Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bot.exe

Overview

General Information

Sample name:bot.exe
Analysis ID:1532244
MD5:3870b1e1ca36deec20214c6ae51f8f16
SHA1:feefcdc98dae9d1a720f8626af58f136f6468a0b
SHA256:d10449f12f6bd9f29e59600486bd48a49c0f7263a990ed82b9b2a635f4706fac
Tags:exeuser-aachum
Infos:

Detection

CredGrabber, Meduza Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected CredGrabber
Yara detected Meduza Stealer
AI detected suspicious sample
Creates files in alternative data streams (ADS)
Found direct / indirect Syscall (likely to bypass EDR)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Modifies the context of a thread in another process (thread injection)
Self deletion via cmd or bat file
Sigma detected: Suspicious Ping/Del Command Combination
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Queries time zone information
Sample execution stops while process was sleeping (likely an evasion)
Terminates after testing mutex exists (may check infected machine status)
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • bot.exe (PID: 3792 cmdline: "C:\Users\user\Desktop\bot.exe" MD5: 3870B1E1CA36DEEC20214C6AE51F8F16)
    • bot.exe (PID: 6768 cmdline: "C:\Users\user\Desktop\bot.exe" MD5: 3870B1E1CA36DEEC20214C6AE51F8F16)
      • cmd.exe (PID: 1920 cmdline: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • PING.EXE (PID: 2056 cmdline: ping 1.1.1.1 -n 1 -w 3000 MD5: 2F46799D79D22AC72C241EC0322B011D)
  • cleanup
{"C2 url": "109.107.181.162", "anti_vm": true, "anti_dbg": true, "port": 15666, "build_name": "15", "self_destruct": true, "extensions": "none", "links": "none", "grabber_max_size": 1048576}
SourceRuleDescriptionAuthorStrings
00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
    Process Memory Space: bot.exe PID: 6768JoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
      Process Memory Space: bot.exe PID: 6768JoeSecurity_CredGrabberYara detected CredGrabberJoe Security

        System Summary

        barindex
        Source: Process startedAuthor: Ilya Krestinichev: Data: Command: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe", CommandLine: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\bot.exe", ParentImage: C:\Users\user\Desktop\bot.exe, ParentProcessId: 6768, ParentProcessName: bot.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe", ProcessId: 1920, ProcessName: cmd.exe
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-12T22:39:13.826218+020020494411A Network Trojan was detected192.168.2.749699109.107.181.16215666TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-12T22:39:13.826218+020020508061A Network Trojan was detected192.168.2.749699109.107.181.16215666TCP
        2024-10-12T22:39:13.831482+020020508061A Network Trojan was detected192.168.2.749699109.107.181.16215666TCP
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-10-12T22:39:13.826218+020020508071A Network Trojan was detected192.168.2.749699109.107.181.16215666TCP
        2024-10-12T22:39:13.831482+020020508071A Network Trojan was detected192.168.2.749699109.107.181.16215666TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\Users\user\Desktop\bot.exe:a.dllAvira: detection malicious, Label: HEUR/AGEN.1354117
        Source: 2.2.bot.exe.140000000.0.unpackMalware Configuration Extractor: Meduza Stealer {"C2 url": "109.107.181.162", "anti_vm": true, "anti_dbg": true, "port": 15666, "build_name": "15", "self_destruct": true, "extensions": "none", "links": "none", "grabber_max_size": 1048576}
        Source: bot.exeReversingLabs: Detection: 42%
        Source: bot.exeVirustotal: Detection: 41%Perma Link
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
        Source: C:\Users\user\Desktop\bot.exe:a.dllJoe Sandbox ML: detected
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006FB80 CryptUnprotectData,LocalFree,2_2_000000014006FB80
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140035CF7 CryptUnprotectData,LocalFree,2_2_0000000140035CF7
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140035E00 CryptUnprotectData,2_2_0000000140035E00
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006FEA0 CryptProtectData,LocalFree,2_2_000000014006FEA0
        Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49700 version: TLS 1.2
        Source: bot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400B6740 FindClose,FindFirstFileExW,GetLastError,2_2_00000001400B6740
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140034F90 FindFirstFileW,FindNextFileW,2_2_0000000140034F90
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140035061 FindFirstFileW,FindNextFileW,2_2_0000000140035061
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007EAB0 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,RegOpenKeyExA,RegEnumKeyExA,RegCloseKey,GetLogicalDriveStringsW,GetTimeZoneInformation,2_2_000000014007EAB0
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\migration\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\migration\wtr\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeCode function: 4x nop then push rdi0_2_00007FF7F8A1C950
        Source: C:\Users\user\Desktop\bot.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF7F8A1C460
        Source: C:\Users\user\Desktop\bot.exeCode function: 4x nop then push rdi2_2_00007FF7F8A1C950
        Source: C:\Users\user\Desktop\bot.exeCode function: 4x nop then sub rsp, 28h2_2_00007FF7F8A1C460

        Networking

        barindex
        Source: Network trafficSuricata IDS: 2049441 - Severity 1 - ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt : 192.168.2.7:49699 -> 109.107.181.162:15666
        Source: Network trafficSuricata IDS: 2050806 - Severity 1 - ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M2 : 192.168.2.7:49699 -> 109.107.181.162:15666
        Source: Network trafficSuricata IDS: 2050807 - Severity 1 - ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP) : 192.168.2.7:49699 -> 109.107.181.162:15666
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000
        Source: global trafficTCP traffic: 192.168.2.7:49699 -> 109.107.181.162:15666
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
        Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
        Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
        Source: Joe Sandbox ViewASN Name: TELEPORT-TV-ASRU TELEPORT-TV-ASRU
        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
        Source: unknownDNS query: name: api.ipify.org
        Source: unknownDNS query: name: api.ipify.org
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: unknownTCP traffic detected without corresponding DNS query: 109.107.181.162
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007C5E0 recv,recv,closesocket,WSACleanup,2_2_000000014007C5E0
        Source: global trafficHTTP traffic detected: GET / HTTP/1.1Accept: text/html; text/plain; */*Host: api.ipify.orgCache-Control: no-cache
        Source: global trafficDNS traffic detected: DNS query: api.ipify.org
        Source: bot.exe, 00000002.00000003.1455279514.000001EC26E80000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1455314455.000001EC26E84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.microsoft.t/Regi
        Source: bot.exe, 00000002.00000003.1288855876.000001EC26E71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.microsoft.t/RegirF~b
        Source: bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
