e90 78945->79447 78947 14007d532 ISource 78948 1400a9a30 _Strcoll 3 API calls 78947->78948 78950 14007d65c 78947->78950 78949 14007d64b 78948->78949 78949->78731 78952 1400940f8 78951->78952 78952->78738 79461 1400950a0 78953->79461 78957 14007f3e1 memcpy_s 78956->78957 78958 14007f4cc GetTimeZoneInformation 78957->78958 78959 140075600 3 API calls 78958->78959 78961 14007f50d ISource 78959->78961 78960 140075600 3 API calls 78962 14007f63c 78960->78962 78961->78960 78969 14007fae0 78961->78969 79550 140071c80 78962->79550 78964 14007f651 78965 140045610 70 API calls 78964->78965 78966 14007f69c ISource 78964->78966 78965->78966 78967 14007fa9f ISource 78966->78967 78966->78969 78968 1400a9a30 _Strcoll 3 API calls 78967->78968 78970 14007fabf 78968->78970 78971 14007e770 78 API calls 78969->78971 78970->78759 78972 14007fb73 78971->78972 78973 14007dd90 108 API calls 78972->78973 78974 14007fc39 78973->78974 78975 14007fc83 78974->78975 79556 14008b8c8 73 API calls 78974->79556 78976 140085120 70 API calls 78975->78976 78978 14007fc93 78976->78978 78979 140094660 67 API calls 78978->78979 78981 14007fcdc 78978->78981 78982 14007fd0c ISource ctype 78978->78982 78979->78978 78980 14007fdda ISource 78984 1400a9a30 _Strcoll 3 API calls 78980->78984 78981->78982 78983 140094660 67 API calls 78981->78983 78982->78980 78986 14007fe1c 78982->78986 78983->78981 78985 14007fdff 78984->78985 78985->78759 78987 14007e040 72 API calls 78986->78987 78988 14007fe7f 78987->78988 78989 14007df60 4 API calls 78988->78989 78990 14007fe8c 78989->78990 78991 14007e360 72 API calls 78990->78991 78992 14007fe99 78991->78992 78993 14007dc50 71 API calls 78992->78993 78994 14007fea6 78993->78994 78995 14007dcf0 71 API calls 78994->78995 78996 14007feb3 78995->78996 78997 14007fb30 191 API calls 78996->78997 78998 14007febd 78997->78998 78999 14007dac0 83 API calls 78998->78999 79000 14007fec7 78999->79000 79001 140052130 70 API calls 79000->79001 79002 14007fef1 79001->79002 79003 14003ec00 70 API calls 79002->79003 79004 14007ff4b 79003->79004 79005 14003ec00 70 API calls 79004->79005 79006 14007ff8e 79005->79006 79007 140052130 70 API calls 79006->79007 79008 14007ffe7 79007->79008 79009 14003ec00 70 API calls 79008->79009 79010 140080036 79009->79010 79011 14003ec00 70 API calls 79010->79011 79012 140080085 79011->79012 79013 140052130 70 API calls 79012->79013 79014 1400800de 79013->79014 79015 14003ec00 70 API calls 79014->79015 79016 14008012c 79015->79016 79017 14003ec00 70 API calls 79016->79017 79018 14008017b 79017->79018 79019 140052130 70 API calls 79018->79019 79020 1400801d4 79019->79020 79021 14003ec00 70 API calls 79020->79021 79022 140080226 79021->79022 79023 14003ec00 70 API calls 79022->79023 79024 140080275 79023->79024 79025 1400802a5 GlobalMemoryStatusEx 79024->79025 79026 1400802ce 79025->79026 79027 14003ec00 70 API calls 79026->79027 79028 14008036e 79027->79028 79029 14003ec00 70 API calls 79028->79029 79030 1400803be 79029->79030 79031 140052130 70 API calls 79030->79031 79032 14008041a 79031->79032 79033 14003ec00 70 API calls 79032->79033 79034 140080468 79033->79034 79035 14003ec00 70 API calls 79034->79035 79036 1400804b7 79035->79036 79037 140052130 70 API calls 79036->79037 79038 14008050d 79037->79038 79039 14003ec00 70 API calls 79038->79039 79040 14008055b 79039->79040 79041 14003ec00 70 API calls 79040->79041 79042 14008061e 79041->79042 79043 14007d670 156 API calls 79042->79043 79044 140080662 79043->79044 79045 140042160 70 API calls 79044->79045 79115->78650 79117 14009469a 79116->79117 79122 140094679 79116->79122 79118 140095858 _Strcoll 66 API calls 79117->79118 79119 14009469f 79118->79119 79120 140097ae0 _Strcoll 66 API calls 79119->79120 79121 1400946b8 79120->79121 79121->79122 79558 14009b454 67 API calls 3 library calls 79121->79558 79122->78654 79124 1400946ee 79124->78654 79126 140040826 79125->79126 79127 140040703 79125->79127 79126->79127 79128 140040833 79126->79128 79129 1400a9a30 _Strcoll 3 API calls 79127->79129 79559 1400451c0 70 API calls 3 library calls 79128->79559 79130 140040732 79129->79130 79130->78780 79132 140040854 79133 1400ac058 Concurrency::cancel_current_task 2 API calls 79132->79133 79134 140040865 79133->79134 79136 14006f89f ISource 79135->79136 79137 14006f8be 79135->79137 79138 1400a9a30 _Strcoll 3 API calls 79136->79138 79143 14006f96c 79136->79143 79145 140034b20 79137->79145 79140 14006f95e 79138->79140 79140->78818 79141 14006f8e7 79157 14006f980 70 API calls 2 library calls 79141->79157 79144->78818 79146 140034c44 79145->79146 79149 140034b46 79145->79149 79159 14002b5d0 70 API calls 79146->79159 79147 140034b51 ctype 79147->79141 79149->79147 79150 140034c3f 79149->79150 79152 140034c02 79149->79152 79153 140034baa 79149->79153 79158 14002b510 70 API calls 2 library calls 79150->79158 79155 1400a9b78 std::_Facet_Register 70 API calls 79152->79155 79153->79150 79154 140034bb7 79153->79154 79156 1400a9b78 std::_Facet_Register 70 API calls 79154->79156 79155->79147 79156->79147 79157->79136 79158->79146 79177 140075910 79160->79177 79164 14007753d 79165 140034b20 70 API calls 79164->79165 79170 140077652 79164->79170 79166 1400775ae 79165->79166 79167 140077617 ISource 79166->79167 79166->79170 79168 1400a9a30 _Strcoll 3 API calls 79167->79168 79169 14007763c GetVolumeInformationW 79168->79169 79169->78825 79184 140075720 70 API calls Concurrency::cancel_current_task 79170->79184 79171->78829 79172->78831 79174 14003e008 79173->79174 79175 14003e06c 79174->79175 79191 140041450 79174->79191 79175->78824 79178 14007598f 79177->79178 79181 140075970 79177->79181 79178->79181 79189 140045450 70 API calls 4 library calls 79178->79189 79183 140075aa5 79181->79183 79185 1400b6744 GetCurrentDirectoryW 79181->79185 79190 140045450 70 API calls 4 library calls 79181->79190 79183->79164 79186 1400b6756 79185->79186 79187 1400b6765 GetLastError 79185->79187 79186->79187 79188 1400b675a 79186->79188 79187->79188 79188->79181 79189->79181 79190->79181 79192 140041497 79191->79192 79197 14002b5d0 70 API calls 79192->79197 79198->78834 79201 14004785c 79200->79201 79203 140047881 ISource 79200->79203 79202 140047962 79201->79202 79201->79203 79205 1400478b7 79201->79205 79206 14004788e 79201->79206 79211 14002b510 70 API calls 2 library calls 79202->79211 79203->78850 79208 1400a9b78 std::_Facet_Register 70 API calls 79205->79208 79206->79202 79207 14004789b 79206->79207 79209 1400a9b78 std::_Facet_Register 70 API calls 79207->79209 79208->79203 79209->79203 79210->78856 79211->79203 79212->78866 79214 1400635c5 79213->79214 79217 140063530 ctype 79213->79217 79218 1400678c0 71 API calls 4 library calls 79214->79218 79216 1400635da 79216->78870 79217->78870 79218->79216 79220 14007dc60 GetUserNameW 79219->79220 79220->78875 79220->78876 79222 14007cf94 InternetOpenA 79221->79222 79223 14007cde2 79221->79223 79224 14007cfdd InternetOpenUrlA 79222->79224 79231 14007cfba 79222->79231 79251 1400a9b00 AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 79223->79251 79228 14007d050 HttpQueryInfoW 79224->79228 79224->79231 79227 1400a9a30 _Strcoll 3 API calls 79229 14007d39e 79227->79229 79230 14007d0ad HttpQueryInfoW 79228->79230 79228->79231 79229->78891 79233 14007d136 InternetQueryDataAvailable 79230->79233 79234 14007d10a 79230->79234 79231->79227 79236 14007d333 InternetCloseHandle 79233->79236 79237 14007d152 79233->79237 79252 140091940 66 API calls ProcessCodePage 79234->79252 79236->79231 79237->79236 79241 14007d1f9 InternetReadFile 79237->79241 79246 1400a9b78 std::_Facet_Register 70 API calls 79237->79246 79248 14007d3b9 79237->79248 79250 14007d1ae ISource memcpy_s ctype 79237->79250 79238 14007d11b 79238->79233 79243 14007d2ed 79241->79243 79241->79250 79242 1400a9b78 std::_Facet_Register 70 API calls 79242->79250 79243->79236 79245 14007d322 ISource 79243->79245 79243->79248 79245->79236 79246->79237 79247 14007d3c4 79253 14002b510 70 API calls 2 library calls 79248->79253 79249 14007d2c6 InternetQueryDataAvailable 79249->79236 79249->79250 79250->79237 79250->79241 79250->79242 79250->79243 79250->79248 79250->79249 79252->79238 79253->79247 79255 140044766 79254->79255 79256 140044873 79255->79256 79257 1400447ac 79255->79257 79263 14004481f 79255->79263 79265 14002b5f0 70 API calls 79256->79265 79258 1400a9b78 std::_Facet_Register 70 API calls 79257->79258 79260 1400447ca 79258->79260 79262 1400406d0 70 API calls 79260->79262 79262->79263 79263->78897 79264->78893 79267 1400764a0 79266->79267 79268 1400764ff 79266->79268 79333 1400a9b00 AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 79267->79333 79268->78911 79276 140076654 79275->79276 79277 1400a9a30 _Strcoll 3 API calls 79276->79277 79278 1400766eb 79277->79278 79279 140076700 79278->79279 79280 140076480 16 API calls 79279->79280 79281 140076734 79280->79281 79282 14007673d EnterCriticalSection 79281->79282 79283 14007677c 79281->79283 79284 1400767a0 LeaveCriticalSection GdipGetImageEncodersSize 79282->79284 79285 14007674e GdiplusStartup 79282->79285 79288 1400a9a30 _Strcoll 3 API calls 79283->79288 79284->79283 79286 1400767bc 79284->79286 79285->79284 79287 140076772 LeaveCriticalSection 79285->79287 79291 1400767d8 _Strcoll 79286->79291 79334 140076210 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 79286->79334 79287->79283 79289 14007678d IStream_Size IStream_Reset 79288->79289 79289->78918 79289->78922 79292 140076836 79291->79292 79293 140076840 GdipGetImageEncoders 79291->79293 79292->79283 79335 14008ca40 11 API calls 2 library calls 79292->79335 79293->79292 79295 140076854 79293->79295 79295->79292 79296 140076948 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 79295->79296 79297 1400768dd GdipCreateBitmapFromScan0 GdipSaveImageToStream 79295->79297 79298 1400769a0 GdipDisposeImage 79296->79298 79299 140076938 GdipDisposeImage 79296->79299 79297->79299 79300 140076946 79297->79300 79298->79292 79299->79292 79300->79298 79336 140041900 79302->79336 79307 140073850 79308 14007388f 79307->79308 79311 1400738a4 79308->79311 79400 140046c80 79308->79400 79309 1400738d7 79312 140073985 79309->79312 79314 140073943 79309->79314 79311->79309 79396 14003f4f0 79311->79396 79425 14002c9d0 70 API calls 79312->79425 79313 140073954 79313->78926 79314->79313 79424 140047760 70 API calls 2 library calls 79314->79424 79317 1400739c7 79318 1400ac058 Concurrency::cancel_current_task 2 API calls 79317->79318 79319 1400739d8 79318->79319 79426 1400735b0 70 API calls 79319->79426 79321 1400739fb ISource 79321->78926 79324 140076584 DeleteObject 79323->79324 79325 1400765a9 79323->79325 79324->79325 79326 140076480 16 API calls 79325->79326 79327 1400765ae EnterCriticalSection 79326->79327 79328 1400765e6 LeaveCriticalSection 79327->79328 79329 1400765c1 EnterCriticalSection 79327->79329 79328->78909 79330 1400765d3 GdiplusShutdown 79329->79330 79331 1400765d9 LeaveCriticalSection 79329->79331 79330->79331 79331->79328 79332->78922 79334->79291 79335->79292 79337 1400a9b78 std::_Facet_Register 70 API calls 79336->79337 79338 140041961 79337->79338 79354 1400b77bc 79338->79354 79340 140041971 79363 140041c60 79340->79363 79343 1400419fe 79344 14003e14f 79343->79344 79378 1400b7a88 6 API calls std::_Lockit::_Lockit 79343->79378 79351 140040be0 79344->79351 79346 140041a26 79379 14002c9d0 70 API calls 79346->79379 79348 140041a66 79349 1400ac058 Concurrency::cancel_current_task 2 API calls 79348->79349 79350 140041a77 79349->79350 79391 140041350 79351->79391 79380 1400b715c 79354->79380 79356 1400b77de 79362 1400b7822 Concurrency::cancel_current_task ctype 79356->79362 79384 1400b79b4 70 API calls std::_Facet_Register 79356->79384 79358 1400b77f6 79385 1400b79e4 67 API calls std::locale::_Setgloballocale 79358->79385 79360 1400b7801 79360->79362 79386 14008ca40 11 API calls 2 library calls 79360->79386 79362->79340 79364 1400b715c std::_Lockit::_Lockit 6 API calls 79363->79364 79365 140041c90 79364->79365 79366 1400b715c std::_Lockit::_Lockit 6 API calls 79365->79366 79368 140041cb5 79365->79368 79366->79368 79367 140041d2d 79369 1400a9a30 _Strcoll 3 API calls 79367->79369 79368->79367 79388 14002c670 102 API calls 6 library calls 79368->79388 79371 1400419a2 79369->79371 79371->79343 79371->79346 79372 140041d3f 79373 140041d45 79372->79373 79374 140041da6 79372->79374 79389 1400b777c 70 API calls std::_Facet_Register 79373->79389 79390 14002c1b0 70 API calls 2 library calls 79374->79390 79377 140041dab 79378->79344 79379->79348 79381 1400b716b 79380->79381 79383 1400b7170 79380->79383 79387 140097d98 6 API calls std::_Lockit::_Lockit 79381->79387 79383->79356 79384->79358 79385->79360 79386->79362 79388->79372 79389->79367 79390->79377 79392 1400a9b78 std::_Facet_Register 70 API calls 79391->79392 79393 1400413c7 79392->79393 79394 1400b77bc 77 API calls 79393->79394 79395 14003e1c6 79394->79395 79395->79307 79397 14003f513 ctype 79396->79397 79398 14003f586 79396->79398 79397->79398 79427 14003f1b0 79397->79427 79398->79309 79401 140046d40 79400->79401 79402 140046cbe 79400->79402 79403 1400a9a30 _Strcoll 3 API calls 79401->79403 79438 1400466a0 70 API calls 79402->79438 79405 140046d6d 79403->79405 79405->79311 79406 140046ccb 79407 140046d2d 79406->79407 79409 140046d82 79406->79409 79407->79401 79439 140047760 70 API calls 2 library calls 79407->79439 79440 14002c9d0 70 API calls 79409->79440 79411 140046dc4 79412 1400ac058 Concurrency::cancel_current_task 2 API calls 79411->79412 79413 140046dd5 79412->79413 79414 140046e2b 79413->79414 79415 140046c80 70 API calls 79413->79415 79416 140046f38 79414->79416 79417 140046efa 79414->79417 79415->79414 79442 14002c9d0 70 API calls 79416->79442 79418 140046f0b 79417->79418 79441 140047760 70 API calls 2 library calls 79417->79441 79418->79311 79421 140046f7a 79422 1400ac058 Concurrency::cancel_current_task 2 API calls 79421->79422 79423 140046f8b 79422->79423 79424->79313 79425->79317 79426->79321 79429 14003f1d8 79427->79429 79436 14003f1dd ISource ctype 79427->79436 79428 14003f297 79430 1400a9b78 std::_Facet_Register 70 API calls 79428->79430 79429->79428 79431 14003f259 79429->79431 79432 14003f266 79429->79432 79429->79436 79430->79436 79431->79432 79433 14003f39c 79431->79433 79434 1400a9b78 std::_Facet_Register 70 API calls 79432->79434 79432->79436 79437 14002b510 70 API calls 2 library calls 79433->79437 79434->79436 79436->79397 79437->79436 79438->79406 79439->79401 79440->79411 79441->79418 79442->79421 79444 140075631 79443->79444 79445 1400a9a30 _Strcoll 3 API calls 79444->79445 79446 14007570d 79445->79446 79446->78944 79448 140086edd 79447->79448 79451 140086fb3 79448->79451 79452 14008700c 79448->79452 79457 140086ee2 ctype 79448->79457 79458 140087075 79448->79458 79453 1400a9b78 std::_Facet_Register 70 API calls 79451->79453 79455 140086fc9 79451->79455 79454 1400a9b78 std::_Facet_Register 70 API calls 79452->79454 79453->79455 79454->79457 79455->79457 79459 14002b510 70 API calls 2 library calls 79455->79459 79457->78947 79460 14002b5d0 70 API calls 79458->79460 79459->79458 79481 14008b6f8 79461->79481 79464 140095101 79489 140091afc 9 API calls _get_daylight 79464->79489 79466 140095106 79490 14008d638 66 API calls _invalid_parameter_noinfo 79466->79490 79468 140095119 79491 140094e08 11 API calls 3 library calls 79468->79491 