        Source: bot.exe, 00000002.00000003.1289744841.000001EC25264000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000002.1456698198.000001EC2524E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
        Source: bot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
        Source: bot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
        Source: bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
        Source: bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
        Source: bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
        Source: bot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
        Source: bot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290619963.000001EC27C15000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291065146.000001EC27C16000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
        Source: bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290619963.000001EC27C15000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291065146.000001EC27C16000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
        Source: bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290619963.000001EC27C15000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291065146.000001EC27C16000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
        Source: bot.exeString found in binary or memory: https://gcc.gnu.org/bugs/):
        Source: bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
        Source: bot.exe, 00000002.00000003.1299473293.000001EC27020000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1306737156.000001EC285FA000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1299473293.000001EC27028000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1300909810.000001EC27D2A000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1299745214.000001EC27CE5000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1299745214.000001EC27D32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
        Source: bot.exe, 00000002.00000003.1300909810.000001EC27D3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: bot.exe, 00000002.00000003.1300909810.000001EC27D3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLK
        Source: bot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
        Source: bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
        Source: bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
        Source: bot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
        Source: bot.exe, 00000002.00000003.1299473293.000001EC27020000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1306737156.000001EC285FA000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1299473293.000001EC27028000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1300909810.000001EC27D2A000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1299745214.000001EC27CE5000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1299745214.000001EC27D32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
        Source: bot.exe, 00000002.00000003.1300909810.000001EC27D3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.jXqaKJMO4ZEP
        Source: bot.exe, 00000002.00000003.1300909810.000001EC27D3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.NYz0wxyUaYSW
        Source: bot.exe, 00000002.00000003.1301182951.000001EC2702F000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1306737156.000001EC28601000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1300909810.000001EC27D3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/gro.allizom.www.d
        Source: bot.exe, 00000002.00000003.1300909810.000001EC27D3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: bot.exe, 00000002.00000003.1301182951.000001EC2702F000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1306737156.000001EC28601000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1300909810.000001EC27D3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
        Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
        Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.7:49700 version: TLS 1.2
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F89146A4 CreateToolhelp32Snapshot,Process32First,Process32Next,NtClose,0_2_00007FF7F89146A4
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F8913060 GetCurrentProcess,NtQueryInformationProcess,GetTempPathA,strlen,strlen,memcpy,0_2_00007FF7F8913060
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F8913C70 GetCurrentProcess,NtQueryInformationProcess,GetTempPathW,wcslen,wcslen,strlen,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wcslen,LdrLoadDll,GetProcAddress,VirtualProtect,0_2_00007FF7F8913C70
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140082030 RtlAcquirePebLock,NtAllocateVirtualMemory,lstrcpyW,lstrcatW,NtAllocateVirtualMemory,lstrcpyW,RtlInitUnicodeString,RtlInitUnicodeString,LdrEnumerateLoadedModules,RtlReleasePebLock,CoInitializeEx,lstrcpyW,lstrcatW,CoGetObject,lstrcpyW,lstrcatW,CoGetObject,CoUninitialize,2_2_0000000140082030
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400D06E8 NtAllocateVirtualMemory,2_2_00000001400D06E8
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400819C5 NtQuerySystemInformation,NtQuerySystemInformation,GetCurrentProcess,NtQueryObject,GetFinalPathNameByHandleA,CloseHandle,CloseHandle,2_2_00000001400819C5
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F89134D00_2_00007FF7F89134D0
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F8913C700_2_00007FF7F8913C70
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F89351400_2_00007FF7F8935140
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F8916A400_2_00007FF7F8916A40
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F892DA840_2_00007FF7F892DA84
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F89172900_2_00007FF7F8917290
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F89134D00_2_00007FF7F89134D0
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F8925B200_2_00007FF7F8925B20
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F892D3670_2_00007FF7F892D367
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F892C4A00_2_00007FF7F892C4A0
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F89364F00_2_00007FF7F89364F0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014008A06A2_2_000000014008A06A
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007E0B02_2_000000014007E0B0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014005F1402_2_000000014005F140
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400421C02_2_00000001400421C0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007F2102_2_000000014007F210
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014008426B2_2_000000014008426B
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400323342_2_0000000140032334
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014005A3372_2_000000014005A337
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400743A02_2_00000001400743A0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007E3D02_2_000000014007E3D0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014002F6502_2_000000014002F650
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400866802_2_0000000140086680
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014003B7402_2_000000014003B740
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014003C7E02_2_000000014003C7E0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007EAB02_2_000000014007EAB0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140094B742_2_0000000140094B74
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007FBE42_2_000000014007FBE4
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014009ACF02_2_000000014009ACF0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140084CF02_2_0000000140084CF0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007CDF02_2_000000014007CDF0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014002EF602_2_000000014002EF60
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014009DFA02_2_000000014009DFA0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006E0002_2_000000014006E000
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014004E0002_2_000000014004E000
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400820302_2_0000000140082030
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400A70382_2_00000001400A7038
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400360502_2_0000000140036050
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006B0A02_2_000000014006B0A0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400920942_2_0000000140092094
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006A1002_2_000000014006A100
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400D01382_2_00000001400D0138
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400D01602_2_00000001400D0160
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400D01582_2_00000001400D0158
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014005A3372_2_000000014005A337
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400061802_2_0000000140006180
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400282002_2_0000000140028200
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014009E21C2_2_000000014009E21C
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400552502_2_0000000140055250
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014009227C2_2_000000014009227C
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400B92E02_2_00000001400B92E0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400532E02_2_00000001400532E0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400A22D82_2_00000001400A22D8
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400963002_2_0000000140096300
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400303052_2_0000000140030305
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400563402_2_0000000140056340
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400263402_2_0000000140026340
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400933442_2_0000000140093344
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400253502_2_0000000140025350
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400823802_2_0000000140082380
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014008E38C2_2_000000014008E38C
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006A4002_2_000000014006A400
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400A54642_2_00000001400A5464
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400924642_2_0000000140092464
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014009C4982_2_000000014009C498
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006E49A2_2_000000014006E49A
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014004C5002_2_000000014004C500
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400625102_2_0000000140062510
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400705A02_2_00000001400705A0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400066102_2_0000000140006610
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400596B02_2_00000001400596B0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400316D72_2_00000001400316D7
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006A7302_2_000000014006A730
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400667502_2_0000000140066750
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400907A02_2_00000001400907A0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400A37AC2_2_00000001400A37AC
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014009E7A42_2_000000014009E7A4
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014008E8842_2_000000014008E884
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014003394B2_2_000000014003394B
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014009B9682_2_000000014009B968
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400269E02_2_00000001400269E0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140078A402_2_0000000140078A40
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006AA502_2_000000014006AA50
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140092AAC2_2_0000000140092AAC
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400A6ACC2_2_00000001400A6ACC
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140037AD22_2_0000000140037AD2
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400A1B682_2_00000001400A1B68
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400BBB802_2_00000001400BBB80
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006DBC02_2_000000014006DBC0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014002FC802_2_000000014002FC80
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140006D202_2_0000000140006D20
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014004AD302_2_000000014004AD30
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006AD702_2_000000014006AD70
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140005DB02_2_0000000140005DB0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014009BE182_2_000000014009BE18
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140092E3C2_2_0000000140092E3C
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006CE402_2_000000014006CE40
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140075E702_2_0000000140075E70
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014003BE962_2_000000014003BE96
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140072EC02_2_0000000140072EC0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014009CF182_2_000000014009CF18
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F8A0C9502_2_00007FF7F8A0C950
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F8916A402_2_00007FF7F8916A40
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F892DA842_2_00007FF7F892DA84
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F8925B202_2_00007FF7F8925B20
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F8913C702_2_00007FF7F8913C70
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F89351402_2_00007FF7F8935140
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F89F72202_2_00007FF7F89F7220
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F89172902_2_00007FF7F8917290
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F892D3672_2_00007FF7F892D367
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F89134D02_2_00007FF7F89134D0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F892C4A02_2_00007FF7F892C4A0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F89364F02_2_00007FF7F89364F0
        Source: C:\Users\user\Desktop\bot.exeCode function: String function: 0000000140034B20 appears 41 times