79470 140095144 79471 140095148 79470->79471 79492 14009b570 79470->79492 79472 140095111 79471->79472 79475 140098bd0 __free_lconv_num 9 API calls 79471->79475 79472->78740 79475->79472 79476 1400951ae 79478 140098bd0 __free_lconv_num 9 API calls 79476->79478 79478->79471 79479 14009517e 79479->79476 79499 140094f84 10 API calls 2 library calls 79479->79499 79482 14008b71c 79481->79482 79483 14008b717 79481->79483 79482->79483 79500 140095858 GetLastError 79482->79500 79483->79464 79483->79468 79489->79466 79490->79472 79491->79470 79493 14009b5bb 79492->79493 79497 14009b57f std::_Facet_Register wcsftime 79492->79497 79549 140091afc 9 API calls _get_daylight 79493->79549 79495 14009b5a2 HeapAlloc 79496 140095156 79495->79496 79495->79497 79496->79476 79498 14009fc88 80 API calls 4 library calls 79496->79498 79497->79493 79497->79495 79498->79479 79499->79476 79501 140095899 FlsSetValue 79500->79501 79502 14009587c FlsGetValue 79500->79502 79503 140095889 79501->79503 79505 1400958ab 79501->79505 79502->79503 79504 140095893 79502->79504 79506 140095905 SetLastError 79503->79506 79504->79501 79507 140099238 _Strcoll 9 API calls 79505->79507 79508 14008b737 79506->79508 79509 140095925 79506->79509 79510 1400958ba 79507->79510 79541 140097ae0 79508->79541 79547 140095228 66 API calls __std_fs_directory_iterator_open 79509->79547 79512 1400958d8 FlsSetValue 79510->79512 79513 1400958c8 FlsSetValue 79510->79513 79516 1400958e4 FlsSetValue 79512->79516 79517 1400958f6 79512->79517 79515 1400958d1 79513->79515 79520 140098bd0 __free_lconv_num 9 API calls 79515->79520 79516->79515 79546 140095608 9 API calls _Strcoll 79517->79546 79520->79503 79525 1400958fe 79526 140098bd0 __free_lconv_num 9 API calls 79525->79526 79526->79506 79542 14008b75a 79541->79542 79543 140097af5 79541->79543 79545 140097b4c 66 API calls TranslateName 79542->79545 79543->79542 79548 1400a0ca4 66 API calls 2 library calls 79543->79548 79545->79483 79546->79525 79548->79542 79549->79496 79551 140071ca6 79550->79551 79552 140071d37 79550->79552 79555 140071cb5 memcpy_s ctype 79551->79555 79557 140072710 70 API calls 5 library calls 79551->79557 79554 140071d27 79554->78964 79555->78964 79556->78974 79557->79554 79558->79124 79559->79132 79560->78798 79562 1400406d0 70 API calls 79561->79562 79563 140062196 79562->79563 79579 140065350 79563->79579 79567 140062221 79567->78802 79569 1400622dd 79568->79569 79571 14006231e 79568->79571 79570 1400622fc 79569->79570 79572 140041450 70 API calls 79569->79572 79570->78806 79573 1400444c0 70 API calls 79571->79573 79572->79570 79574 140062351 79573->79574 79575 1400ac058 Concurrency::cancel_current_task 2 API calls 79574->79575 79578 140062362 79575->79578 79576 140062396 79576->78806 79578->79576 79754 1400b66b0 67 API calls __std_fs_directory_iterator_open 79578->79754 79580 140065394 79579->79580 79632 1400919f4 79580->79632 79584 140062215 79585 1400624b0 79584->79585 79586 1400627c1 79585->79586 79588 1400624fb memcpy_s 79585->79588 79587 1400635f0 70 API calls 79586->79587 79595 140062800 79587->79595 79661 140062cf0 70 API calls 79588->79661 79590 14006254b 79662 140065820 70 API calls 4 library calls 79590->79662 79592 140062908 ISource 79594 1400406d0 70 API calls 79592->79594 79602 1400629bc 79592->79602 79606 140062aa0 79592->79606 79625 140062af7 79592->79625 79593 14006255b 79597 1400635f0 70 API calls 79593->79597 79594->79602 79595->79592 79599 1400666f0 70 API calls 79595->79599 79596 1400a9a30 _Strcoll 3 API calls 79598 140062a4c 79596->79598 79605 140062567 79597->79605 79598->79567 79603 140062873 79599->79603 79600 140062755 79608 1400406d0 70 API calls 79600->79608 79614 140062728 ISource 79600->79614 79601 14006270d 79604 1400406d0 70 API calls 79601->79604 79602->79606 79602->79614 79607 1400633d0 70 API calls 79603->79607 79604->79614 79630 1400626f4 ISource 79605->79630 79663 1400666f0 79605->79663 79735 140061eb0 68 API calls 79606->79735 79610 140062882 ISource 79607->79610 79608->79614 79616 1400ab9a0 __std_exception_destroy 11 API calls 79610->79616 79610->79625 79629 140062ac8 79610->79629 79611 140062ab8 79615 1400ac058 Concurrency::cancel_current_task 2 API calls 79611->79615 79614->79596 79615->79629 79619 1400628fa 79616->79619 79617 140062ae7 79620 1400ac058 Concurrency::cancel_current_task 2 API calls 79617->79620 79618 1400625d9 79729 1400633d0 79618->79729 79622 1400ab9a0 __std_exception_destroy 11 API calls 79619->79622 79620->79625 79622->79592 79624 1400625fe ISource 79626 1400ab9a0 __std_exception_destroy 11 API calls 79624->79626 79624->79629 79627 140062669 79626->79627 79628 1400ab9a0 __std_exception_destroy 11 API calls 79627->79628 79631 140062677 ISource 79628->79631 79736 140061eb0 68 API calls 79629->79736 79630->79600 79630->79601 79631->79629 79631->79630 79633 140095858 _Strcoll 66 API calls 79632->79633 79634 1400919fd 79633->79634 79635 140097ae0 _Strcoll 66 API calls 79634->79635 79636 14006546c 79635->79636 79637 1400635f0 79636->79637 79638 140063613 79637->79638 79642 140063660 79637->79642 79656 140065020 70 API calls 79638->79656 79641 140063618 79641->79642 79657 140065020 70 API calls 79641->79657 79659 140063a40 70 API calls 79642->79659 79644 140063797 79648 1400a9a30 _Strcoll 3 API calls 79644->79648 79645 140063627 79646 14006363d 79645->79646 79658 140065020 70 API calls 79645->79658 79647 1400a9a30 _Strcoll 3 API calls 79646->79647 79650 14006365a 79647->79650 79651 140063895 79648->79651 79650->79584 79651->79584 79652 140063636 79652->79642 79652->79646 79653 140065020 70 API calls 79655 1400636a1 79653->79655 79655->79644 79655->79653 79660 140063a40 70 API calls 79655->79660 79656->79641 79657->79645 79658->79652 79659->79655 79660->79655 79661->79590 79662->79593 79664 14006674f 79663->79664 79737 140059a50 14 API calls 2 library calls 79664->79737 79666 140066766 79667 14002e800 70 API calls 79666->79667 79669 1400667a2 ISource 79667->79669 79668 1400ab910 __std_exception_copy 68 API calls 79670 140066953 79668->79670 79669->79668 79674 1400669e3 79669->79674 79671 1400669a7 ISource 79670->79671 79670->79674 79672 1400a9a30 _Strcoll 3 API calls 79671->79672 79673 1400669cc 79672->79673 79673->79618 79675 1400666f0 70 API calls 79674->79675 79676 1400676c2 79675->79676 79677 1400633d0 70 API calls 79676->79677 79678 1400676d2 79677->79678 79679 14006773d 79678->79679 79680 1400676dd 79678->79680 79743 140061eb0 68 API calls 79679->79743 79738 14002ead0 79680->79738 79682 140067749 79684 1400ac058 Concurrency::cancel_current_task 2 API calls 79682->79684 79685 140067759 79684->79685 79744 140061eb0 68 API calls 79685->79744 79687 140067766 79688 1400ac058 Concurrency::cancel_current_task 2 API calls 79687->79688 79689 140067776 79688->79689 79745 140061eb0 68 API calls 79689->79745 79691 140067783 79692 1400ac058 Concurrency::cancel_current_task 2 API calls 79691->79692 79693 140067793 79692->79693 79746 1400684b0 68 API calls 79693->79746 79694 1400676f1 79696 1400a9a30 _Strcoll 3 API calls 79694->79696 79698 140067726 79696->79698 79697 1400677a0 79699 1400ac058 Concurrency::cancel_current_task 2 API calls 79697->79699 79698->79618 79700 1400677b0 79699->79700 79747 140061eb0 68 API calls 79700->79747 79702 1400677bd 79703 1400ac058 Concurrency::cancel_current_task 2 API calls 79702->79703 79704 1400677cd 79703->79704 79748 140061eb0 68 API calls 79704->79748 79706 1400677da 79707 1400ac058 Concurrency::cancel_current_task 2 API calls 79706->79707 79708 1400677ea 79707->79708 79749 140061eb0 68 API calls 79708->79749 79710 1400677f7 79711 1400ac058 Concurrency::cancel_current_task 2 API calls 79710->79711 79712 140067807 79711->79712 79750 140061eb0 68 API calls 79712->79750 79714 140067814 79715 1400ac058 Concurrency::cancel_current_task 2 API calls 79714->79715 79716 140067824 79715->79716 79751 140061eb0 68 API calls 79716->79751 79718 140067831 79719 1400ac058 Concurrency::cancel_current_task 2 API calls 79718->79719 79720 140067841 79719->79720 79752 140061eb0 68 API calls 79720->79752 79722 14006784e 79723 1400ac058 Concurrency::cancel_current_task 2 API calls 79722->79723 79724 14006785e 79723->79724 79753 140061eb0 68 API calls 79724->79753 79726 14006786b 79727 1400ac058 Concurrency::cancel_current_task 2 API calls 79726->79727 79728 14006787b 79727->79728 79730 1400634d2 79729->79730 79733 140063426 79729->79733 79731 1400a9a30 _Strcoll 3 API calls 79730->79731 79732 1400625e9 79731->79732 79732->79606 79732->79624 79733->79730 79734 140045610 70 API calls 79733->79734 79734->79733 79735->79611 79736->79617 79737->79666 79739 1400ab9a0 __std_exception_destroy 11 API calls 79738->79739 79740 14002eafe 79739->79740 79741 1400ab9a0 __std_exception_destroy 11 API calls 79740->79741 79742 14002eb0b 79741->79742 79742->79694 79743->79682 79744->79687 79745->79691 79746->79697 79747->79702 79748->79706 79749->79710 79750->79714 79751->79718 79752->79722 79753->79726 79754->79578 79755 140077720 79756 140077750 79755->79756 79761 1400b6780 79756->79761 79759 1400a9a30 _Strcoll 3 API calls 79760 1400777a6 79759->79760 79764 1400b67c2 79761->79764 79762 1400b67cb 79763 1400a9a30 _Strcoll 3 API calls 79762->79763 79766 140077769 79763->79766 79764->79762 79765 1400b68dd 79764->79765 79768 1400b6823 GetFileAttributesExW 79764->79768 79804 1400b6b54 CreateFileW GetLastError 79765->79804 79766->79759 79770 1400b6888 79768->79770 79771 1400b6837 GetLastError 79768->79771 79769 1400b6900 79772 1400b6926 79769->79772 79773 1400b6906 79769->79773 79770->79762 79770->79765 79771->79762 79774 1400b6846 FindFirstFileW 79771->79774 79777 1400b6935 GetFileInformationByHandleEx 79772->79777 79794 1400b69d3 79772->79794 79775 1400b691f 79773->79775 79776 1400b6911 CloseHandle 79773->79776 79778 1400b685a GetLastError 79774->79778 79779 1400b6865 FindClose 79774->79779 79775->79762 79776->79775 79780 1400b6a95 79776->79780 79783 1400b694f GetLastError 79777->79783 79784 1400b6975 79777->79784 79778->79762 79779->79770 79805 140095228 66 API calls __std_fs_directory_iterator_open 79780->79805 79781 1400b6a28 79788 1400b6a7b 79781->79788 79789 1400b6a3f 79781->79789 79782 1400b69ee GetFileInformationByHandleEx 79782->79781 79786 1400b6a04 GetLastError 79782->79786 79783->79775 79787 1400b695d CloseHandle 79783->79787 79790 1400b6996 GetFileInformationByHandleEx 79784->79790 79784->79794 79786->79775 79792 1400b6a16 CloseHandle 79786->79792 79787->79775 79803 1400b6aa6 79787->79803 79788->79775 79791 1400b6a81 CloseHandle 79788->79791 79789->79762 79793 1400b6a45 CloseHandle 79789->79793 79790->79794 79795 1400b69b2 GetLastError 79790->79795 79791->79775 79791->79780 79792->79775 79798 1400b6aa0 79792->79798 79793->79762 79793->79780 79794->79781 79794->79782 79795->79775 79799 1400b69c0 CloseHandle 79795->79799 79797 1400b6a9a 79806 140095228 66 API calls __std_fs_directory_iterator_open 79797->79806 79807 140095228 66 API calls __std_fs_directory_iterator_open 79798->79807 79799->79775 79799->79797 79808 140095228 66 API calls __std_fs_directory_iterator_open 79803->79808 79804->79769 79809 140077b60 79810 140077bf3 ISource 79809->79810 79813 140078167 79810->79813 79863 14002e700 79810->79863 79812 140077cc6 79812->79813 79816 140077d27 ISource 79812->79816 79918 14002de50 73 API calls Concurrency::cancel_current_task 79813->79918 79814 140077c84 memcpy_s 79814->79812 79869 140086c70 79814->79869 79818 1400a9a30 _Strcoll 3 API calls 79816->79818 79820 140077d59 79818->79820 79819 140077da9 79821 140078030 79819->79821 79886 140085460 79819->79886 79821->79816 79917 140051600 70 API calls 79821->79917 79822 14007818f 79919 14002c9d0 70 API calls 79822->79919 79826 140077e22 79829 140077ec2 79826->79829 79830 140077e3f 79826->79830 79827 1400781b6 79828 1400ac058 Concurrency::cancel_current_task 2 API calls 79827->79828 79831 1400781c7 79828->79831 79893 140083ce0 79829->79893 79830->79822 79833 140077e71 79830->79833 79920 14002c9d0 70 API calls 79831->79920 79835 140083b20 74 API calls 79833->79835 79834 140077ed6 79840 140077f70 79834->79840 79841 140077eed 79834->79841 79837 140077e7e 79835->79837 79914 140050910 70 API calls 79837->79914 79838 1400781f0 79839 1400ac058 Concurrency::cancel_current_task 2 API calls 79838->79839 79847 140078204 79839->79847 79842 140083ce0 70 API calls 79840->79842 79841->79831 79843 140077f1f 79841->79843 79845 140077f84 79842->79845 79904 140083b20 79843->79904 79848 140083ce0 70 API calls 79845->79848 79921 14002c9d0 70 API calls 79847->79921 79851 140077f93 79848->79851 79849 140077f2c 79915 140050910 70 API calls 79849->79915 79853 1400622a0 71 API calls 79851->79853 79852 14007822e 79854 1400ac058 Concurrency::cancel_current_task 2 API calls 79852->79854 79855 140077fa3 79853->79855 79857 140078242 79854->79857 79855->79847 79858 140083b20 74 API calls 79855->79858 79859 140077fe3 79858->79859 79860 14003fc70 70 API calls 79859->79860 79861 140077ff3 79860->79861 79916 140050910 70 API calls 79861->79916 79864 14002e731 79863->79864 79865 1400b6780 85 API calls 79864->79865 79866 14002e74d 79865->79866 79867 1400a9a30 _Strcoll 3 API calls 79866->79867 79868 14002e7d2 79867->79868 79868->79814 79870 140041900 103 API calls 79869->79870 79871 140086d27 79870->79871 79922 1400520a0 79871->79922 79876 140086d7f 79933 140051bc0 66 API calls _Strcoll 79876->79933 79877 140086e08 79885 140086db8 79877->79885 79935 14002c9d0 70 API calls 79877->79935 79879 140086d91 79934 140053630 99 API calls 4 library calls 79879->79934 79881 140086e72 79883 1400ac058 Concurrency::cancel_current_task 2 API calls 79881->79883 79884 140086e83 79883->79884 79885->79819 79887 1400406d0 70 API calls 79886->79887 79888 140085496 79887->79888 80138 140088950 79888->80138 79892 140085505 79892->79826 79894 140083d7e 79893->79894 79895 140083cff 79893->79895 79897 1400444c0 70 API calls 79894->79897 79896 140083d3a 79895->79896 80359 140085ce0 70 API calls 3 library calls 79895->80359 79896->79834 79898 140083dab 79897->79898 79899 1400ac058 Concurrency::cancel_current_task 2 API calls 79898->79899 79900 140083dbc 79899->79900 79902 140083d6d 79903 1400ac058 Concurrency::cancel_current_task 2 API calls 79902->79903 79903->79894 80360 140051cc0 79904->80360 79906 140083b60 79906->79849 79907 140083b32 79907->79906 80366 14002c9d0 70 API calls 79907->80366 79909 140083ba6 79910 1400ac058 Concurrency::cancel_current_task 2 API calls 79909->79910 79911 140083bb7 79910->79911 79912 140083be7 79911->79912 80367 14008ca40 11 API calls 2 library calls 79911->80367 79912->79849 79914->79816 79915->79816 79916->79821 79917->79812 79919->79827 79920->79838 79921->79852 79923 140041350 77 API calls 79922->79923 79924 1400520b3 79923->79924 79924->79877 79925 1400b7cf8 79924->79925 79926 1400b7d3e 79925->79926 79932 140086d76 79926->79932 79936 1400b96e8 79926->79936 79928 1400b7d71 79928->79932 79953 14008d214 66 API calls ProcessCodePage 79928->79953 79930 1400b7d8c 79930->79932 79954 14008bfb0 79930->79954 79932->79876 79932->79877 79933->79879 79934->79885 79935->79881 79937 1400b9614 79936->79937 79938 1400b963a 79937->79938 79941 1400b966d 79937->79941 79971 140091afc 9 API calls _get_daylight 79938->79971 79940 1400b963f 79972 14008d638 66 API calls _invalid_parameter_noinfo 79940->79972 79943 1400b9680 79941->79943 79944 1400b9673 79941->79944 