        Source: C:\Users\user\Desktop\bot.exeCode function: String function: 000000014002DE50 appears 37 times
        Source: C:\Users\user\Desktop\bot.exeCode function: String function: 00007FF7F8A12CD0 appears 32 times
        Source: C:\Users\user\Desktop\bot.exeCode function: String function: 00000001400300A0 appears 79 times
        Source: C:\Users\user\Desktop\bot.exeCode function: String function: 000000014008D6C8 appears 59 times
        Source: C:\Users\user\Desktop\bot.exeCode function: String function: 000000014002DDE0 appears 49 times
        Source: C:\Users\user\Desktop\bot.exeCode function: String function: 00007FF7F8A1C0A0 appears 43 times
        Source: bot.exe_a.dll.0.drStatic PE information: Number of sections : 11 > 10
        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/2@1/2
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F89146A4 CreateToolhelp32Snapshot,Process32First,Process32Next,NtClose,0_2_00007FF7F89146A4
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014006CE40 CoInitializeEx,CoInitializeSecurity,CoCreateInstance,CoSetProxyBlanket,SysAllocStringByteLen,SysFreeString,SysAllocStringByteLen,SysFreeString,SysStringByteLen,SysFreeString,SysFreeString,SysStringByteLen,SysFreeString,SysFreeString,2_2_000000014006CE40
        Source: C:\Users\user\Desktop\bot.exeFile created: C:\Users\user\Desktop\bot.exe:a.dllJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:576:120:WilError_03
        Source: C:\Users\user\Desktop\bot.exeMutant created: \Sessions\1\BaseNamedObjects\Mmm-A33C734061CA11EE8C18806E6F6E69636FA13009
        Source: bot.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\bot.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\bot.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: bot.exeReversingLabs: Detection: 42%
        Source: bot.exeVirustotal: Detection: 41%
        Source: unknownProcess created: C:\Users\user\Desktop\bot.exe "C:\Users\user\Desktop\bot.exe"
        Source: C:\Users\user\Desktop\bot.exeProcess created: C:\Users\user\Desktop\bot.exe "C:\Users\user\Desktop\bot.exe"
        Source: C:\Users\user\Desktop\bot.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe"
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000
        Source: C:\Users\user\Desktop\bot.exeProcess created: C:\Users\user\Desktop\bot.exe "C:\Users\user\Desktop\bot.exe"Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: rstrtmgr.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: ncrypt.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: ntasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: schannel.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: mskeyprotect.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: msasn1.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: gpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: ncryptsslp.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: edputil.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: appresolver.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: bcp47langs.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: slc.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: sppc.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: onecorecommonproxystub.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
        Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
        Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
        Source: bot.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
        Source: bot.exeStatic PE information: Image base 0x140000000 > 0x60000000
        Source: bot.exeStatic file information: File size 2746880 > 1048576
        Source: bot.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x10bc00
        Source: bot.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x16f600
        Source: bot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F8913D77 strlen,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wcslen,LdrLoadDll,GetProcAddress,VirtualProtect,LdrUnloadDll,0_2_00007FF7F8913D77
        Source: bot.exeStatic PE information: section name: .xdata
        Source: bot.exe_a.dll.0.drStatic PE information: section name: .xdata
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F892AAF6 push rsp; retf 0_2_00007FF7F892AAF9
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F892D857 push rax; iretd 0_2_00007FF7F892D858
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F892AAF6 push rsp; retf 2_2_00007FF7F892AAF9
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F892D857 push rax; iretd 2_2_00007FF7F892D858
        Source: C:\Users\user\Desktop\bot.exeFile created: C:\Users\user\Desktop\bot.exe:a.dllJump to dropped file
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400741C2 OpenMutexA,ExitProcess,CreateMutexA,CreateMutexExA,ExitProcess,ReleaseMutex,CloseHandle,2_2_00000001400741C2

        Hooking and other Techniques for Hiding and Protection

        barindex
        Source: C:\Users\user\Desktop\bot.exeFile created: C:\Users\user\Desktop\bot.exe:a.dllJump to behavior
        Source: C:\Users\user\Desktop\bot.exeProcess created: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe"
        Source: C:\Users\user\Desktop\bot.exeProcess created: "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe"Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeDropped PE file which has not been started: C:\Users\user\Desktop\bot.exe:a.dllJump to dropped file
        Source: C:\Users\user\Desktop\bot.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_2-80664
        Source: C:\Users\user\Desktop\bot.exeAPI coverage: 8.2 %
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400B6740 FindClose,FindFirstFileExW,GetLastError,2_2_00000001400B6740
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140034F90 FindFirstFileW,FindNextFileW,2_2_0000000140034F90
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140035061 FindFirstFileW,FindNextFileW,2_2_0000000140035061
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007EAB0 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,RegOpenKeyExA,RegEnumKeyExA,RegCloseKey,GetLogicalDriveStringsW,GetTimeZoneInformation,2_2_000000014007EAB0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140094A30 VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,2_2_0000000140094A30
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\migration\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\replacementmanifests\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\migration\wtr\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\replacementmanifests\microsoft-activedirectory-webservices\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\replacementmanifests\microsoft-client-license-platform-service-migration\Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: D:\sources\replacementmanifests\hwvid-migration-2\Jump to behavior
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
        Source: bot.exe, 00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1289744841.000001EC25264000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000002.1456698198.000001EC2524E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
        Source: bot.exe, 00000002.00000002.1456698198.000001EC2524E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}r
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
        Source: bot.exe, 00000002.00000003.1293216845.000001EC27C43000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
        Source: C:\Users\user\Desktop\bot.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F8913D77 strlen,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wcslen,LdrLoadDll,GetProcAddress,VirtualProtect,LdrUnloadDll,0_2_00007FF7F8913D77
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014008D3D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000000014008D3D8
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400B8A44 GetLastError,IsDebuggerPresent,OutputDebugStringW,2_2_00000001400B8A44
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F8913D77 strlen,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wcslen,LdrLoadDll,GetProcAddress,VirtualProtect,LdrUnloadDll,0_2_00007FF7F8913D77
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400A4D28 GetProcessHeap,2_2_00000001400A4D28
        Source: C:\Users\user\Desktop\bot.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F89111D9 SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,0_2_00007FF7F89111D9
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00000001400D02D8 SetUnhandledExceptionFilter,2_2_00000001400D02D8
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014008D3D8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_000000014008D3D8
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_00007FF7F89111D9 SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,2_2_00007FF7F89111D9

        HIPS / PFW / Operating System Protection Evasion

        barindex
        Source: C:\Users\user\Desktop\bot.exeNtQueryInformationProcess: Indirect: 0x7FF7F8913CADJump to behavior
        Source: C:\Users\user\Desktop\bot.exeNtClose: Indirect: 0x7FF7F8914830
        Source: C:\Users\user\Desktop\bot.exeNtQueryInformationProcess: Indirect: 0x7FF7F8913098Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeMemory written: C:\Users\user\Desktop\bot.exe base: 140000000 value starts with: 4D5AJump to behavior
        Source: C:\Users\user\Desktop\bot.exeThread register set: target process: 6768Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_0000000140072EC0 ShellExecuteW,2_2_0000000140072EC0
        Source: C:\Users\user\Desktop\bot.exeProcess created: C:\Users\user\Desktop\bot.exe "C:\Users\user\Desktop\bot.exe"Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe"Jump to behavior
        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping 1.1.1.1 -n 1 -w 3000Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F8914350 cpuid 0_2_00007FF7F8914350
        Source: C:\Users\user\Desktop\bot.exeCode function: EnumSystemLocalesW,2_2_00000001400A409C
        Source: C:\Users\user\Desktop\bot.exeCode function: EnumSystemLocalesW,2_2_00000001400A416C
        Source: C:\Users\user\Desktop\bot.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00000001400A4204
        Source: C:\Users\user\Desktop\bot.exeCode function: EnumSystemLocalesW,2_2_0000000140099354
        Source: C:\Users\user\Desktop\bot.exeCode function: GetLocaleInfoW,2_2_00000001400D0390
        Source: C:\Users\user\Desktop\bot.exeCode function: GetLocaleInfoEx,FormatMessageA,2_2_00000001400B63B0
        Source: C:\Users\user\Desktop\bot.exeCode function: GetLocaleInfoW,2_2_00000001400A4450
        Source: C:\Users\user\Desktop\bot.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_00000001400A45A8
        Source: C:\Users\user\Desktop\bot.exeCode function: GetLocaleInfoW,2_2_00000001400A4658
        Source: C:\Users\user\Desktop\bot.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00000001400A4784
        Source: C:\Users\user\Desktop\bot.exeCode function: GetLocaleInfoW,2_2_0000000140099898
        Source: C:\Users\user\Desktop\bot.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,2_2_00000001400A3D50
        Source: C:\Users\user\Desktop\bot.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\bot.exeQueries volume information: C:\ VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\bot.exeKey value queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\TimeZoneInformation TimeZoneKeyNameJump to behavior
        Source: C:\Users\user\Desktop\bot.exeCode function: 0_2_00007FF7F892B4F9 GetSystemTimeAsFileTime,0_2_00007FF7F892B4F9
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007DCC0 GetUserNameW,2_2_000000014007DCC0
        Source: C:\Users\user\Desktop\bot.exeCode function: 2_2_000000014007F210 GetTimeZoneInformation,2_2_000000014007F210

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: Process Memory Space: bot.exe PID: 6768, type: MEMORYSTR
        Source: Yara matchFile source: 00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bot.exe PID: 6768, type: MEMORYSTR
        Source: bot.exe, 00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum-LTC\config
        Source: bot.exe, 00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ElectronCash\config
        Source: bot.exe, 00000002.00000003.1336291282.000001EC2944B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "software": "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",
        Source: bot.exe, 00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodus\exodus.wallet
        Source: bot.exe, 00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
        Source: bot.exe, 00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
        Source: C:\Users\user\Desktop\bot.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\monero-project\monero-coreJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\key4.dbJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\cookies.sqliteJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\places.sqliteJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\prefs.jsJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOCKJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
        Source: C:\Users\user\Desktop\bot.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\bot.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: Process Memory Space: bot.exe PID: 6768, type: MEMORYSTR
        Source: Yara matchFile source: 00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: bot.exe PID: 6768, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Native API
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        1
        Deobfuscate/Decode Files or Information
        1
        OS Credential Dumping
        12
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Abuse Elevation Control Mechanism
        1
        Abuse Elevation Control Mechanism
        LSASS Memory1
        Account Discovery
        Remote Desktop Protocol2
        Data from Local System
        21
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        3
        Obfuscated Files or Information
        Security Account Manager4
        File and Directory Discovery
        SMB/Windows Admin Shares1
        Email Collection
        1
        Non-Standard Port
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook211
        Process Injection
        1
        DLL Side-Loading
        NTDS34
        System Information Discovery
        Distributed Component Object ModelInput Capture2
        Non-Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        File Deletion
        LSA Secrets31
        Security Software Discovery
        SSHKeylogging3
        Application Layer Protocol
        Scheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