79962 140098eb0 79943->79962 79973 140091afc 9 API calls _get_daylight 79944->79973 79947 1400b968a 79948 1400b9694 79947->79948 79949 1400b96a1 79947->79949 79974 140091afc 9 API calls _get_daylight 79948->79974 79966 1400bae80 79949->79966 79952 1400b964a 79952->79928 79953->79930 79955 14008bfe0 79954->79955 80102 14008be90 79955->80102 79957 14008bff9 79959 14008c01e 79957->79959 80108 14008b5f8 66 API calls 2 library calls 79957->80108 79961 14008c033 79959->79961 80109 14008b5f8 66 API calls 2 library calls 79959->80109 79961->79932 79963 140098ec7 79962->79963 79975 140098f24 79963->79975 79965 140098ed2 79965->79947 79984 1400baae0 79966->79984 79970 1400baeda 79970->79952 79971->79940 79972->79952 79973->79952 79974->79952 79979 140098f55 79975->79979 79976 140099238 _Strcoll 9 API calls 79977 140098fb0 79976->79977 79978 140098bd0 __free_lconv_num 9 API calls 79977->79978 79980 140098fba 79978->79980 79979->79976 79982 140098fda 79979->79982 79980->79982 79983 1400999d8 6 API calls __crtLCMapStringW 79980->79983 79982->79965 79983->79982 79989 1400bab1b __crtLCMapStringW 79984->79989 79986 1400badb9 80003 14008d638 66 API calls _invalid_parameter_noinfo 79986->80003 79988 1400baceb 79988->79970 79996 1400bc598 79988->79996 79989->79989 79994 1400bace2 79989->79994 79999 1400a733c 72 API calls 4 library calls 79989->79999 79991 1400bad4d 79991->79994 80000 1400a733c 72 API calls 4 library calls 79991->80000 79993 1400bad6c 79993->79994 80001 1400a733c 72 API calls 4 library calls 79993->80001 79994->79988 80002 140091afc 9 API calls _get_daylight 79994->80002 80004 1400bba4c 79996->80004 79998 1400bc5c5 79998->79970 79999->79991 80000->79993 80001->79994 80002->79986 80003->79988 80005 1400bba63 80004->80005 80006 1400bba81 80004->80006 80056 140091afc 9 API calls _get_daylight 80005->80056 80006->80005 80008 1400bba9d 80006->80008 80013 1400bc1a8 80008->80013 80009 1400bba68 80057 14008d638 66 API calls _invalid_parameter_noinfo 80009->80057 80012 1400bba74 80012->79998 80058 1400bbd88 80013->80058 80015 1400bc1ef 80016 1400bc21d 80015->80016 80017 1400bc235 80015->80017 80081 140091adc 9 API calls _get_daylight 80016->80081 80074 1400a06fc 80017->80074 80020 1400bc222 80082 140091afc 9 API calls _get_daylight 80020->80082 80021 1400bc23a 80022 1400bc25a CreateFileW 80021->80022 80023 1400bc241 80021->80023 80025 1400bc340 GetFileType 80022->80025 80026 1400bc2c5 80022->80026 80083 140091adc 9 API calls _get_daylight 80023->80083 80031 1400bc39e 80025->80031 80032 1400bc34d GetLastError 80025->80032 80029 1400bc30d GetLastError 80026->80029 80034 1400bc2d3 CreateFileW 80026->80034 80028 1400bc246 80084 140091afc 9 API calls _get_daylight 80028->80084 80085 140091a70 9 API calls 2 library calls 80029->80085 80030 1400bc22e 80030->80012 80088 1400a0614 10 API calls 2 library calls 80031->80088 80086 140091a70 9 API calls 2 library calls 80032->80086 80034->80025 80034->80029 80037 1400bc35c CloseHandle 80037->80020 80038 1400bc38e 80037->80038 80087 140091afc 9 API calls _get_daylight 80038->80087 80041 1400bc3c0 80043 1400bc414 80041->80043 80089 1400bbf94 77 API calls 2 library calls 80041->80089 80042 1400bc393 80042->80020 80047 1400bc41b 80043->80047 80091 1400bbb10 75 API calls 2 library calls 80043->80091 80046 1400bc452 80046->80047 80048 1400bc461 80046->80048 80090 140098d48 69 API calls ProcessCodePage 80047->80090 80048->80030 80050 1400bc4e1 CloseHandle CreateFileW 80048->80050 80051 1400bc556 80050->80051 80052 1400bc528 GetLastError 80050->80052 80051->80030 80092 140091a70 9 API calls 2 library calls 80052->80092 80054 1400bc535 80093 1400a083c 10 API calls 2 library calls 80054->80093 80056->80009 80057->80012 80059 1400bbdb4 80058->80059 80066 1400bbdce 80058->80066 80059->80066 80094 140091afc 9 API calls _get_daylight 80059->80094 80061 1400bbdc3 80095 14008d638 66 API calls _invalid_parameter_noinfo 80061->80095 80063 1400bbea2 80073 1400bbefa 80063->80073 80100 1400b9040 66 API calls 2 library calls 80063->80100 80064 1400bbe4e 80064->80063 80098 140091afc 9 API calls _get_daylight 80064->80098 80066->80064 80096 140091afc 9 API calls _get_daylight 80066->80096 80069 1400bbe97 80099 14008d638 66 API calls _invalid_parameter_noinfo 80069->80099 80070 1400bbe43 80097 14008d638 66 API calls _invalid_parameter_noinfo 80070->80097 80073->80015 80078 1400a071f 80074->80078 80075 1400a074d 80075->80021 80076 1400a0748 80101 1400a044c 15 API calls 2 library calls 80076->80101 80078->80075 80078->80076 80079 1400a079e EnterCriticalSection 80078->80079 80079->80075 80080 1400a07ad LeaveCriticalSection 80079->80080 80080->80078 80081->80020 80082->80030 80083->80028 80084->80020 80085->80020 80086->80037 80087->80042 80088->80041 80089->80043 80090->80030 80091->80046 80092->80054 80093->80051 80094->80061 80095->80066 80096->80070 80097->80064 80098->80069 80099->80063 80100->80073 80101->80075 80103 14008beab 80102->80103 80105 14008bed9 80102->80105 80124 14008d568 66 API calls _invalid_parameter_noinfo 80103->80124 80107 14008becb 80105->80107 80110 14008bf0c 80105->80110 80107->79957 80108->79959 80109->79961 80111 14008bf4c 80110->80111 80112 14008bf27 80110->80112 80122 14008bf47 80111->80122 80125 14008bcc0 80111->80125 80135 14008d568 66 API calls _invalid_parameter_noinfo 80112->80135 80118 140095280 _fread_nolock 66 API calls 80119 14008bf70 80118->80119 80136 140098c84 69 API calls _invalid_parameter_noinfo 80119->80136 80121 14008bf7a 80121->80122 80123 140098bd0 __free_lconv_num 9 API calls 80121->80123 80122->80107 80123->80122 80124->80107 80126 14008bd16 80125->80126 80127 14008bce5 80125->80127 80131 140099010 80126->80131 80127->80126 80128 140095280 _fread_nolock 66 API calls 80127->80128 80129 14008bd06 80128->80129 80137 140098798 66 API calls 2 library calls 80129->80137 80132 14008bf68 80131->80132 80133 140099023 80131->80133 80132->80118 80133->80132 80134 140098bd0 __free_lconv_num 9 API calls 80133->80134 80134->80132 80135->80122 80136->80121 80137->80126 80139 1400889a4 80138->80139 80140 1400919f4 66 API calls 80139->80140 80141 140088a8a 80140->80141 80195 1400870b0 80141->80195 80143 140088ab1 80213 140075ae0 80143->80213 80146 1400a9a30 _Strcoll 3 API calls 80147 1400854f9 80146->80147 80148 140086610 80147->80148 80149 140086921 80148->80149 80152 14008665b memcpy_s 80148->80152 80289 140089f70 80149->80289 80345 140062cf0 70 API calls 80152->80345 80153 1400870b0 70 API calls 80156 140086960 80153->80156 80155 1400866ab 80159 1400870b0 70 API calls 80155->80159 80161 1400666f0 70 API calls 80156->80161 80190 140086a68 ISource 80156->80190 80157 1400406d0 70 API calls 80163 140086b1c 80157->80163 80158 1400a9a30 _Strcoll 3 API calls 80160 140086bac 80158->80160 80167 1400866c7 80159->80167 80160->79892 80164 1400869d3 80161->80164 80162 140086854 ISource 80165 14008686d 80162->80165 80166 1400868b5 80162->80166 80168 140086c00 80163->80168 80173 140086888 ISource 80163->80173 80169 1400633d0 70 API calls 80164->80169 80170 1400406d0 70 API calls 80165->80170 80171 1400406d0 70 API calls 80166->80171 80166->80173 80167->80162 80176 1400666f0 70 API calls 80167->80176 80346 140061eb0 68 API calls 80168->80346 80180 1400869e2 ISource 80169->80180 80170->80173 80171->80173 80173->80158 80174 140086c18 80177 1400ac058 Concurrency::cancel_current_task 2 API calls 80174->80177 80179 140086739 80176->80179 80191 140086c28 80177->80191 80178 140086c47 80182 1400ac058 Concurrency::cancel_current_task 2 API calls 80178->80182 80183 1400633d0 70 API calls 80179->80183 80181 1400ab9a0 __std_exception_destroy 11 API calls 80180->80181 80188 140086c57 80180->80188 80180->80191 80184 140086a5a 80181->80184 80182->80188 80185 140086749 80183->80185 80186 1400ab9a0 __std_exception_destroy 11 API calls 80184->80186 80185->80168 80187 14008675e ISource 80185->80187 80186->80190 80189 1400ab9a0 __std_exception_destroy 11 API calls 80187->80189 80187->80191 80192 1400867c9 80189->80192 80190->80157 80190->80163 80190->80168 80190->80188 80347 140061eb0 68 API calls 80191->80347 80193 1400ab9a0 __std_exception_destroy 11 API calls 80192->80193 80194 1400867d7 ISource 80193->80194 80194->80162 80194->80191 80196 1400870d3 80195->80196 80200 140087120 80195->80200 80220 140088660 80196->80220 80198 140088660 70 API calls 80198->80200 80199 1400870d8 80199->80200 80201 140088660 70 API calls 80199->80201 80200->80198 80211 140087173 80200->80211 80202 1400870e7 80201->80202 80203 1400870fd 80202->80203 80205 140088660 70 API calls 80202->80205 80204 1400a9a30 _Strcoll 3 API calls 80203->80204 80207 14008711a 80204->80207 80206 1400870f6 80205->80206 80206->80200 80206->80203 80207->80143 80208 140087278 80209 1400a9a30 _Strcoll 3 API calls 80208->80209 80210 1400873cb 80209->80210 80210->80143 80211->80208 80212 140088660 70 API calls 80211->80212 80212->80211 80214 140075b17 80213->80214 80215 140075aee 80213->80215 80214->80146 80215->80214 80288 14002c9d0 70 API calls 80215->80288 80217 140075b4e 80218 1400ac058 Concurrency::cancel_current_task 2 API calls 80217->80218 80219 140075b5f 80218->80219 80221 140088683 80220->80221 80224 14008867d 80220->80224 80222 14008869a 80221->80222 80237 140050fb0 80221->80237 80222->80224 80226 140088734 80222->80226 80223 140088707 80223->80199 80224->80223 80225 140068db0 70 API calls 80224->80225 80225->80223 80256 14002c9d0 70 API calls 80226->80256 80228 140088776 80229 1400ac058 Concurrency::cancel_current_task 2 API calls 80228->80229 80230 140088787 80229->80230 80231 140045610 70 API calls 80230->80231 80234 1400887b5 80230->80234 80231->80234 80232 140088860 80232->80199 80233 140088660 70 API calls 80233->80234 80234->80232 80234->80233 80235 140045610 70 API calls 80234->80235 80235->80234 80238 140050fed 80237->80238 80240 140051061 80238->80240 80241 140051083 80238->80241 80246 140050ffd ISource 80238->80246 80239 1400a9a30 _Strcoll 3 API calls 80242 14005122f 80239->80242 80257 14008c094 80240->80257 80244 14008c094 66 API calls 80241->80244 80242->80222 80251 1400510b1 ctype 80244->80251 80245 1400511d1 80245->80246 80248 1400512b7 80245->80248 80246->80239 80247 140045610 70 API calls 80247->80251 80249 1400512e4 80248->80249 80255 140050fb0 70 API calls 80248->80255 80249->80222 80250 1400512fb 80250->80222 80251->80245 80251->80247 80252 14008c094 66 API calls 80251->80252 80254 140051267 80251->80254 80252->80251 80254->80245 80274 14008cb74 66 API calls 2 library calls 80254->80274 80255->80250 80256->80228 80258 14008c0b0 80257->80258 80262 14008c0ce 80257->80262 80281 140091afc 9 API calls _get_daylight 80258->80281 80260 14008c0b5 80282 14008d638 66 API calls _invalid_parameter_noinfo 80260->80282 80263 14008c188 80262->80263 80264 140095280 _fread_nolock 66 API calls 80262->80264 80275 14008c050 80263->80275 80266 14008c0ef 80264->80266 80266->80263 80268 14008c15d 80266->80268 80267 14008c0c0 80267->80246 80283 140091afc 9 API calls _get_daylight 80268->80283 80270 14008c162 80284 14008d638 66 API calls _invalid_parameter_noinfo 80270->80284 80272 14008c16d 80285 1400abc84 RtlUnwind 80272->80285 80274->80254 80276 14008c05c 80275->80276 80277 14008c06c 80275->80277 80286 140091afc 9 API calls _get_daylight 80276->80286 80277->80267 80279 14008c061 80287 14008d638 66 API calls _invalid_parameter_noinfo 80279->80287 80281->80260 80282->80267 80283->80270 80284->80272 80285->80267 80286->80279 80287->80277 80288->80217 80290 140089fed 80289->80290 80291 1400666f0 70 API calls 80290->80291 80292 14008ac22 80291->80292 80293 1400633d0 70 API calls 80292->80293 80294 14008ac32 80293->80294 80295 14008ac9d 80294->80295 80296 14008ac3d 80294->80296 80348 140061eb0 68 API calls 80295->80348 80299 14002ead0 11 API calls 80296->80299 80298 14008aca9 80300 1400ac058 Concurrency::cancel_current_task 2 API calls 80298->80300 80308 14008ac51 80299->80308 80301 14008acb9 80300->80301 80349 140061eb0 68 API calls 80301->80349 80303 14008acc6 80304 1400ac058 Concurrency::cancel_current_task 2 API calls 80303->80304 80305 14008acd6 80304->80305 80350 140061eb0 68 API calls 80305->80350 80307 14008ace3 80309 1400ac058 Concurrency::cancel_current_task 2 API calls 80307->80309 80310 1400a9a30 _Strcoll 3 API calls 80308->80310 80311 14008acf3 80309->80311 80312 140086954 80310->80312 80351 1400684b0 68 API calls 80311->80351 80312->80153 80314 14008ad00 80315 1400ac058 Concurrency::cancel_current_task 2 API calls 80314->80315 80316 14008ad10 80315->80316 80352 140061eb0 68 API calls 80316->80352 80318 14008ad1d 80319 1400ac058 Concurrency::cancel_current_task 2 API calls 80318->80319 80320 14008ad2d 80319->80320 80353 140061eb0 68 API calls 80320->80353 80322 14008ad3a 80323 1400ac058 Concurrency::cancel_current_task 2 API calls 80322->80323 80324 14008ad4a 80323->80324 80354 140061eb0 68 API calls 80324->80354 80326 14008ad57 80327 1400ac058 Concurrency::cancel_current_task 2 API calls 80326->80327 80328 14008ad67 80327->80328 80355 140061eb0 68 API calls 80328->80355 80330 14008ad74 80331 1400ac058 Concurrency::cancel_current_task 2 API calls 80330->80331 80332 14008ad84 80331->80332 80356 140061eb0 68 API calls 80332->80356 80334 14008ad91 80335 1400ac058 Concurrency::cancel_current_task 2 API calls 80334->80335 80336 14008ada1 80335->80336 80357 140061eb0 68 API calls 80336->80357 80338 14008adae 80339 1400ac058 Concurrency::cancel_current_task 2 API calls 80338->80339 80340 14008adbe 80339->80340 80358 140061eb0 68 API calls 80340->80358 80342 14008adcb 80343 1400ac058 Concurrency::cancel_current_task 2 API calls 80342->80343 80344 14008addb 80343->80344 80345->80155 80346->80174 80347->80178 80348->80298 80349->80303 80350->80307 80351->80314 80352->80318 80353->80322 80354->80326 80355->80330 80356->80334 80357->80338 80358->80342 80359->79902 80361 140051d2a 80360->80361 80362 140051cda 80360->80362 80361->79907 80368 140051ad0 80362->80368 80364 140051d14 80365 14008bfb0 69 API calls 80364->80365 80365->80361 80366->79909 80367->79911 80369 140051ba2 80368->80369 80370 140051af3 80368->80370 80371 1400a9a30 _Strcoll 3 API calls 80369->80371 80370->80369 80376 140051afd 80370->80376 80372 140051bb1 80371->80372 80372->80364 80373 1400a9a30 _Strcoll 3 API calls 80374 140051b5e 80373->80374 80374->80364 80375 140051b41 80375->80373 80376->80375 80378 14008c6f0 67 API calls ProcessCodePage 80376->80378 80378->80375 80379 140050e00 80380 140050e18 80379->80380 80381 140050e24 ctype 80379->80381 80382 140050e35 ctype 80381->80382 80383 140050f6e 80381->80383 80386 14008ce64 80381->80386 80383->80382 80385 14008ce64 _fread_nolock 75 API calls 80383->80385 80385->80382 80389 14008ce84 80386->80389 80388 14008ce7c 80388->80381 80390 14008ceae 80389->80390 80397 14008cedd 80389->80397 80391 14008cefa 80390->80391 80392 14008cebd memcpy_s 80390->80392 80390->80397 80398 14008cc04 80391->80398 80413 140091afc 9 API calls _get_daylight 80392->80413 80394 14008ced2 80414 14008d638 66 API calls _invalid_parameter_noinfo 80394->80414 80397->80388 80399 14008cc2b memcpy_s 80398->80399 80405 14008cc45 80398->80405 80400 14008cc35 80399->80400 80399->80405 80411 14008cca2 memcpy_s ctype 80399->80411 80435 140091afc 9 API calls _get_daylight 80400->80435 80402 14008cc3a 80436 14008d638 66 API calls _invalid_parameter_noinfo 80402->80436 80405->80397 80406 14008ce23 