        Masquerading
        Cached Domain Credentials2
        Process Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items211
        Process Injection
        DCSync1
        System Owner/User Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        NTFS File Attributes
        Proc Filesystem1
        Remote System Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow11
        System Network Configuration Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        bot.exe42%ReversingLabsWin64.Trojan.Generic
        bot.exe41%VirustotalBrowse
        SourceDetectionScannerLabelLink
        C:\Users\user\Desktop\bot.exe:a.dll100%AviraHEUR/AGEN.1354117
        C:\Users\user\Desktop\bot.exe:a.dll100%Joe Sandbox ML
        No Antivirus matches
        SourceDetectionScannerLabelLink
        api.ipify.org0%VirustotalBrowse
        SourceDetectionScannerLabelLink
        https://api.ipify.org/0%URL Reputationsafe
        https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
        https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
        https://gcc.gnu.org/bugs/):0%URL Reputationsafe
        https://duckduckgo.com/ac/?q=0%URL Reputationsafe
        https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg0%URL Reputationsafe
        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
        https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u0%URL Reputationsafe
        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
        https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg0%URL Reputationsafe
        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
        https://support.mozilla.org0%URL Reputationsafe
        https://www.ecosia.org/newtab/0%URL Reputationsafe
        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
        https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
        https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
        NameIPActiveMaliciousAntivirus DetectionReputation
        api.ipify.org
        172.67.74.152
        truefalseunknown
        NameMaliciousAntivirus DetectionReputation
        https://api.ipify.org/false
        • URL Reputation: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        https://ac.ecosia.org/autocomplete?q=bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0bot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://duckduckgo.com/chrome_newtabbot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290619963.000001EC27C15000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291065146.000001EC27C16000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://gcc.gnu.org/bugs/):bot.exefalse
          • URL Reputation: safe
          unknown
          https://duckduckgo.com/ac/?q=bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290619963.000001EC27C15000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291065146.000001EC27C16000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.google.com/images/branding/product/ico/googleg_lodp.icobot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpfalseunknown
          http://ns.microsoft.t/RegirF~bbot.exe, 00000002.00000003.1288855876.000001EC26E71000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgbot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchbot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&ubot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.bot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9ebot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290619963.000001EC27C15000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291065146.000001EC27C16000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpgbot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://support.mozilla.orgbot.exe, 00000002.00000003.1299473293.000001EC27020000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1306737156.000001EC285FA000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1299473293.000001EC27028000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1300909810.000001EC27D2A000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1299745214.000001EC27CE5000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1299745214.000001EC27D32000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.ecosia.org/newtab/bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://ns.microsoft.t/Regibot.exe, 00000002.00000003.1455279514.000001EC26E80000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1455314455.000001EC26E84000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=bot.exe, 00000002.00000003.1290619963.000001EC27C2E000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1290945374.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1291311899.000001EC252D3000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brbot.exe, 00000002.00000003.1300909810.000001EC27D3A000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.mozilla.org/products/firefoxgro.allizom.troppus.S3DiLP_FhcLKbot.exe, 00000002.00000003.1300909810.000001EC27D3A000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&ctabot.exe, 00000002.00000003.1311444530.000001EC25280000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1315115313.000001EC27BA3000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1324309551.000001EC252B2000.00000004.00000020.00020000.00000000.sdmp, bot.exe, 00000002.00000003.1311444530.000001EC252B2000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      109.107.181.162
                      unknownRussian Federation
                      49973TELEPORT-TV-ASRUtrue
                      172.67.74.152
                      api.ipify.orgUnited States
                      13335CLOUDFLARENETUSfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1532244
                      Start date and time:2024-10-12 22:38:10 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 45s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:19
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:bot.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@8/2@1/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 90%
                      • Number of executed functions: 83
                      • Number of non-executed functions: 166
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing network information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      16:39:04API Interceptor2x Sleep call for process: bot.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      109.107.181.162RUN.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                        App_installer32_64x.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          setup_run.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                            file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              172.67.74.15267065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                              • api.ipify.org/
                              Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                              • api.ipify.org/
                              y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                              • api.ipify.org/
                              file.exeGet hashmaliciousRDPWrap ToolBrowse
                              • api.ipify.org/
                              Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                              • api.ipify.org/