memcpy_s 80504 140091afc 9 API calls _get_daylight 80406->80504 80407 140095280 _fread_nolock 66 API calls 80407->80411 80411->80405 80411->80406 80411->80407 80415 1400990cc 80411->80415 80437 140091afc 9 API calls _get_daylight 80411->80437 80438 14008d638 66 API calls _invalid_parameter_noinfo 80411->80438 80439 14009ac80 80411->80439 80413->80394 80414->80397 80416 1400990e9 80415->80416 80419 1400990fe 80415->80419 80530 140091afc 9 API calls _get_daylight 80416->80530 80418 1400990ee 80531 14008d638 66 API calls _invalid_parameter_noinfo 80418->80531 80421 140099141 80419->80421 80422 14009a64c _fread_nolock 9 API calls 80419->80422 80427 1400990f9 80419->80427 80423 140095280 _fread_nolock 66 API calls 80421->80423 80422->80421 80424 140099153 80423->80424 80505 14009ab64 80424->80505 80426 140099160 80426->80427 80428 140095280 _fread_nolock 66 API calls 80426->80428 80427->80411 80429 140099181 80428->80429 80429->80427 80430 140095280 _fread_nolock 66 API calls 80429->80430 80431 14009918d 80430->80431 80431->80427 80432 140095280 _fread_nolock 66 API calls 80431->80432 80433 14009919a 80432->80433 80434 140095280 _fread_nolock 66 API calls 80433->80434 80434->80427 80435->80402 80436->80405 80437->80411 80438->80411 80440 14009acbb 80439->80440 80441 14009aca3 80439->80441 80443 14009b09f 80440->80443 80447 14009ad0a 80440->80447 80549 140091adc 9 API calls _get_daylight 80441->80549 80564 140091adc 9 API calls _get_daylight 80443->80564 80444 14009aca8 80550 140091afc 9 API calls _get_daylight 80444->80550 80449 14009ad13 80447->80449 80451 14009acb0 80447->80451 80456 14009ad41 80447->80456 80448 14009b0a4 80565 140091afc 9 API calls _get_daylight 80448->80565 80551 140091adc 9 API calls _get_daylight 80449->80551 80451->80411 80453 14009ad20 80566 14008d638 66 API calls _invalid_parameter_noinfo 80453->80566 80454 14009ad18 80552 140091afc 9 API calls _get_daylight 80454->80552 80458 14009ad67 80456->80458 80459 14009ada4 80456->80459 80460 14009ad76 80456->80460 80458->80460 80465 14009ad92 80458->80465 80461 14009b570 wcsftime 10 API calls 80459->80461 80553 140091adc 9 API calls _get_daylight 80460->80553 80463 14009adb7 80461->80463 80466 140098bd0 __free_lconv_num 9 API calls 80463->80466 80464 14009ad7b 80554 140091afc 9 API calls _get_daylight 80464->80554 80541 1400a4a34 80465->80541 80469 14009adc1 80466->80469 80472 140098bd0 __free_lconv_num 9 API calls 80469->80472 80471 14009ad82 80555 14008d638 66 API calls _invalid_parameter_noinfo 80471->80555 80475 14009adc8 80472->80475 80473 14009af47 80476 14009af4c ReadFile 80473->80476 80478 14009adeb 80475->80478 80479 14009add0 80475->80479 80480 14009af73 80476->80480 80481 14009b065 GetLastError 80476->80481 80477 14009aed9 GetConsoleMode 80477->80473 80482 14009aeed 80477->80482 80558 14009b344 66 API calls 2 library calls 80478->80558 80556 140091afc 9 API calls _get_daylight 80479->80556 80480->80481 80486 14009af3b 80480->80486 80483 14009af22 80481->80483 80484 14009b070 80481->80484 80482->80476 80488 14009aef7 ReadConsoleW 80482->80488 80499 14009ad8d 80483->80499 80559 140091a70 9 API calls 2 library calls 80483->80559 80562 140091afc 9 API calls _get_daylight 80484->80562 80497 14009afae 80486->80497 80498 14009afd3 80486->80498 80486->80499 80488->80486 80489 14009af1c GetLastError 80488->80489 80489->80483 80491 140098bd0 __free_lconv_num 9 API calls 80491->80451 80492 14009add5 80557 140091adc 9 API calls _get_daylight 80492->80557 80494 14009b075 80563 140091adc 9 API calls _get_daylight 80494->80563 80560 14009a890 68 API calls 3 library calls 80497->80560 80498->80499 80500 14009b053 80498->80500 80499->80491 80561 14009a6b8 67 API calls _fread_nolock 80500->80561 80503 14009b060 80503->80499 80504->80402 80506 14009ab8e 80505->80506 80507 14009aba6 80505->80507 80532 140091adc 9 API calls _get_daylight 80506->80532 80509 14009ac48 80507->80509 80512 14009abde 80507->80512 80538 140091adc 9 API calls _get_daylight 80509->80538 80511 14009ab93 80533 140091afc 9 API calls _get_daylight 80511->80533 80515 14009abfc 80512->80515 80516 14009abe7 80512->80516 80513 14009ac4d 80539 140091afc 9 API calls _get_daylight 80513->80539 80522 14009ac19 80515->80522 80523 14009ac2e 80515->80523 80534 140091adc 9 API calls _get_daylight 80516->80534 80519 14009abf4 80540 14008d638 66 API calls _invalid_parameter_noinfo 80519->80540 80520 14009abec 80535 140091afc 9 API calls _get_daylight 80520->80535 80536 140091afc 9 API calls _get_daylight 80522->80536 80526 14009ac80 _fread_nolock 75 API calls 80523->80526 80529 14009ab9b 80526->80529 80527 14009ac1e 80537 140091adc 9 API calls _get_daylight 80527->80537 80529->80426 80530->80418 80531->80427 80532->80511 80533->80529 80534->80520 80535->80519 80536->80527 80537->80529 80538->80513 80539->80519 80540->80529 80542 1400a4a4a 80541->80542 80543 1400a4a3d 80541->80543 80545 14009aeb9 80542->80545 80568 140091afc 9 API calls _get_daylight 80542->80568 80567 140091afc 9 API calls _get_daylight 80543->80567 80545->80473 80545->80477 80547 1400a4a81 80569 14008d638 66 API calls _invalid_parameter_noinfo 80547->80569 80549->80444 80550->80451 80551->80454 80552->80453 80553->80464 80554->80471 80555->80499 80556->80492 80557->80499 80558->80465 80559->80499 80560->80499 80561->80503 80562->80494 80563->80499 80564->80448 80565->80453 80566->80451 80567->80545 80568->80547 80569->80545 80570 14005f0e0 80571 14002e700 85 API calls 80570->80571 80572 14005f13f 80571->80572 80573 14002e700 85 API calls 80572->80573 80574 14005f9b4 80573->80574 80585 14005fdd6 ISource 80574->80585 80627 14002d0f0 80574->80627 80575 1400a9a30 _Strcoll 3 API calls 80577 14005fe01 80575->80577 80584 14005fabd 80584->80585 80586 14005fe1d 80584->80586 80585->80575 80587 1400444c0 70 API calls 80586->80587 80588 14005fe5a 80587->80588 80589 1400ac058 Concurrency::cancel_current_task 2 API calls 80588->80589 80590 14005fe6d 80589->80590 80657 14002dde0 80590->80657 80628 14002d119 80627->80628 80629 140034b20 70 API calls 80628->80629 80630 14002d1aa 80629->80630 80631 14002cf80 80630->80631 80632 14002cfb0 80631->80632 80663 1400b6430 80632->80663 80635 14002d04a 80646 140061ef0 80635->80646 80637 14002d003 80638 14002d099 80637->80638 80640 14003fae0 70 API calls 80637->80640 80671 14002c140 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 80638->80671 80642 14002d020 80640->80642 80669 1400b64a0 GetLastError GetLastError __std_fs_convert_wide_to_narrow 80642->80669 80644 14002d03f 80644->80635 80670 14002c140 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 80644->80670 80647 140061f16 80646->80647 80648 140063500 71 API calls 80647->80648 80649 14005fa0b 80648->80649 80650 140077400 80649->80650 80677 140076b30 80650->80677 80653 140042160 70 API calls 80654 14007745a 80653->80654 80655 1400a9a30 _Strcoll 3 API calls 80654->80655 80656 1400774dd 80655->80656 80656->80584 80658 14002ddf9 80657->80658 80882 14002d780 73 API calls ISource 80658->80882 80660 14002de30 80661 1400ac058 Concurrency::cancel_current_task 2 API calls 80660->80661 80662 14002de41 80661->80662 80672 1400a1a34 80663->80672 80666 14002cfbc 80666->80635 80666->80638 80668 1400b64a0 GetLastError GetLastError __std_fs_convert_wide_to_narrow 80666->80668 80667 1400b6442 AreFileApisANSI 80667->80666 80668->80637 80669->80644 80673 140095858 _Strcoll 66 API calls 80672->80673 80674 1400a1a3d 80673->80674 80675 140097ae0 _Strcoll 66 API calls 80674->80675 80676 1400a1a56 80675->80676 80676->80666 80676->80667 80678 14002e700 85 API calls 80677->80678 80681 140076b7f memcpy_s 80678->80681 80679 140076bb7 80680 1400772cf 80679->80680 80716 140076bbf 80679->80716 80768 14002de50 73 API calls Concurrency::cancel_current_task 80680->80768 80681->80679 80685 140086c70 129 API calls 80681->80685 80681->80716 80683 1400a9a30 _Strcoll 3 API calls 80684 140077261 80683->80684 80684->80653 80684->80654 80686 140076bfe 80685->80686 80687 140077055 80686->80687 80688 140076c61 80686->80688 80731 1400549e0 80687->80731 80761 140081670 26 API calls 2 library calls 80688->80761 80691 1400772e6 80769 14002c9d0 70 API calls 80691->80769 80696 140076c73 80762 140081880 86 API calls 5 library calls 80696->80762 80697 140077310 80700 1400ac058 Concurrency::cancel_current_task 2 API calls 80697->80700 80698 140077081 80705 1400549e0 72 API calls 80698->80705 80704 140077321 80700->80704 80701 140076c84 80702 140076c97 80701->80702 80703 140076d6c GetFileSize 80701->80703 80702->80691 80706 140076cde ISource 80702->80706 80707 140076dad 80703->80707 80712 140076d88 memcpy_s 80703->80712 80708 1400770ba 80705->80708 80763 140051600 70 API calls 80706->80763 80707->80712 80715 140045780 70 API calls 80707->80715 80750 140085270 80708->80750 80711 140076e12 SetFilePointer ReadFile 80723 140076e61 80711->80723 80725 140076f72 80711->80725 80712->80711 80714 140076d2f 80714->80716 80715->80711 80716->80683 80717 140051cc0 70 API calls 80718 14007714b 80717->80718 80722 14007717d 80718->80722 80727 14007727c 80718->80727 80719 140076ee4 ISource 80764 140051600 70 API calls 80719->80764 80720 140076fc7 ISource 80765 140051600 70 API calls 80720->80765 80766 140051600 70 API calls 80722->80766 80723->80691 80723->80719 80725->80691 80725->80720 80767 14002c9d0 70 API calls 80727->80767 80729 1400772be 80730 1400ac058 Concurrency::cancel_current_task 2 API calls 80729->80730 80730->80680 80732 140054a3d 80731->80732 80734 140054b23 80731->80734 80770 140055300 80732->80770 80790 14002c9d0 70 API calls 80734->80790 80735 140054a62 80740 140054a99 80735->80740 80780 140050bb0 80735->80780 80737 140054af0 80746 140054900 80737->80746 80738 140054b65 80739 1400ac058 Concurrency::cancel_current_task 2 API calls 80738->80739 80739->80740 80740->80737 80791 14002c9d0 70 API calls 80740->80791 80742 140054bbe 80743 1400ac058 Concurrency::cancel_current_task 2 API calls 80742->80743 80744 140054bd2 80743->80744 80747 140054930 80746->80747 80748 140055300 70 API calls 80747->80748 80749 14005493f 80748->80749 80749->80698 80751 1400852cd 80750->80751 80754 1400852e7 80750->80754 80751->80754 80760 140050fb0 70 API calls 80751->80760 80752 14008538a 80755 140085395 ISource 80752->80755 80756 140041450 70 API calls 80752->80756 80754->80752 80865 14008aef0 80754->80865 80757 1400a9a30 _Strcoll 3 API calls 80755->80757 80758 140085459 80755->80758 80756->80755 80759 14007711d 80757->80759 80759->80691 80759->80717 80760->80754 80761->80696 80762->80701 80763->80714 80764->80714 80765->80714 80766->80716 80767->80729 80769->80697 80771 140055340 80770->80771 80775 14005531d 80770->80775 80773 14005534e 80771->80773 80774 140046c80 70 API calls 80771->80774 80772 14005533a 80772->80735 80773->80735 80774->80773 80775->80772 80792 14002c9d0 70 API calls 80775->80792 80777 1400553a3 80778 1400ac058 Concurrency::cancel_current_task 2 API calls 80777->80778 80779 1400553b4 ISource 80778->80779 80779->80735 80781 140050be3 80780->80781 80782 140051ad0 67 API calls 80781->80782 80789 140050c3b 80781->80789 80784 140050c06 80782->80784 80783 1400a9a30 _Strcoll 3 API calls 80785 140050ca9 80783->80785 80787 140050c26 80784->80787 80784->80789 80793 14008d17c 80784->80793 80785->80740 80787->80789 80801 14008c794 80787->80801 80789->80783 80790->80738 80791->80742 80792->80777 80794 14008d1ac 80793->80794 80810 14008cf2c 80794->80810 80796 14008d1c5 80797 14008d1ea 80796->80797 80817 14008b5f8 66 API calls 2 library calls 80796->80817 80799 14008d1ff 80797->80799 80818 14008b5f8 66 API calls 2 library calls 80797->80818 80799->80787 80802 14008c7bd 80801->80802 80803 14008c7a8 80801->80803 80802->80803 80805 14008c7c2 80802->80805 80839 140091afc 9 API calls _get_daylight 80803->80839 80831 14009a5a8 80805->80831 80806 14008c7ad 80840 14008d638 66 API calls _invalid_parameter_noinfo 80806->80840 80809 14008c7b8 80809->80789 80811 14008cf96 80810->80811 80812 14008cf56 80810->80812 80811->80812 80813 14008cf9b 80811->80813 80825 14008d568 66 API calls _invalid_parameter_noinfo 80812->80825 80819 14008d0a4 80813->80819 80815 14008cf7d 80815->80796 80817->80797 80818->80799 80820 14008d0ce 80819->80820 80821 14008d0e3 80819->80821 80820->80815 80826 14008cfc0 80821->80826 80823 14008d0ed 80823->80820 80824 14008bcc0 66 API calls 80823->80824 80824->80820 80825->80815 80827 14008cfda 80826->80827 80829 14008d040 80826->80829 80827->80829 80830 14009b344 66 API calls 2 library calls 80827->80830 80829->80823 80830->80829 80832 14009a5d8 80831->80832 80841 14009a0bc 80832->80841 80834 14009a5f1 80835 14009a617 80834->80835 80847 14008b5f8 66 API calls 2 library calls 80834->80847 80837 14009a62c 80835->80837 80848 14008b5f8 66 API calls 2 library calls 80835->80848 80837->80809 80839->80806 80840->80809 80842 14009a0d7 80841->80842 80843 14009a106 80841->80843 80861 14008d568 66 API calls _invalid_parameter_noinfo 80842->80861 80849 14009a128 80843->80849 80846 14009a0f7 80846->80834 80847->80835 80848->80837 80850 14009a16c 80849->80850 80851 14009a143 80849->80851 80852 140095280 _fread_nolock 66 API calls 80850->80852 80862 14008d568 66 API calls _invalid_parameter_noinfo 80851->80862 80854 14009a171 80852->80854 80855 14009a1fc 80854->80855 80856 14009a1ec 80854->80856 80857 14009a163 80854->80857 80855->80857 80864 14009a274 66 API calls _fread_nolock 80855->80864 80863 14009a3cc 67 API calls 2 library calls 80856->80863 80857->80846 80860 14009a1fa 80860->80857 80861->80846 80862->80857 80863->80860 80864->80857 80876 14008ae20 80865->80876 80867 14008b102 80867->80752 80868 14008b134 80880 14002b5d0 70 API calls 80868->80880 80870 14008b13f 80881 14002b510 70 API calls 2 library calls 80870->80881 80871 14008ae20 70 API calls 80872 14008af2c ISource ctype 80871->80872 80872->80867 80872->80868 80872->80870 80872->80871 80873 1400a9b78 70 API calls std::_Facet_Register 80872->80873 80873->80872 80875 14008b145 80877 14008ae36 80876->80877 80878 14008ae53 80876->80878 80877->80878 80879 140050fb0 70 API calls 80877->80879 80878->80872 80879->80878 80881->80875 80882->80660 80883 14007e91b RegOpenKeyExA 80884 14007e945 RegQueryValueExA 80883->80884 80890 14007e984 ISource 80883->80890 80884->80890 80885 14007ea14 RegCloseKey 80886 14007ea1a 80885->80886 80888 1400a9a30 _Strcoll 3 API calls 80886->80888 80889 14007ea2d 80888->80889 80890->80885 80890->80886 80891 1400881b6 80892 140087d80 80891->80892 80893 14008820e 80892->80893 80894 140088660 70 API calls 80892->80894 80895 140045610 70 API calls 80892->80895 80894->80892 80895->80892

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Object$DeleteMetricsSystem$CreateSelectStream_$CapsCompatibleCriticalDeviceReleaseSection$BitmapEnterLeaveReadResetSizeStream
                                • String ID:
                                • API String ID: 3214587331-3916222277
                                • Opcode ID: d212eff64643cacb1999093992a5ebe4d6820dca1c4ef29053fa3ebfdf322034
                                • Instruction ID: c761e3dcf2ca50607f711692ae3d5fa1a73b19c118fb76df69a1b7be19708792
                                • Opcode Fuzzy Hash: d212eff64643cacb1999093992a5ebe4d6820dca1c4ef29053fa3ebfdf322034