                              2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              api.ipify.org67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                              • 172.67.74.152
                              ATLANTIC STAR - VESSEL DETAILS.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 172.67.74.152
                              024.xlsx.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 104.26.13.205
                              024.xlsx.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              • 172.67.74.152
                              Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                              • 104.26.12.205
                              Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              Order0958490.vbeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              SecuriteInfo.com.Win64.PWSX-gen.30688.21076.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 104.26.13.205
                              https://www.canva.com/design/DAGTGtfEYnw/CziuYyD8EEWyTr61OD4BbQ/edit?utm_content=DAGTGtfEYnw&utm_campaign=designshare&utm_medium=link2&utm_source=sharebuttoGet hashmaliciousHtmlDropperBrowse
                              • 172.67.74.152
                              HS034Ewroq.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 104.26.13.205
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              TELEPORT-TV-ASRURUN.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 109.107.181.162
                              App_installer32_64x.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 109.107.181.162
                              setup_run.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 109.107.181.162
                              file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 109.107.181.162
                              wqOq2pxuQB.exeGet hashmaliciousStealc, VidarBrowse
                              • 109.107.187.5
                              Wv3pZF5jI3.exeGet hashmaliciousRedLineBrowse
                              • 109.107.182.39
                              OgcktrbHkI.exeGet hashmaliciousTofseeBrowse
                              • 109.107.161.150
                              clik.exeGet hashmaliciousCredGrabber, PureLog StealerBrowse
                              • 109.107.181.83
                              leadiadequatepro.exeGet hashmaliciousCredGrabber, PureLog StealerBrowse
                              • 109.107.181.83
                              responsibilityleadpro.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                              • 109.107.181.83
                              CLOUDFLARENETUSLoader.exeGet hashmaliciousLummaCBrowse
                              • 172.67.206.204
                              file.exeGet hashmaliciousLummaCBrowse
                              • 104.21.53.8
                              file.exeGet hashmaliciousLummaCBrowse
                              • 172.67.206.204
                              AeYgxx6XFk.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                              • 188.114.97.3
                              file.exeGet hashmaliciousLummaCBrowse
                              • 104.21.53.8
                              file.exeGet hashmaliciousLummaCBrowse
                              • 104.21.53.8
                              na.elfGet hashmaliciousMiraiBrowse
                              • 8.6.157.70
                              PO-00006799868.xlsGet hashmaliciousRemcosBrowse
                              • 188.114.96.3
                              http://coin-have.c0mGet hashmaliciousUnknownBrowse
                              • 1.1.1.1
                              file.exeGet hashmaliciousLummaCBrowse
                              • 172.67.206.204
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              37f463bf4616ecd445d4a1937da06e19narud#U017ebenica TISAKOMERC d.o.oRadbrkkedes234525262623.wsfGet hashmaliciousRemcos, GuLoaderBrowse
                              • 172.67.74.152
                              v.1.5.4__x64__.msiGet hashmaliciousLegionLoaderBrowse
                              • 172.67.74.152
                              SecuriteInfo.com.FileRepMalware.1304.4177.exeGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              SecuriteInfo.com.FileRepMalware.1304.4177.exeGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              Synaptics.exeGet hashmaliciousXRedBrowse
                              • 172.67.74.152
                              Quotation-GINC-19-00204.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                              • 172.67.74.152
                              Produkttyper.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              • 172.67.74.152
                              P065.00760_0858_PDF.vbsGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                              • 172.67.74.152
                              Agenda de Pagamento outubro 2024.vbeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                              • 172.67.74.152
                              curriculo_OUTUBRO_2024_Bmd2xZtsZtjm7sO_curriculo_091024.LnK.lnkGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              No context
                              Process:C:\Users\user\Desktop\bot.exe
                              File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                              Category:dropped
                              Size (bytes):1430016
                              Entropy (8bit):7.491054840858222
                              Encrypted:false
                              SSDEEP:24576:kjSpDfQz9C7baQvDppXIrg7GU1zvw6TBovozmpqr/XoSjdQvYq+jweWgYx:kjS9fQzw7baQrppXsg7G4zvw6FGyvoSU
                              MD5:4BEFE8FA4F25CCC8985C3E1F3E76C870
                              SHA1:B1B22D237CB469240E12791026E6175926DB6CA8
                              SHA-256:EACD6510F27A560F7A7BFB64FC2539C8C72DB257B832008CADA036551BDA7CBD
                              SHA-512:9AD445CAE534450388E6F136C5018C0CC6FD8C58ACA57C4451F59E0AE9FBA24993AFE5FA16CF1D5BB69CC22703173592AB6E8CC824153F5F9C0258C5325C9E0B
                              Malicious:true
                              Antivirus:
                              • Antivirus: Avira, Detection: 100%
                              • Antivirus: Joe Sandbox ML, Detection: 100%
                              Reputation:low
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....=.g..........."...)............`........................................@............`... ..............................................................................0..............................@...(...................@................................text...............................`..`.data....[...0...\..................@....rdata...........0...v..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..............................@..@.idata..............................@....CRT....X...........................@....tls......... ......................@....reloc.......0......................@..B........................................................................................................................................................................