                                • Instruction Fuzzy Hash: 9BB1FB72218BC086E761DB22F85439EB7A5F799BC0F409515EA8E43B69DF3CC085CB50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 40 1400b6780-1400b67c0 41 1400b67c2-1400b67c9 40->41 42 1400b67d5-1400b67de 40->42 41->42 45 1400b67cb-1400b67d0 41->45 43 1400b67fa-1400b67fc 42->43 44 1400b67e0-1400b67e3 42->44 48 1400b6a52 43->48 49 1400b6802-1400b6806 43->49 44->43 47 1400b67e5-1400b67ed 44->47 46 1400b6a54-1400b6a7a call 1400a9a30 45->46 51 1400b67ef-1400b67f1 47->51 52 1400b67f3-1400b67f6 47->52 48->46 53 1400b680c-1400b680f 49->53 54 1400b68dd-1400b6904 call 1400b6b54 49->54 51->43 51->52 52->43 57 1400b6823-1400b6835 GetFileAttributesExW 53->57 58 1400b6811-1400b6819 53->58 64 1400b6926-1400b692f 54->64 65 1400b6906-1400b690f 54->65 61 1400b6888-1400b6897 57->61 62 1400b6837-1400b6840 GetLastError 57->62 58->57 60 1400b681b-1400b681d 58->60 60->54 60->57 63 1400b689b-1400b689d 61->63 62->46 66 1400b6846-1400b6858 FindFirstFileW 62->66 67 1400b68a9-1400b68d7 63->67 68 1400b689f-1400b68a7 63->68 71 1400b69e3-1400b69ec 64->71 72 1400b6935-1400b694d GetFileInformationByHandleEx 64->72 69 1400b691f-1400b6921 65->69 70 1400b6911-1400b6919 CloseHandle 65->70 73 1400b685a-1400b6860 GetLastError 66->73 74 1400b6865-1400b6886 FindClose 66->74 67->48 67->54 68->54 68->67 69->46 70->69 75 1400b6a95-1400b6a9a call 140095228 70->75 76 1400b6a3b-1400b6a3d 71->76 77 1400b69ee-1400b6a02 GetFileInformationByHandleEx 71->77 78 1400b694f-1400b695b GetLastError 72->78 79 1400b6975-1400b698e 72->79 73->46 74->63 100 1400b6a9b-1400b6aa0 call 140095228 75->100 85 1400b6a7b-1400b6a7f 76->85 86 1400b6a3f-1400b6a43 76->86 81 1400b6a04-1400b6a10 GetLastError 77->81 82 1400b6a28-1400b6a38 77->82 83 1400b696e-1400b6970 78->83 84 1400b695d-1400b6968 CloseHandle 78->84 79->71 87 1400b6990-1400b6994 79->87 81->83 93 1400b6a16-1400b6a21 CloseHandle 81->93 82->76 83->46 84->83 94 1400b6aa7-1400b6aaf call 140095228 84->94 90 1400b6a8e-1400b6a93 85->90 91 1400b6a81-1400b6a8c CloseHandle 85->91 86->48 95 1400b6a45-1400b6a50 CloseHandle 86->95 88 1400b69dc 87->88 89 1400b6996-1400b69b0 GetFileInformationByHandleEx 87->89 99 1400b69e0 88->99 96 1400b69d3-1400b69da 89->96 97 1400b69b2-1400b69be GetLastError 89->97 90->46 91->75 91->90 101 1400b6a23 93->101 102 1400b6aa1-1400b6aa6 call 140095228 93->102 95->48 95->75 96->99 97->83 103 1400b69c0-1400b69cb CloseHandle 97->103 99->71 100->102 101->83 102->94 103->100 107 1400b69d1 103->107 107->83
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Close$ErrorFileFindHandleLast$AttributesFirst__std_fs_open_handle
                                • String ID:
                                • API String ID: 2398595512-0
                                • Opcode ID: fac0728d82d401ae17cd6527dfa7cec771f605f4684e4a6118f8e15f273416ac
                                • Instruction ID: 4c555171fdb32269f993dbe320281d8da3589f2165e7780f8660e14b5d5a2af7
                                • Opcode Fuzzy Hash: fac0728d82d401ae17cd6527dfa7cec771f605f4684e4a6118f8e15f273416ac
                                • Instruction Fuzzy Hash: 85917136604E4186EA668FB7A8147EA27A4EB9D7F4F144324BBBA476F4DE3CC4058700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: InformationTimeZone
                                • String ID: %d-%m-%Y, %H:%M:%S$[UTC$computer_name$cpu$gpu$ram$system$time$timezone$user_name
                                • API String ID: 565725191-1610854563
                                • Opcode ID: 5706e5f6b44d1602c0a23a6b8bfe154f2a76095b40e57c506fe9ca51188122be
                                • Instruction ID: f19afbfd6253ee69705efd8f0bb5942488cb11dc7c174a9ff5b99dff500e8289
                                • Opcode Fuzzy Hash: 5706e5f6b44d1602c0a23a6b8bfe154f2a76095b40e57c506fe9ca51188122be
                                • Instruction Fuzzy Hash: BE236C73614BC485EB22CB66E8503DE77A1F799798F405316EB9D07BA9EB78C290C700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Name$DevicesDisplayEnum$ComputerCurrentFileGlobalMemoryModuleProfileStatusUserValuewcsftime
                                • String ID: %d-%m-%Y, %H:%M:%S$computer_name$cpu$gpu$ram$system$time$timezone$user_name
                                • API String ID: 2509368203-1182675529
                                • Opcode ID: a24d453f497ec5ccc222e2942bc6fab3b7197f1e183f1ad2a7c7808663fb3d21
                                • Instruction ID: b9e2a3095aa66bd1602ac9c2c660310c59abd0cb7c4daf2a31422e61ea064eff
                                • Opcode Fuzzy Hash: a24d453f497ec5ccc222e2942bc6fab3b7197f1e183f1ad2a7c7808663fb3d21
                                • Instruction Fuzzy Hash: 75F26D73614BC485DB22CF66E8503DE77A1F799798F409216EB9D17BA9EB38C290C700

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1171 14003b6e0-14003b7df LoadLibraryA 1172 14003b7e5-14003bba0 GetProcAddress * 6 1171->1172 1173 14003c6a0-14003c6aa 1171->1173 1172->1173 1174 14003bba6-14003bba9 1172->1174 1175 14003c6ac-14003c6ae 1173->1175 1176 14003c6b9-14003c6bc 1173->1176 1174->1173 1179 14003bbaf-14003bbb2 1174->1179 1175->1176 1177 14003c6c7-14003c6f6 call 1400a9a30 1176->1177 1178 14003c6be-14003c6c1 FreeLibrary 1176->1178 1178->1177 1179->1173 1182 14003bbb8-14003bbbb 1179->1182 1182->1173 1184 14003bbc1-14003bbc4 1182->1184 1184->1173 1185 14003bbca-14003bbcd 1184->1185 1185->1173 1186 14003bbd3-14003bbe1 1185->1186 1187 14003bbe5-14003bbe7 1186->1187 1187->1173 1188 14003bbed-14003bbf9 1187->1188 1188->1173 1189 14003bbff-14003bc08 1188->1189 1190 14003bc10-14003bc2b 1189->1190 1192 14003bc31-14003bc4f 1190->1192 1193 14003c687-14003c693 1190->1193 1192->1193 1196 14003bc55-14003bc67 1192->1196 1193->1190 1194 14003c699 1193->1194 1194->1173 1197 14003c673-14003c682 1196->1197 1198 14003bc6d 1196->1198 1197->1193 1199 14003bc72-14003bcc3 call 1400a9b78 1198->1199 1204 14003bf42 1199->1204 1205 14003bcc9-14003bcd0 1199->1205 1207 14003bf44-14003bf4b 1204->1207 1205->1204 1206 14003bcd6-14003bdcf call 14006f870 call 140042160 call 140042430 1205->1206 1232 14003bdd0-14003bdd8 1206->1232 1209 14003c1c1-14003c1fd 1207->1209 1210 14003bf51-14003bf58 1207->1210 1218 14003c203-14003c211 1209->1218 1219 14003c497-14003c499 1209->1219 1210->1209 1211 14003bf5e-14003c04b call 14006f870 call 140042160 call 140042430 1210->1211 1244 14003c052-14003c05a 1211->1244 1222 14003c217-14003c21e 1218->1222 1223 14003c490-14003c493 1218->1223 1224 14003c645-14003c65b call 14003e260 1219->1224 1225 14003c49f-14003c5c8 call 1400300a0 call 14003ec00 call 1400300a0 call 14003ec00 call 140040e40 call 1400a9b78 call 140058d40 1219->1225 1222->1223 1230 14003c224-14003c318 call 14006f870 call 140042160 call 140042430 1222->1230 1223->1219 1228 14003c495 1223->1228 1239 14003c661-14003c66c 1224->1239 1240 14003bc70 1224->1240 1315 14003c5d4-14003c5e7 call 1400406d0 1225->1315 1316 14003c5ca-14003c5cc 1225->1316 1228->1219 1261 14003c320-14003c327 1230->1261 1232->1232 1237 14003bdda-14003be34 call 1400300a0 call 140043710 call 140040e40 1232->1237 1268 14003be67-14003be91 1237->1268 1269 14003be36-14003be47 1237->1269 1239->1197 1240->1199 1244->1244 1248 14003c05c-14003c0b5 call 1400300a0 call 140043710 call 140040e40 1244->1248 1287 14003c0e8-14003c112 1248->1287 1288 14003c0b7-14003c0c8 1248->1288 1261->1261 1266 14003c329-14003c382 call 1400300a0 call 140043710 call 140040e40 1261->1266 1326 14003c384-14003c395 1266->1326 1327 14003c3b5-14003c3de 1266->1327 1272 14003be93-14003bea7 1268->1272 1273 14003bec9-14003beef 1268->1273 1275 14003be62 call 1400a9a50 1269->1275 1276 14003be49-14003be5c 1269->1276 1280 14003bec2-14003bec7 call 1400a9a50 1272->1280 1281 14003bea9-14003bebc 1272->1281 1283 14003bef1-14003bf05 1273->1283 1284 14003bf27-14003bf40 1273->1284 1275->1268 1276->1275 1285 14003c751-14003c756 call 14008d658 1276->1285 1280->1273 1281->1280 1292 14003c757-14003c75c call 14008d658 1281->1292 1298 14003bf07-14003bf1a 1283->1298 1299 14003bf20-14003bf25 call 1400a9a50 1283->1299 1284->1207 1285->1292 1295 14003c114-14003c128 1287->1295 1296 14003c14a-14003c170 1287->1296 1289 14003c0e3 call 1400a9a50 1288->1289 1290 14003c0ca-14003c0dd 1288->1290 1289->1287 1290->1289 1300 14003c763-14003c768 call 14008d658 1290->1300 1308 14003c75d-14003c762 call 14008d658 1292->1308 1305 14003c143-14003c148 call 1400a9a50 1295->1305 1306 14003c12a-14003c13d 1295->1306 1310 14003c172-14003c186 1296->1310 1311 14003c1a8-14003c1ba 1296->1311 1298->1299 1298->1308 1299->1284 1317 14003c769-14003c76e call 14008d658 1300->1317 1305->1296 1306->1305 1306->1317 1308->1300 1319 14003c1a1-14003c1a6 call 1400a9a50 1310->1319 1320 14003c188-14003c19b 1310->1320 1311->1209 1339 14003c5eb-14003c5f7 1315->1339 1328 14003c5d2 1316->1328 1329 14003c6fd-14003c74a call 140040890 call 1400443f0 call 1400444c0 call 1400ac058 1316->1329 1332 14003c76f-14003c774 call 14008d658 1317->1332 1319->1311 1320->1319 1320->1332 1336 14003c397-14003c3aa 1326->1336 1337 14003c3b0 call 1400a9a50 1326->1337 1340 14003c414-14003c43a 1327->1340 1341 14003c3e0-14003c3f4 1327->1341 1328->1339 1363 14003c74b-14003c750 call 14008d658 1329->1363 1345 14003c775-14003c77a call 14008d658 1332->1345 1336->1337 1336->1345 1337->1327 1350 14003c5f9-14003c61c 1339->1350 1351 14003c61e-14003c628 call 140049970 1339->1351 1353 14003c43c-14003c450 1340->1353 1354 14003c470-14003c489 1340->1354 1348 14003c3f6-14003c409 1341->1348 1349 14003c40f call 1400a9a50 1341->1349 1348->1349 1356 14003c6f7-14003c6fc call 14008d658 1348->1356 1349->1340 1358 14003c62d-14003c63e call 140040e40 1350->1358 1351->1358 1361 14003c452-14003c465 1353->1361 1362 14003c46b call 1400a9a50 1353->1362 1354->1223 1356->1329 1358->1224 1361->1362 1361->1363 1362->1354 1363->1285
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: AddressProc$Library$FreeLoad
                                • String ID: cannot use push_back() with $system$vault
                                • API String ID: 2449869053-1741236777
                                • Opcode ID: 67fb20d40bc609d5e964c0f0a05f879f6765ac2f20643024e0551a5aa9effece
                                • Instruction ID: 535b6c07042325de8a0606d6e2dee6c2713480c040d512ea1054d7922c1c3a75
                                • Opcode Fuzzy Hash: 67fb20d40bc609d5e964c0f0a05f879f6765ac2f20643024e0551a5aa9effece
                                • Instruction Fuzzy Hash: 71926D72205BC489DB62CF66E8843DE73A4F749798F504216EB9C5BBA9DF34C694C700

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Process$Exit$MutexOpenToken$CloseCreateCurrentFileHandleInformationInitializeModuleName
                                • String ID: SeDebugPrivilege$SeImpersonatePrivilege
                                • API String ID: 4279366119-3768118664
                                • Opcode ID: ea9adccf4266fa564f3c75ff40f6c9aa00d003b5411e4f7f74ef0c39a7a00c1b
                                • Instruction ID: 934be75c379623594f19c2476a79c6af4c698a7c3e3469cdbae4336d1c144a67
                                • Opcode Fuzzy Hash: ea9adccf4266fa564f3c75ff40f6c9aa00d003b5411e4f7f74ef0c39a7a00c1b
                                • Instruction Fuzzy Hash: 1C617D72618B8481FA16AB66B4513EE63A0FB8D7D0F405215FB9D47ABBDF3CC0818B11

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1688 14007cd80-14007cddc 1689 14007cf94-14007cfb8 InternetOpenA 1688->1689 1690 14007cde2-14007cdf5 call 1400a9b00 1688->1690 1691 14007cfdd-14007cff6 1689->1691 1692 14007cfba-14007cfd8 1689->1692 1690->1689 1701 14007cdfb-14007cf5d 1690->1701 1695 14007cff8 1691->1695 1696 14007cffb-14007d028 InternetOpenUrlA 1691->1696 1694 14007d38f-14007d3b8 call 1400a9a30 1692->1694 1695->1696 1699 14007d050-14007d07b HttpQueryInfoW 1696->1699 1700 14007d02a-14007d04b 1696->1700 1705 14007d0ad-14007d108 HttpQueryInfoW 1699->1705 1706 14007d07d-14007d0a8 1699->1706 1704 14007d386 1700->1704 1702 14007cf64-14007cf6c 1701->1702 1702->1702 1707 14007cf6e-14007cf8f call 1400300a0 call 1400a9eac call 1400a9a94 1702->1707 1704->1694 1708 14007d136-14007d14c InternetQueryDataAvailable 1705->1708 1709 14007d10a-14007d120 call 140091940 1705->1709 1706->1704 1707->1689 1713 14007d333-14007d381 InternetCloseHandle 1708->1713 1714 14007d152-14007d157 1708->1714 1709->1708 1719 14007d122-14007d131 call 140044f60 1709->1719 1713->1704 1717 14007d160-14007d166 1714->1717 1717->1713 1720 14007d16c-14007d186 1717->1720 1719->1708 1723 14007d188-14007d18e 1720->1723 1724 14007d1f9-14007d211 InternetReadFile 1720->1724 1729 14007d190-14007d197 1723->1729 1730 14007d1bc-14007d1bf call 1400a9b78 1723->1730 1727 14007d217-14007d21c 1724->1727 1728 14007d2ed-14007d2f4 1724->1728 1727->1728 1732 14007d222-14007d22d 1727->1732 1728->1713 1733 14007d2f6-14007d307 1728->1733 1734 14007d3bf-14007d3c4 call 14002b510 1729->1734 1735 14007d19d-14007d1a8 call 1400a9b78 1729->1735 1736 14007d1c4-14007d1f4 call 1400bd240 1730->1736 1738 14007d25f-14007d279 call 140045930 1732->1738 1739 14007d22f-14007d25d call 1400bcba0 1732->1739 1740 14007d322-14007d32f call 1400a9a50 1733->1740 1741 14007d309-14007d31c 1733->1741 1747 14007d3b9-14007d3be call 14008d658 1735->1747 1750 14007d1ae-14007d1ba 1735->1750 1736->1724 1756 14007d27a-14007d281 1738->1756 1739->1756 1740->1713 1741->1740 1741->1747 1747->1734 1750->1736 1758 14007d2c4 1756->1758 1759 14007d283-14007d294 1756->1759 1762 14007d2c6-14007d2dc InternetQueryDataAvailable 1758->1762 1760 14007d296-14007d2a9 1759->1760 1761 14007d2af-14007d2c2 call 1400a9a50 1759->1761 1760->1747 1760->1761 1761->1762 1762->1713 1764 14007d2de-14007d2e8 1762->1764 1764->1717
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Internet$Query$AvailableDataHttpInfoOpen$AcquireCloseConcurrency::cancel_current_taskExclusiveFileHandleLockRead
                                • String ID:
                                • API String ID: 3609429561-0
                                • Opcode ID: dbfbd13b73a7ea11e21b3859da353f2453185fdcc826e5489a0c25caf29e2933
                                • Instruction ID: 3029d17a66785b724e0495933c7d904ff80b4dac0c59341df4a9ef07d0211fd6
                                • Opcode Fuzzy Hash: dbfbd13b73a7ea11e21b3859da353f2453185fdcc826e5489a0c25caf29e2933
                                • Instruction Fuzzy Hash: E0024B32A14B9486EB11CB6AE84039E77B5F799B94F204216FF8C57BA9DF78C181C740

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1829 140076b30-140076bb5 call 14002e700 1832 140076bb7-140076bb9 1829->1832 1833 140076bc1-140076bc4 1829->1833 1836 1400772d0-1400772e6 call 14002de50 1832->1836 1837 140076bbf 1832->1837 1834 140076bd7-140076bf0 call 1400bd240 1833->1834 1835 140076bc6-140076bd2 1833->1835 1844 140076bf5-140076c5b call 140086c70 1834->1844 1845 140076bf2 1834->1845 1838 14007724f-14007727b call 1400a9a30 1835->1838 1846 1400772e7-1400772ec call 14008d658 1836->1846 1837->1835 1852 140077055-14007708f call 1400549e0 call 140054900 1844->1852 1853 140076c61-140076c69 1844->1853 1845->1844 1854 1400772ed-140077321 call 14002b7e0 call 14002c9d0 call 1400ac058 1846->1854 1869 140077091-1400770a2 call 140044f60 1852->1869 1870 1400770ae-14007713c call 1400549e0 call 140085270 1852->1870 1856 140076c6e-140076c91 call 140081670 call 140081880 1853->1856 1857 140076c6b 1853->1857 1872 140076c97-140076cad 1856->1872 1873 140076d6c-140076d86 GetFileSize 1856->1873 1857->1856 1881 1400770a7 1869->1881 1870->1854 1897 140077142-140077146 call 140051cc0 1870->1897 1877 140076ce3-140076d67 call 140051600 1872->1877 1878 140076caf-140076cc3 1872->1878 1879 140076d88-140076dab 1873->1879 1880 140076dad-140076dc3 1873->1880 1898 14007723b-14007724a call 1400b7afc 1877->1898 1884 140076cc5-140076cd8 1878->1884 1885 140076cde call 1400a9a50 1878->1885 1887 140076e12-140076e5b SetFilePointer ReadFile 1879->1887 1888 140076df5-140076e0d call 140045780 1880->1888 1889 140076dc5-140076df3 call 1400bd240 1880->1889 1881->1870 1884->1846 1884->1885 1885->1877 1891 140076f72-140076f96 1887->1891 1892 140076e61-140076eb3 1887->1892 1888->1887 1889->1887 1907 140076f98-140076fac 1891->1907 1908 140076fcc-140077050 call 140051600 1891->1908 1905 140076eb5-140076ec9 1892->1905 1906 140076ee9-140076f6d call 140051600 1892->1906 1904 14007714b-14007714e 1897->1904 1898->1838 1910 140077150-140077177 1904->1910 1911 14007717d-140077237 call 140051600 1904->1911 1912 140076ee4 call 1400a9a50 1905->1912 1913 140076ecb-140076ede 1905->1913 1906->1898 1915 140076fc7 call 1400a9a50 1907->1915 1916 140076fae-140076fc1 1907->1916 1908->1898 1910->1911 1919 14007727c-14007727f 1910->1919 1911->1898 1912->1906 1913->1846 1913->1912 1915->1908 1916->1846 1916->1915 1924 140077281-140077288 1919->1924 1925 14007728a-14007729b 1919->1925 1926 14007729f-1400772cf call 14002b7e0 call 14002c9d0 call 1400ac058 1924->1926 1925->1926 1926->1836
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: File$PointerReadSize
                                • String ID: exists$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                • API String ID: 404940565-15404121
                                • Opcode ID: b49f10f408cf54b8073f20f732a0948432a703d8e82ef52778e75730b026a32b
                                • Instruction ID: 6a266a4d215d5acaa4205c9aba5ef278ac21c9c5156ce4988b8f4d698187b97a
                                • Opcode Fuzzy Hash: b49f10f408cf54b8073f20f732a0948432a703d8e82ef52778e75730b026a32b
                                • Instruction Fuzzy Hash: 4F320632611BC489EB21DF35D8807DD37A1F789B88F548226EB8D5BBA9EB74C645C700

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1933 14009ac80-14009aca1 1934 14009acbb-14009acbd 1933->1934 1935 14009aca3-14009acb6 call 140091adc call 140091afc 1933->1935 1937 14009b09f-14009b0ac call 140091adc call 140091afc 1934->1937 1938 14009acc3-14009acca 1934->1938 1951 14009b0b7 1935->1951 1957 14009b0b2 call 14008d638 1937->1957 1938->1937 1940 14009acd0-14009ad04 1938->1940 1940->1937 1943 14009ad0a-14009ad11 1940->1943 1946 14009ad2b-14009ad2e 1943->1946 1947 14009ad13-14009ad26 call 140091adc call 140091afc 1943->1947 1949 14009b09b-14009b09d 1946->1949 1950 14009ad34-14009ad36 1946->1950 1947->1957 1954 14009b0ba-14009b0c9 1949->1954 1950->1949 1955 14009ad3c-14009ad3f 1950->1955 1951->1954 1955->1947 1959 14009ad41-14009ad65 1955->1959 1957->1951 1962 14009ad9a-14009ada2 1959->1962 1963 14009ad67-14009ad6a 1959->1963 1964 14009ada4-14009adce call 14009b570 call 140098bd0 * 2 1962->1964 1965 14009ad76-14009ad8d call 140091adc call 140091afc call 14008d638 1962->1965 1966 14009ad6c-14009ad74 1963->1966 1967 14009ad92-14009ad98 1963->1967 1994 14009adeb-14009ae15 call 14009b344 1964->1994 1995 14009add0-14009ade6 call 140091afc call 140091adc 1964->1995 1999 14009af29 1965->1999 1966->1965 1966->1967 1970 14009ae19-14009ae2a 1967->1970 1971 14009ae30-14009ae38 1970->1971 1972 14009aeb1-14009aebb call 1400a4a34 1970->1972 1971->1972 1975 14009ae3a-14009ae3c 1971->1975 1985 14009aec1-14009aed7 1972->1985 1986 14009af47 1972->1986 1975->1972 1979 14009ae3e-14009ae5c 1975->1979 1979->1972 1983 14009ae5e-14009ae6a 1979->1983 1983->1972 1988 14009ae6c-14009ae6e 1983->1988 1985->1986 1991 14009aed9-14009aeeb GetConsoleMode 1985->1991 1990 14009af4c-14009af6d ReadFile 1986->1990 1988->1972 1993 14009ae70-14009ae88 1988->1993 1996 14009af73-14009af7b 1990->1996 1997 14009b065-14009b06e GetLastError 1990->1997 1991->1986 1998 14009aeed-14009aef5 1991->1998 1993->1972 2003 14009ae8a-14009ae96 1993->2003 1994->1970 1995->1999 1996->1997 2005 14009af81 1996->2005 2000 14009b08b-14009b08e 1997->2000 2001 14009b070-14009b086 call 140091afc call 140091adc 1997->2001 1998->1990 2007 14009aef7-14009af1a ReadConsoleW 1998->2007 2002 14009af2c-14009af36 call 140098bd0 1999->2002 2013 14009af22-14009af24 call 140091a70 2000->2013 2014 14009b094-14009b096 2000->2014 2001->1999 2002->1954 2003->1972 2012 14009ae98-14009ae9a 2003->2012 2016 14009af88-14009af9f 2005->2016 2008 14009af1c GetLastError 2007->2008 2009 14009af3b-14009af45 2007->2009 2008->2013 2009->2016 2012->1972 2021 14009ae9c-14009aeac 2012->2021 2013->1999 2014->2002 2016->2002 2023 14009afa1-14009afac 2016->2023 2021->1972 2026 14009afae-14009afc7 call 14009a890 2023->2026 2027 14009afd3-14009afdb 2023->2027 2032 14009afcc-14009afce 2026->2032 2028 14009afdd-14009afef 2027->2028 2029 14009b053-14009b060 call 14009a6b8 2027->2029 2033 14009aff1 2028->2033 2034 14009b046-14009b04e 2028->2034 2029->2032 2032->2002 2037 14009aff7-14009affe 2033->2037 2034->2002 2038 14009b03b-14009b040 2037->2038 2039 14009b000-14009b004 2037->2039 2038->2034 2040 14009b021 2039->2040 2041 14009b006-14009b00d 2039->2041 2043 14009b027-14009b037 2040->2043 2041->2040 2042 14009b00f-14009b013 2041->2042 2042->2040 2044 14009b015-14009b01f 2042->2044 2043->2037 2045 14009b039 2043->2045 2044->2043 2045->2034
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 4d8293ae9f22f5597d74cdc2fcdcb919c76595381469856d4337612cb34eee02
                                • Instruction ID: e66a9197b9e49f6dfc297b1b45ac88affdbe93d9cb16c0411d435ac94863a586
                                • Opcode Fuzzy Hash: 4d8293ae9f22f5597d74cdc2fcdcb919c76595381469856d4337612cb34eee02
                                • Instruction Fuzzy Hash: 8AC1007220468896EB639B6390543EE77A0F78ABE4F454105FB5A077F6CB7CC8A9C341

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                • String ID: Eastern Standard Time$Eastern Summer Time
                                • API String ID: 3458911817-239921721
                                • Opcode ID: 4e844cfee981593521fa925c9a963193729182ac40cf2f9b5ee9636f632d1d2a
                                • Instruction ID: 9069a5a7526ebf58f9b65de34f9c7423cbc9874846cff8cba74a8ba9ff9cfcd9
                                • Opcode Fuzzy Hash: 4e844cfee981593521fa925c9a963193729182ac40cf2f9b5ee9636f632d1d2a
                                • Instruction Fuzzy Hash: 68515E3221468086E722EF27E9917DA77A0F78CBC4F455126FB4987BB6DB38C941CB40

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2123 140086610-140086655 2124 14008665b-140086685 call 1400bd240 2123->2124 2125 140086921-14008695b call 140089f70 call 1400870b0 2123->2125 2130 140086694-1400866cd call 140062cf0 call 1400890a0 call 1400870b0 2124->2130 2131 140086687-140086690 2124->2131 2134 140086960-140086966 2125->2134 2165 1400866d3-140086758 call 1400300a0 call 140062e50 call 1400666f0 call 1400633d0 2130->2165 2166 140086864-14008686b 2130->2166 2131->2130 2137 14008696c-1400869eb call 1400300a0 call 140062e50 call 1400666f0 call 1400633d0 2134->2137 2138 140086af7-140086afb 2134->2138 2189 140086c3b-140086c57 call 140061eb0 call 1400ac058 2137->2189 2190 1400869f1-1400869f9 2137->2190 2140 140086bc9-140086bd0 2138->2140 2141 140086b01-140086b5e call 1400406d0 call 140040e40 2138->2141 2144 140086b9d-140086bc8 call 1400a9a30 2140->2144 2145 140086bd2-140086be7 2140->2145 2141->2144 2167 140086b60-140086b75 2141->2167 2150 140086be9-140086bfc 2145->2150 2151 140086b8c-140086b98 call 1400a9a50 2145->2151 2157 140086bfe 2150->2157 2158 140086c06-140086c0b call 14008d658 2150->2158 2151->2144 2157->2151 2177 140086c0c-140086c28 call 140061eb0 call 1400ac058 2158->2177 2165->2177 2218 14008675e-140086766 2165->2218 2170 14008686d-1400868b3 call 1400406d0 2166->2170 2171 1400868b5-1400868b8 2166->2171 2167->2151 2176 140086b77-140086b8a 2167->2176 2192 140086900-14008690f call 140040e40 2170->2192 2173 1400868ba-1400868fb call 1400406d0 2171->2173 2174 140086910-14008691c call 140062b10 2171->2174 2173->2192 2174->2144 2176->2151 2176->2158 2208 140086c29-140086c2e call 14008d658 2177->2208 2209 140086c58-140086c5d call 14008d658 2189->2209 2197 1400869fb-140086a0c 2190->2197 2198 140086a2c-140086a71 call 1400ab9a0 * 2 2190->2198 2192->2174 2203 140086a0e-140086a21 2197->2203 2204 140086a27 call 1400a9a50 2197->2204 2221 140086a73-140086a85 2198->2221 2222 140086aa5-140086ab8 2198->2222 2203->2204 2203->2209 2204->2198 2226 140086c2f-140086c34 call 14008d658 2208->2226 2225 140086c5e-140086c63 call 14008d658 2209->2225 2223 14008679a-1400867e0 call 1400ab9a0 * 2 2218->2223 2224 140086768-14008677a 2218->2224 2227 140086aa0 call 1400a9a50 2221->2227 2228 140086a87-140086a9a 2221->2228 2229 140086aba-140086acc 2222->2229 2230 140086aec-140086af2 2222->2230 2251 1400867e2-1400867f3 2223->2251 2252 140086813-140086825 2223->2252 2231 14008677c-14008678f 2224->2231 2232 140086795 call 1400a9a50 2224->2232 2245 140086c35-140086c3a call 14008d658 2226->2245 2227->2222 2228->2225 2228->2227 2237 140086ace-140086ae1 2229->2237 2238 140086ae7 call 1400a9a50 2229->2238 2230->2138 2231->2208 2231->2232 2232->2223 2237->2238 2243 140086c00-140086c05 call 14008d658 2237->2243 2238->2230 2243->2158 2245->2189 2254 14008680e call 1400a9a50 2251->2254 2255 1400867f5-140086808 2251->2255 2256 140086859-14008685f 2252->2256 2257 140086827-140086839 2252->2257 2254->2252 2255->2226 2255->2254 2256->2166 2259 14008683b-14008684e 2257->2259 2260 140086854 call 1400a9a50 2257->2260 2259->2245 2259->2260 2260->2256
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: __std_exception_destroy
                                • String ID: value
                                • API String ID: 2453523683-494360628
                                • Opcode ID: 432aff35094455ab5d12ebf4f686fae32b6ab6da6044c98e889633a83685ba87
                                • Instruction ID: 40c051a3d453efa789cd592290869c58a4371fdcae029fe46d21acfc2999a0c6
                                • Opcode Fuzzy Hash: 432aff35094455ab5d12ebf4f686fae32b6ab6da6044c98e889633a83685ba87
                                • Instruction Fuzzy Hash: 43028B33624BC485EB028B76D4403ED6B61F7997E4F505616FBAE53AEADB38C281C700

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2262 14003c780-14003c7f8 CreateToolhelp32Snapshot call 1400bd240 call 14003e090 2267 14003ca11-14003ca2d call 14003dfc0 2262->2267 2268 14003c7fe-14003c814 Process32FirstW 2262->2268 2274 14003ca33-14003cb1a call 140042160 call 140042430 2267->2274 2275 14003cc77-14003cc8c CloseHandle 2267->2275 2268->2267 2269 14003c81a 2268->2269 2271 14003c820-14003c83a call 14006f870 2269->2271 2282 14003c83c 2271->2282 2283 14003c83f-14003c86a call 140048e50 call 140043430 2271->2283 2298 14003cb20-14003cb28 2274->2298 2276 14003ccbe-14003cd12 call 14003cd30 call 1400a9a30 2275->2276 2277 14003cc8e-14003cca2 2275->2277 2280 14003cca4-14003ccb7 2277->2280 2281 14003ccb9 call 1400a9a50 2277->2281 2280->2281 2286 14003cd13-14003cd18 call 14008d658 2280->2286 2281->2276 2282->2283 2302 14003c870-14003c897 2283->2302 2300 14003cd19-14003cd1e call 14008d658 2286->2300 2298->2298 2301 14003cb2a-14003cbcf call 1400300a0 call 14003ec00 2298->2301 2311 14003cd1f-14003cd24 call 14008d658 2300->2311 2318 14003cbd4-14003cbdb 2301->2318 2302->2302 2305 14003c899-14003c8b5 2302->2305 2309 14003c8b7-14003c8c9 2305->2309 2310 14003c8cb-14003c8dd call 1400300a0 2305->2310 2314 14003c8e2-14003c95b call 140048e50 call 140043430 call 140041b80 call 140046de0 call 140046c80 2309->2314 2310->2314 2320 14003cd25-14003cd2a call 14008d658 2311->2320 2342 14003c98f-14003c9ad 2314->2342 2343 14003c95d-14003c96f 2314->2343 2318->2318 2321 14003cbdd-14003cc33 call 1400300a0 call 14003ec00 call 140040e40 2318->2321 2337 14003cc66-14003cc73 2321->2337 2338 14003cc35-14003cc46 2321->2338 2337->2275 2340 14003cc61 call 1400a9a50 2338->2340 2341 14003cc48-14003cc5b 2338->2341 2340->2337 2341->2300 2341->2340 2347 14003c9e3-14003ca0b Process32NextW 2342->2347 2348 14003c9af-14003c9c3 2342->2348 2345 14003c971-14003c984 2343->2345 2346 14003c98a call 1400a9a50 2343->2346 2345->2311 2345->2346 2346->2342 2347->2267 2347->2271 2349 14003c9c5-14003c9d8 2348->2349 2350 14003c9de call 1400a9a50 2348->2350 2349->2320 2349->2350 2350->2347
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                • String ID: [PID:
                                • API String ID: 420147892-2210602247
                                • Opcode ID: 142cd923d8e1db6475d1b13c17b16669045c4546525b061bf1a4bec42dd3539f
                                • Instruction ID: 543c1ae47af1575e82cb81e75552ea585bb0cca8fb578dddf2a96ea3aa24745b
                                • Opcode Fuzzy Hash: 142cd923d8e1db6475d1b13c17b16669045c4546525b061bf1a4bec42dd3539f
                                • Instruction Fuzzy Hash: 52E19E72614BC485EB22DB26E8843DE77A1F7897A8F505215FB9D47BA9DF38C290C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: ProcessToken$AdjustCloseCurrentHandleLookupOpenPrivilegePrivilegesValue
                                • String ID:
                                • API String ID: 3038321057-0
                                • Opcode ID: 2b7707f386e536716065defbee947cde64a60e4a18e9853ec8f3d8902209bb5d
                                • Instruction ID: 6de46ed52ba7d7cb8401f60b49647101088c40efb7aee6d2928c38d29ee30ce6
                                • Opcode Fuzzy Hash: 2b7707f386e536716065defbee947cde64a60e4a18e9853ec8f3d8902209bb5d
                                • Instruction Fuzzy Hash: E2214832218B8092E7618B22F44439EB7A0FB8CBD4F559126FB8947B68DF7DC5558B40
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: recv$Cleanupclosesocket
                                • String ID:
                                • API String ID: 146070474-0
                                • Opcode ID: 67acad71df19ebe51cd8ae3a9cdddeddadc0ebf3f9dede90a9e16a1a429c1b3f
                                • Instruction ID: f407d13343cff1ae215ffc5d9839f8494f44057dd466eefff5e1905a477beef5
                                • Opcode Fuzzy Hash: 67acad71df19ebe51cd8ae3a9cdddeddadc0ebf3f9dede90a9e16a1a429c1b3f
                                • Instruction Fuzzy Hash: DE127B72618BC481EA229B16E4447DEA761F79D7E0F505216FBAD07AEADF7CC480CB00
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Cred$EnumerateFree
                                • String ID: cannot use push_back() with
                                • API String ID: 3403564193-4122110429
                                • Opcode ID: 1864a17b870cac0eca4980edb2f86cdca46595ff94a30cda55d04bcc751a648d
                                • Instruction ID: 317d4487182a9a7df5130aa327217d9a1a1f05098988daea6262c9696d6e6e69
                                • Opcode Fuzzy Hash: 1864a17b870cac0eca4980edb2f86cdca46595ff94a30cda55d04bcc751a648d
                                • Instruction Fuzzy Hash: 14625172614BC489EB22CF65E8803DE7761F789798F505316EBAD17BA9DB38C294C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: ExecuteFileModuleNameShell
                                • String ID:
                                • API String ID: 1703432166-0
                                • Opcode ID: 84cdef99f10eb16fc2101d40e68c27580cf72ad7793b9300f0d258b433cfa6cc
                                • Instruction ID: 11ba445dd14254953022699e21d7a2e373c1e9d01dd83dc4c40377bb2d7534f0
                                • Opcode Fuzzy Hash: 84cdef99f10eb16fc2101d40e68c27580cf72ad7793b9300f0d258b433cfa6cc
                                • Instruction Fuzzy Hash: 45121632625F848ADB418F2AE88179EB3A4F788794F505215FFDD57B68EB38C190C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: CryptDataFreeLocalUnprotect
                                • String ID:
                                • API String ID: 1561624719-0
                                • Opcode ID: 18756fe114b58166e112b23e4a63fdcb86c67aa2f41ad9783cf6d16d7dcacca7
                                • Instruction ID: 873a14662c3c813e27aea882096f0e286e411631dc22a23aca4a5841f0c88906
                                • Opcode Fuzzy Hash: 18756fe114b58166e112b23e4a63fdcb86c67aa2f41ad9783cf6d16d7dcacca7
                                • Instruction Fuzzy Hash: 70415232618B80CAE3218F71E8503ED37A5F75878CF444629AB8C07E9ADB79C2A4C744
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: 52415b4c9ca7df9c638af8cbd33fdd6586cec55d09137bf87cd5dcbd740ea69d
                                • Instruction ID: 6582c7848d4419c196cd45f73649770a42aee45a7f840da9ad07b44588067aa7
                                • Opcode Fuzzy Hash: 52415b4c9ca7df9c638af8cbd33fdd6586cec55d09137bf87cd5dcbd740ea69d
                                • Instruction Fuzzy Hash: 06016D3221878186E762DF22F84039AB3A4F79C788F540226BB8D43669DBBCC194CB40

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 677 140076700-14007673b call 140076480 680 14007673d-14007674c EnterCriticalSection 677->680 681 14007677c 677->681 682 1400767a0-1400767ba LeaveCriticalSection GdipGetImageEncodersSize 680->682 683 14007674e-140076770 GdiplusStartup 680->683 684 140076781-14007679f call 1400a9a30 681->684 682->681 685 1400767bc-1400767cf 682->685 683->682 686 140076772-140076776 LeaveCriticalSection 683->686 688 1400767d1-1400767da call 140076210 685->688 689 14007680b-140076819 call 14009408c 685->689 686->681 695 140076808 688->695 696 1400767dc-1400767e6 688->696 697 140076820-14007682a 689->697 698 14007681b-14007681e 689->698 695->689 699 1400767e8 696->699 700 1400767f2-140076806 call 1400aa6f0 696->700 701 14007682e 697->701 698->701 699->700 702 140076831-140076834 700->702 701->702 704 140076836-14007683b 702->704 705 140076840-14007684e GdipGetImageEncoders 702->705 707 1400769ae-1400769b1 704->707 708 140076854-14007685d 705->708 709 140076999-14007699e 705->709 712 1400769d4-1400769d6 707->712 713 1400769b3-1400769b7 707->713 710 14007688f 708->710 711 14007685f-14007686d 708->711 709->707 716 140076896-1400768a6 710->716 714 140076870-14007687b 711->714 712->684 715 1400769c0-1400769d2 call 14008ca40 713->715 717 140076888-14007688d 714->717 718 14007687d-140076882 714->718 715->712 720 1400768a8-1400768b9 716->720 721 1400768bf-1400768db 716->721 717->710 717->714 718->717 722 14007693d-140076941 718->722 720->709 720->721 724 140076948-140076987 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 721->724 725 1400768dd-140076936 GdipCreateBitmapFromScan0 GdipSaveImageToStream 721->725 722->716 726 1400769a0-1400769ad GdipDisposeImage 724->726 727 140076989 724->727 728 140076938-14007693b 725->728 729 140076946 725->729 726->707 730 14007698c-140076993 GdipDisposeImage 727->730 728->730 729->726 730->709
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Gdip$Image$CriticalSection$DisposeEncodersLeave$BitmapCreateEnterErrorFromGdiplusInitializeLastSaveScan0SizeStartupStream
                                • String ID: &
                                • API String ID: 1703174404-3042966939
                                • Opcode ID: 358e588af60fe387fe9b4ba1d174742ca31f0a37a50e745b7da2721fb6c209c1
                                • Instruction ID: 54d8ac4dbd22dc960eb085a9fb90d560ef2c64957ae40f642de95e25eafbcb97
                                • Opcode Fuzzy Hash: 358e588af60fe387fe9b4ba1d174742ca31f0a37a50e745b7da2721fb6c209c1
                                • Instruction Fuzzy Hash: C1913C32600B418AEB52DF32E8407D937A4F79CBD8F558215EB4A57BA4DF38C596C340

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1378 1400777b0-140077807 call 14007d3d0 1381 14007784d-140077931 call 140052130 call 1400300a0 call 14003ec00 call 1400300a0 call 14003ec00 call 140040e40 WSAStartup 1378->1381 1382 140077809-140077811 1378->1382 1395 1400779d0 1381->1395 1414 140077937-140077957 socket 1381->1414 1384 140077815-14007781d 1382->1384 1385 140077822-140077832 1384->1385 1386 14007781f 1384->1386 1388 140077844-14007784b 1385->1388 1389 140077834-14007783e call 1400bd5e0 1385->1389 1386->1385 1388->1381 1388->1384 1389->1388 1389->1395 1397 1400779d2-1400779da 1395->1397 1399 140077a0d-140077a51 call 1400a9a30 1397->1399 1400 1400779dc-1400779ed 1397->1400 1402 140077a08 call 1400a9a50 1400->1402 1403 1400779ef-140077a02 1400->1403 1402->1399 1403->1402 1407 140077b54-140077b59 call 14008d658 1403->1407 1415 140077b5a-140077b5f call 14008d658 1407->1415 1416 1400779ca WSACleanup 1414->1416 1417 140077959-1400779b7 htons inet_pton connect 1414->1417 1416->1395 1419 140077a52-140077a83 call 1400769e0 call 14003f9d0 1417->1419 1420 1400779bd-1400779c4 closesocket 1417->1420 1426 140077a85-140077a9b 1419->1426 1427 140077abb-140077ad8 call 1400769e0 1419->1427 1420->1416 1428 140077ab6 call 1400a9a50 1426->1428 1429 140077a9d-140077ab0 1426->1429 1432 140077add-140077b01 call 14003f9d0 1427->1432 1428->1427 1429->1415 1429->1428 1435 140077b03-140077b19 1432->1435 1436 140077b3d-140077b49 1432->1436 1437 140077b30-140077b35 call 1400a9a50 1435->1437 1438 140077b1b-140077b2e 1435->1438 1436->1397 1437->1436 1438->1437 1439 140077b4e-140077b53 call 14008d658 1438->1439 1439->1407
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Info$CleanupFolderFreeKnownPathStartupTaskUserclosesocketconnecthtonsinet_ptonsocket
                                • String ID: geo$system
                                • API String ID: 469733038-2364779556
                                • Opcode ID: 8b9b473d5a4837d82b1860b41b8f4eef4e0d25caa3796aee1d11ae681c698360
                                • Instruction ID: 7c7329f7b1d46f12d107bb233c4f25c9d5ed07d2676295853f9ffbe0a9706ae6
                                • Opcode Fuzzy Hash: 8b9b473d5a4837d82b1860b41b8f4eef4e0d25caa3796aee1d11ae681c698360
                                • Instruction Fuzzy Hash: ACB17C72B11B4089FB02DBA6E4903DC3372E758BE8F415216EB6D276B9DE38C556C340

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1766 1400bc1a8-1400bc21b call 1400bbd88 1769 1400bc21d-1400bc226 call 140091adc 1766->1769 1770 1400bc235-1400bc23f call 1400a06fc 1766->1770 1777 1400bc229-1400bc230 call 140091afc 1769->1777 1775 1400bc25a-1400bc2c3 CreateFileW 1770->1775 1776 1400bc241-1400bc258 call 140091adc call 140091afc 1770->1776 1779 1400bc340-1400bc34b GetFileType 1775->1779 1780 1400bc2c5-1400bc2cb 1775->1780 1776->1777 1793 1400bc577-1400bc597 1777->1793 1786 1400bc39e-1400bc3a5 1779->1786 1787 1400bc34d-1400bc388 GetLastError call 140091a70 CloseHandle 1779->1787 1783 1400bc30d-1400bc33b GetLastError call 140091a70 1780->1783 1784 1400bc2cd-1400bc2d1 1780->1784 1783->1777 1784->1783 1791 1400bc2d3-1400bc30b CreateFileW 1784->1791 1789 1400bc3ad-1400bc3b0 1786->1789 1790 1400bc3a7-1400bc3ab 1786->1790 1787->1777 1800 1400bc38e-1400bc399 call 140091afc 1787->1800 1796 1400bc3b6-1400bc40b call 1400a0614 1789->1796 1797 1400bc3b2 1789->1797 1790->1796 1791->1779 1791->1783 1805 1400bc42a-1400bc45b call 1400bbb10 1796->1805 1806 1400bc40d-1400bc419 call 1400bbf94 1796->1806 1797->1796 1800->1777 1811 1400bc45d-1400bc45f 1805->1811 1812 1400bc461-1400bc4a4 1805->1812 1806->1805 1813 1400bc41b 1806->1813 1814 1400bc41d-1400bc425 call 140098d48 1811->1814 1815 1400bc4c6-1400bc4d1 1812->1815 1816 1400bc4a6-1400bc4aa 1812->1816 1813->1814 1814->1793 1818 1400bc4d7-1400bc4db 1815->1818 1819 1400bc575 1815->1819 1816->1815 1817 1400bc4ac-1400bc4c1 1816->1817 1817->1815 1818->1819 1822 1400bc4e1-1400bc526 CloseHandle CreateFileW 1818->1822 1819->1793 1823 1400bc55b-1400bc570 1822->1823 1824 1400bc528-1400bc556 GetLastError call 140091a70 call 1400a083c 1822->1824 1823->1819 1824->1823
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                                • String ID:
                                • API String ID: 1330151763-0
                                • Opcode ID: 753a868522920c13805243186adf8c4e2374246b5d7d68e956884b52a4ec5eaf
                                • Instruction ID: df724e996bf74a73b2ecd8b47eed1057070da7b5f500da81edbc3815030807dd
                                • Opcode Fuzzy Hash: 753a868522920c13805243186adf8c4e2374246b5d7d68e956884b52a4ec5eaf
                                • Instruction Fuzzy Hash: A4C18D36720A4486EB12CFAAD4917ED3771E78DBE8F015215EB2A9B7E4CB34C556C340

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: CriticalSection$EnterLeave$DeleteGdiplusObjectShutdown
                                • String ID:
                                • API String ID: 4268643673-0
                                • Opcode ID: 77912509c6f337dc7d8ec125c4cf1fa201effe9473ecc654b93c865c04cae22e
                                • Instruction ID: 8f8e3ab57aafae9fa0c44c134ec2e5ace7f3b90b3fb38e10477330c877be6374
                                • Opcode Fuzzy Hash: 77912509c6f337dc7d8ec125c4cf1fa201effe9473ecc654b93c865c04cae22e
                                • Instruction Fuzzy Hash: B711F832112B5081EB519F26F89439D73A4FB48FA8F684215EB6E076B4DF39C997C350
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                • String ID:
                                • API String ID: 215268677-0
                                • Opcode ID: 00b0df4dc7f9694baae5005e156e817c13b0319292be5f7fe7feab606ef2cbc6
                                • Instruction ID: e251ca9ee9b19143fdc28a295a5a21afa9212cdef8e06ded5e80fd261c009666
                                • Opcode Fuzzy Hash: 00b0df4dc7f9694baae5005e156e817c13b0319292be5f7fe7feab606ef2cbc6
                                • Instruction Fuzzy Hash: E411E932218B8086E7519F16F84078BB6A0FB88BC0F549126FB9D57B68CF3CC556CB40
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Cleanupclosesocketrecv
                                • String ID:
                                • API String ID: 3447645871-0
                                • Opcode ID: a677aa6526d52f58164388ec3fdd38fb54d2159b5e6819c85613790274bae36f
                                • Instruction ID: 41c5684b3dace45f81b32348e7e9067f3d0d19d94502cff9decf575b6d30c7f1
                                • Opcode Fuzzy Hash: a677aa6526d52f58164388ec3fdd38fb54d2159b5e6819c85613790274bae36f
                                • Instruction Fuzzy Hash: 6E917F73A14BC481EA22CB26E4447DE6761E7997E0F505316EBAD07AEADF7CC481C740
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: CloseEnumOpen
                                • String ID:
                                • API String ID: 1332880857-0
                                • Opcode ID: 4f99731cfaa9b943471568a948d662e665ccdb5f0871fe36ab587b1e6d483eb7
                                • Instruction ID: 42d7a9f722af6103cc879de361e797e2247a4f750486cd97bab3717875c1bf13
                                • Opcode Fuzzy Hash: 4f99731cfaa9b943471568a948d662e665ccdb5f0871fe36ab587b1e6d483eb7
                                • Instruction Fuzzy Hash: 20718D72A04B8485EB21CB66E44439EB761F7997E8F104316FBAD17AE9DB78D4C1C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: EnumOpen
                                • String ID:
                                • API String ID: 3231578192-0
                                • Opcode ID: 46bd58a12b008dc4fb39d495499ba587134d0b1724cd67ac3c87297145181dbc
                                • Instruction ID: dd1ce02d20620aeea316ecbb8d9834f8feed39daa1cb3e2fdaa5b0edd2f75d84
                                • Opcode Fuzzy Hash: 46bd58a12b008dc4fb39d495499ba587134d0b1724cd67ac3c87297145181dbc
                                • Instruction Fuzzy Hash: 8F315C32611B8586E722CBA2E85479E77A4F788798F604216EF9917A64DF38C592C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: 0a46b1652e2b08d48d0e6dea534822a758205615231c0f490cf0df5ec8ba0322
                                • Instruction ID: b9c17589a7c69ae175bdbf0880ed7a2a362000434427c19a8a3682823404ca15
                                • Opcode Fuzzy Hash: 0a46b1652e2b08d48d0e6dea534822a758205615231c0f490cf0df5ec8ba0322
                                • Instruction Fuzzy Hash: 8C218472715BC481EA518B26E4503AEA760F7DD7D4F505212FB8D43AB9EE3CC084CB40
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Info$User
                                • String ID:
                                • API String ID: 2017065092-0
                                • Opcode ID: eff57a31dd390740acec67971f514cd0a98d129192d656519c06aa52eb4ab1bf
                                • Instruction ID: 985ca9368a60d1c983616f1c26af2aaf6d0aaa99dd4a8e9c06da54f9f73d072e
                                • Opcode Fuzzy Hash: eff57a31dd390740acec67971f514cd0a98d129192d656519c06aa52eb4ab1bf
                                • Instruction Fuzzy Hash: DB119D72614B8183E7118F62F45475EB7A1FB94BC8F045225EB8903B69DF7CD490CB84
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID:
                                • API String ID: 118556049-3916222277
                                • Opcode ID: 14adb9188745a0eb55025849a16a4a6f16f804bdfb3dbea74f194ca0d799a2ec
                                • Instruction ID: c9a4cc12e588ea41b4af3288d2b98ff64d36375d61920446b71fc5dfaa69309d
                                • Opcode Fuzzy Hash: 14adb9188745a0eb55025849a16a4a6f16f804bdfb3dbea74f194ca0d799a2ec
                                • Instruction Fuzzy Hash: 28513676304B4496EB168F2AD5943AE33A0F788BD4F984622EF5D43BA5CF78D5A1D300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID: cannot use operator[] with a numeric argument with
                                • API String ID: 118556049-485864652
                                • Opcode ID: c9011d7d9fad354859173e632fcf9d1f0852c6eb0fc6f6413100ace60f3e9c16
                                • Instruction ID: 07664c75f5100bd845ce14f87bd1fa582affa661629aaadab39adbd3ef6eb26d
                                • Opcode Fuzzy Hash: c9011d7d9fad354859173e632fcf9d1f0852c6eb0fc6f6413100ace60f3e9c16
                                • Instruction Fuzzy Hash: 5431D272305B8085EE12AB17B5443DD6365A70CBE5F990635BF6D0B7E6DE38C481C304
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: CurrentProfile
                                • String ID: Unknown
                                • API String ID: 2104809126-1654365787
                                • Opcode ID: cb6c1058ad2a36a769174fb096febf5b7ec6d3bbd2b7e1a3a8ca259afe23406b
                                • Instruction ID: d384ca6087cfe21c8346814f25f03d85b6a317e5be2dc90e170939f5b715d1af
                                • Opcode Fuzzy Hash: cb6c1058ad2a36a769174fb096febf5b7ec6d3bbd2b7e1a3a8ca259afe23406b
                                • Instruction Fuzzy Hash: BD31AF33628BC086E7118B22E5403DAA760F79DB84F546215FBC917A6ADB7CC695CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: FolderFreeKnownPathTask
                                • String ID:
                                • API String ID: 969438705-0
                                • Opcode ID: 6d79bdde875dd07f2ffd806efdef9561ccdddca68267246a4708dfdcec93f9e3
                                • Instruction ID: c24a2b477f3dd54952fba79d28766ac4886fad9f90b6e9905c03ad4d2c94c72d
                                • Opcode Fuzzy Hash: 6d79bdde875dd07f2ffd806efdef9561ccdddca68267246a4708dfdcec93f9e3
                                • Instruction Fuzzy Hash: 15317372A14B8481E621DF2AE44039EB761F79D7F4F105316FBAD13AA9DB7CC1818B40
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 2a2f035bad3878c266e9f348a7d24f62ad09782a769adccf4134d448c9e1ca80
                                • Instruction ID: f34595190bd11b1bb0484c3f2cb1f0762e4c01be78061c132d5b2c2473619775
                                • Opcode Fuzzy Hash: 2a2f035bad3878c266e9f348a7d24f62ad09782a769adccf4134d448c9e1ca80
                                • Instruction Fuzzy Hash: 3521913362164491EE56EB26E491BED3360F79EBD4F940221F71A473F2EA39C619C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: CloseCreateCredEnumerateFirstHandleMutexProcess32ReleaseSnapshotToolhelp32recv
                                • String ID:
                                • API String ID: 420082584-0
                                • Opcode ID: 01d168897def731aa6e3a000f5dd337d6a2df32601c2afb7a96eab15f04a0c2e
                                • Instruction ID: d05bbe10d27b05fc77d4a56d16fa938ee2bab4b8980277f65d8ec217585f9c4e
                                • Opcode Fuzzy Hash: 01d168897def731aa6e3a000f5dd337d6a2df32601c2afb7a96eab15f04a0c2e
                                • Instruction Fuzzy Hash: AF219D7161428081FA6377B7A4063DE6341AF8E7D1F405211FB99435F79F3C80818622
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: ErrorFileLastPointer
                                • String ID:
                                • API String ID: 2976181284-0
                                • Opcode ID: cfbe0d5e6ab2a672f5326b19d912b385c2835b425c006a976bdb9443a511856b
                                • Instruction ID: eb1a70d1cd2abdfdf18c43143c0d078d39b75a1bbcf7aae935b1773092e18f07
                                • Opcode Fuzzy Hash: cfbe0d5e6ab2a672f5326b19d912b385c2835b425c006a976bdb9443a511856b
                                • Instruction Fuzzy Hash: F7119A72304B8081DA618B26B9443ADA361E789FF4F984325FFBA4B7F9CE78C4518740
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: CloseHandleMutexRelease
                                • String ID:
                                • API String ID: 4207627910-0
                                • Opcode ID: 0a8c6313884733dc564379ca84631e621affa6c724ffc66aa4246c7b20b94efc
                                • Instruction ID: fcf9d4bad52eab2ac32dfb73c78c87cce2bd7604f036ba043638c5741b38055f
                                • Opcode Fuzzy Hash: 0a8c6313884733dc564379ca84631e621affa6c724ffc66aa4246c7b20b94efc
                                • Instruction Fuzzy Hash: 3C012172B1468182FB56AB6AB4053DD6350AB9DBE0F445211BB9D476F6DF7CC0828601
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                • String ID:
                                • API String ID: 1173176844-0
                                • Opcode ID: 6ffe177f5157f79d277372c6ea1b39799971d2e5a1b5546f7eb344a9914ef09c
                                • Instruction ID: 6a882cecba2f0b7d9baf0c1997fcca67b59b46383f8a5ba7f78fe763666bc857
                                • Opcode Fuzzy Hash: 6ffe177f5157f79d277372c6ea1b39799971d2e5a1b5546f7eb344a9914ef09c
                                • Instruction Fuzzy Hash: EEE0E23072210942FB6B26E32A163E511844BAD3F0E2C1B207B790B6E2AB3488D18920
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 485612231-0
                                • Opcode ID: 1accfea67cdd21986d9efcea98fc74e52ea19ea372fa65de8421b8aa35d71a2a
                                • Instruction ID: 790c9cd93a0b713413afca841f51c08b2edae0917a8305d2c09eb598c9dbecb7
                                • Opcode Fuzzy Hash: 1accfea67cdd21986d9efcea98fc74e52ea19ea372fa65de8421b8aa35d71a2a
                                • Instruction Fuzzy Hash: DCE05BB5B5260182FF2B6BF368557ED02955F9D7C1F440420BF1953371ED388C864714
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID:
                                • API String ID: 118556049-0
                                • Opcode ID: d42e9d67ba9dda84cdc07bb7a948a1b0668744bb267f6826ad1e579085825889
                                • Instruction ID: d6d58eced71b88c6c8daf10a01f1c34b978f624362899ecfb8a5205fbc48a356
                                • Opcode Fuzzy Hash: d42e9d67ba9dda84cdc07bb7a948a1b0668744bb267f6826ad1e579085825889
                                • Instruction Fuzzy Hash: D4618B73301A8485EA269F17D1543AE67A1F709FD8F548621EF6D0B7E6DE39CA86C300
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: __std_fs_directory_iterator_open
                                • String ID:
                                • API String ID: 4007087469-0
                                • Opcode ID: f13adafbf05f298fb05c240c22b120799180002ce19dcd5bad98c2d158ff10dc
                                • Instruction ID: 9e6d60340c6006ea336a3fa614cd808e5e5ad22797c23cbf1a593420299ee011
                                • Opcode Fuzzy Hash: f13adafbf05f298fb05c240c22b120799180002ce19dcd5bad98c2d158ff10dc
                                • Instruction Fuzzy Hash: 8A619072B50B8485EB12DFAAD4903DD23A1E74C7E8F40562AFF1957AE9DA74C8928340
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID:
                                • API String ID: 118556049-0
                                • Opcode ID: abca537383b5ec5d416665d4516e486c91a71911ac11bea2ee59148cfcac8691
                                • Instruction ID: aab651806a49d158eeef3b7a05e9f87a84898afd1d08cfe48f9b7d1d35d784f2
                                • Opcode Fuzzy Hash: abca537383b5ec5d416665d4516e486c91a71911ac11bea2ee59148cfcac8691
                                • Instruction Fuzzy Hash: 1C41BB72315B8481EE12AF13A1443DD6362F74DBD5F59462AEFAE0B7A6EF38C4818304
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID:
                                • API String ID: 118556049-0
                                • Opcode ID: 6d7032a10d32d82ee0d59bc810b207fc49dfb3c140a00b8c9aea0689fee25a69
                                • Instruction ID: 512535f010b9d5ae8951b9984e285ac8eb6a52971a4c7126c558556d77615bc9
                                • Opcode Fuzzy Hash: 6d7032a10d32d82ee0d59bc810b207fc49dfb3c140a00b8c9aea0689fee25a69
                                • Instruction Fuzzy Hash: 7E416176315B8481DA25DB66E5543AEB3A2F74DBD0F644A26BFAD07BA5DF39C040C300
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: InformationVolume
                                • String ID:
                                • API String ID: 2039140958-0
                                • Opcode ID: 59b1b2dc021690f29ff1adf7fe0950669b25c86177543ebafd4068a053effeab
                                • Instruction ID: 8c3407fd8a6d029249ea15150631626afb0bd6f16a7ca74dd13ecfd95f12c210
                                • Opcode Fuzzy Hash: 59b1b2dc021690f29ff1adf7fe0950669b25c86177543ebafd4068a053effeab
                                • Instruction Fuzzy Hash: 16519E32A14B808AE712CF69E8403DD7770F798788F504216EB8C57AA9DF78C685CB40
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: ffb60abcc7d805805bbbb6e3c8eb0595d1e36488306bed0171541e42b1ddf4f3
                                • Instruction ID: 9fbaa5e4fb57bcc170b1f55c51ddee327d9a17fad684bf4da9b59787efee6265
                                • Opcode Fuzzy Hash: ffb60abcc7d805805bbbb6e3c8eb0595d1e36488306bed0171541e42b1ddf4f3
                                • Instruction Fuzzy Hash: CB41CB3220160487EA7A9B6FE5803E977A0F79ABD0F140201FB9A877F1DB38C442C741
                                APIs
                                • Concurrency::cancel_current_task.LIBCPMT ref: 000000014003FD78
                                  • Part of subcall function 000000014002B510: __std_exception_copy.LIBVCRUNTIME ref: 000000014002B558
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task__std_exception_copy
                                • String ID:
                                • API String ID: 317858897-0
                                • Opcode ID: f963baeed23c76e2403023d3bb9c1a63123fa01d9368323ef353fb6ec911463a
                                • Instruction ID: 690cedcfc4ee262b6ef760f99a8dc8a89f6e70b6b68083a452b48f8b6fcf2cfc
                                • Opcode Fuzzy Hash: f963baeed23c76e2403023d3bb9c1a63123fa01d9368323ef353fb6ec911463a
                                • Instruction Fuzzy Hash: 9421C332711B4441EA1BAB56A2443F96391AB48BE4F244721AB7C0BBE2EE78C5D29340
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID:
                                • API String ID: 118556049-0
                                • Opcode ID: 6643d297a41aaac816b7a16b8b42f4a3746ebca0d5da8370e3e32a66f5a322ba
                                • Instruction ID: d2f646ea3797fb6b7b3fcd726ef3aa4ca6dee8541d64d257c5e58883647cd415
                                • Opcode Fuzzy Hash: 6643d297a41aaac816b7a16b8b42f4a3746ebca0d5da8370e3e32a66f5a322ba
                                • Instruction Fuzzy Hash: EF21F472312A6484FE17AB52E1543EC2651A7CCBD4F550622BB2F0BBE6EE38C4908348
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 294c853aa37f5a5617f97abcb6e76066dc0e8fa578696287dd77497f0a990e96
                                • Instruction ID: 2011f515ef95bed98ffbd87fff3cc5c1b1dd8e5a7b900fba54d7e04fdfb142bd
                                • Opcode Fuzzy Hash: 294c853aa37f5a5617f97abcb6e76066dc0e8fa578696287dd77497f0a990e96
                                • Instruction Fuzzy Hash: 8031BF72200A048AE703AB1798813EC3A91A79DBE4F910209FB25073F2CBBCC8818752
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 7c895007b33088ccfaf1e6f628ab4e06c51e84b9704ffe395df2c2cc19cee228
                                • Instruction ID: 7c4d815f048383e7f19acdc8bcd540e6f9058b3da980295672d02bf6c5b866d8
                                • Opcode Fuzzy Hash: 7c895007b33088ccfaf1e6f628ab4e06c51e84b9704ffe395df2c2cc19cee228
                                • Instruction Fuzzy Hash: 29119332215A8081EA629F9394107EEA3B4F78DBC4F544021FF8857BB7DB7CC9418B41
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: c6418ee08a2d99bb0f834513c3113b55ba0090fec11726b4d83439bcee0c9c8b
                                • Instruction ID: 1f5195086c7d46c311c29bac2112077e7c7e8efb0fbaa95545f75f1ab8f1d77f
                                • Opcode Fuzzy Hash: c6418ee08a2d99bb0f834513c3113b55ba0090fec11726b4d83439bcee0c9c8b
                                • Instruction Fuzzy Hash: A421C332614A8087EB629F5AD4807E977B0F788BD4F544224FB5A876F9DB78C901CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: send
                                • String ID:
                                • API String ID: 2809346765-0
                                • Opcode ID: 7b04e324c28c7b3b536a77f29125a2cbdc818c3a16a0c9b647f77b530166216f
                                • Instruction ID: 2219061207c83d129cb1c736d1c6ec4aa92e3636ad338a2aece9c5acb717b77f
                                • Opcode Fuzzy Hash: 7b04e324c28c7b3b536a77f29125a2cbdc818c3a16a0c9b647f77b530166216f
                                • Instruction Fuzzy Hash: 60016D31714A8481EB618F1BB94076AA7A0F78CFD4F5C5135EF9D43B68EA38C8518B40
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: FileFindNext
                                • String ID:
                                • API String ID: 2029273394-0
                                • Opcode ID: e0a95e762ac370655b826f283ad5be534de47ca55310324722f815d57650390d
                                • Instruction ID: f830afe8215133ded52682cabdddb9823e6c0aa40326b072aa507c9e632b5dfb
                                • Opcode Fuzzy Hash: e0a95e762ac370655b826f283ad5be534de47ca55310324722f815d57650390d
                                • Instruction Fuzzy Hash: FC01FF36218A8081EA72DB56F45439B7364F78CBD5F504122DF8D53B69DE39C886CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 986c70b0d44c87641fd7a2bafc8596790e971a1da67f8b9ca5557413f7120d21
                                • Instruction ID: 3b2c6bae783cdb39cb4440d0a9dae228b65e0b1c14ba49f2db65e1423007f410
                                • Opcode Fuzzy Hash: 986c70b0d44c87641fd7a2bafc8596790e971a1da67f8b9ca5557413f7120d21
                                • Instruction Fuzzy Hash: 26E0D832329A4541FB666B7BE1817ED72A07F4C7F4F544321B734037EADB3489644A11
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: FileFindNext
                                • String ID:
                                • API String ID: 2029273394-0
                                • Opcode ID: 399010cf59670fbe1ab766e5364ca5726a54ee50150088915aa0494e8ff061f8
                                • Instruction ID: 79b0d941b71851d67e3ed5e9fb9396718875f970e065e4daac4691504fa385df
                                • Opcode Fuzzy Hash: 399010cf59670fbe1ab766e5364ca5726a54ee50150088915aa0494e8ff061f8
                                • Instruction Fuzzy Hash: 15C04C39F15902C1E6571BB36C4238A11A0AB5D790F844020960882160DA7C81D78A21
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: InfoNativeSystem
                                • String ID:
                                • API String ID: 1721193555-0
                                • Opcode ID: d2557f7b5759ed9bc386ef8196c01d1f416ca1932cbdf92fbfd30ab0328ea477
                                • Instruction ID: c1f8abdfa3c11aa9de56e1ee108be8b74f057e80f86e55c58f9080c7b4b0d2de
                                • Opcode Fuzzy Hash: d2557f7b5759ed9bc386ef8196c01d1f416ca1932cbdf92fbfd30ab0328ea477
                                • Instruction Fuzzy Hash: 4EB09276A148C0C3C652EB08F84274A7331FB98B08FD00014E38D43624CE2DCA2A8E10
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: AllocHeap
                                • String ID:
                                • API String ID: 4292702814-0
                                • Opcode ID: daa2573087b623b9abe981fec17a8f56eee38245be2309f6bf9e0089a2be3b00
                                • Instruction ID: bf0e06441a54d6a1cc18ada1439082aae455cc3fa69792b77033dabdc6dabecd
                                • Opcode Fuzzy Hash: daa2573087b623b9abe981fec17a8f56eee38245be2309f6bf9e0089a2be3b00
                                • Instruction Fuzzy Hash: A5F01778302304A1FF5757AB99653E923886B9DBC0F484425AB0A877F1DE3CC9828221
                                APIs
                                Memory Dump Source
                                • Source File: 00000001.00000002.2163315602.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_1_2_140000000_setup_run.jbxd
                                Similarity
                                • API ID: AllocHeap
                                • String ID:
                                • API String ID: 4292702814-0
                                • Opcode ID: 749b1888752cbaf3ccc5c12c07e09f2981eaae3f5329f421042af50cb2ee18bc
                                • Instruction ID: e4cfd1d18ed068b3df031a5d4ed3d8bcfc5426a02b12f11125bcbc387410a6eb
                                • Opcode Fuzzy Hash: 749b1888752cbaf3ccc5c12c07e09f2981eaae3f5329f421042af50cb2ee18bc
                                • Instruction Fuzzy Hash: 78F03074301A4045FE5767B35A913F921809B8C7F0F4A4734BF2A873F1DA7CC4828621