                              Process:C:\Windows\System32\PING.EXE
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):275
                              Entropy (8bit):4.825671547285939
                              Encrypted:false
                              SSDEEP:6:PzXULmWxHLTpUrraGbsW3CNcwAFeMmvVOIHJFxMVlmJHaVFtIk3:P+pTpcraGbsTDAFSkIrxMVlmJHaVPN
                              MD5:048DC6B94735C4768D20ED5E3F14F565
                              SHA1:6B92CCD1E038396F675090384C6E8DFC742614ED
                              SHA-256:6D0C347234F09E710D6B842ED14CD27792E71E5B906E9E806E77AFE8FF08E1BE
                              SHA-512:88DF2342FFD4D303BEF828A12F7BEB505DC06E0BE6E91FF7FDA74DE31FAA289089557C036293EE3B0EE55A62D62CC804953C0D89591E662A0B513525AA40093E
                              Malicious:false
                              Reputation:low
                              Preview:..Pinging 1.1.1.1 with 32 bytes of data:..Reply from 1.1.1.1: bytes=32 time=6ms TTL=51....Ping statistics for 1.1.1.1:.. Packets: Sent = 1, Received = 1, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 6ms, Maximum = 6ms, Average = 6ms..
                              File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                              Entropy (8bit):7.175418534241925
                              TrID:
                              • Win64 Executable (generic) (12005/4) 74.95%
                              • Generic Win/DOS Executable (2004/3) 12.51%
                              • DOS Executable Generic (2002/1) 12.50%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                              File name:bot.exe
                              File size:2'746'880 bytes
                              MD5:3870b1e1ca36deec20214c6ae51f8f16
                              SHA1:feefcdc98dae9d1a720f8626af58f136f6468a0b
                              SHA256:d10449f12f6bd9f29e59600486bd48a49c0f7263a990ed82b9b2a635f4706fac
                              SHA512:840087c0a876bf027dba23d1050534bee2ad31e58b9343290b40c470d28cbde7158c785f200cadf6e5d69539183814b20f343e3130f974b8ce88af8d8ec338cc
                              SSDEEP:49152:7ZPf0tL9d77T+WScpPNBqB0+iajS9fQzw7baQrppXsg7G4zvw6FGyvoS5QJ+jweu:AVScpPN3l7baQ3sg7G4zvwevoS5QYweu
                              TLSH:85D59D47A36301ACC19ED07C4F97D672BF70B4A902B03825ADA1D733AF24E505EA7B65
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....=.g...............)......)................@.............................`*.....I.*...`... ............................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x1400014a0
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x140000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x670A3DDA [Sat Oct 12 09:14:02 2024 UTC]
                              TLS Callbacks:0x4001a380, 0x1, 0x4001a350, 0x1
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:0163d3ec9900198371a13a64f76fc361
                              Instruction
                              dec eax
                              sub esp, 28h
                              dec eax
                              mov eax, dword ptr [00274A35h]
                              mov dword ptr [eax], 00000001h
                              call 00007F9A98F05D1Fh
                              nop
                              nop
                              dec eax
                              add esp, 28h
                              ret
                              nop dword ptr [eax]
                              dec eax
                              sub esp, 28h
                              dec eax
                              mov eax, dword ptr [00274A15h]
                              mov dword ptr [eax], 00000000h
                              call 00007F9A98F05CFFh
                              nop
                              nop
                              dec eax
                              add esp, 28h
                              ret
                              nop dword ptr [eax]
                              dec eax
                              sub esp, 28h
                              call 00007F9A98F2C20Ch
                              dec eax
                              cmp eax, 01h
                              sbb eax, eax
                              dec eax
                              add esp, 28h
                              ret
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              dec eax
                              lea ecx, dword ptr [00000009h]
                              jmp 00007F9A98F06029h
                              nop dword ptr [eax+00h]
                              ret
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              ret
                              nop word ptr [eax+eax+00000000h]
                              nop dword ptr [eax+00h]
                              push esi
                              push ebx
                              dec eax
                              sub esp, 28h
                              call 00007F9A98F2C2B2h
                              dec eax
                              arpl ax, bx
                              cdq
                              dec eax
                              imul ebx, ebx, 51EB851Fh
                              dec eax
                              sar ebx, 25h
                              sub ebx, edx
                              imul edx, ebx, 64h
                              sub eax, edx
                              mov ebx, eax
                              test eax, eax
                              jle 00007F9A98F06088h
                              xor esi, esi
                              nop dword ptr [eax+00000000h]
                              call 00007F9A98F2C288h
                              dec eax
                              arpl ax, dx
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x2a00000x1180.idata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2810000xaf80.pdata
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2a40000x1684.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x2748600x28.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x2a04500x410.idata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x10bb700x10bc0061622e4740e5d28874e06d8b9c534322False0.35506207691409897data6.22838234953122IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .data0x10d0000x30800x32009dd76daa6bcbbd52a7e1f42691b82f36False0.0225data0.27715409108042194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rdata0x1110000x16f4a00x16f60057e815b2946af59fca620f285f7f3998False0.5944198707043212data7.450602281863168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .pdata0x2810000xaf800xb000e5a1483ef7d2debd266ba4f8a96810caFalse0.5372869318181818data6.036620350568149IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .xdata0x28c0000x123240x1240098a30c7b03b41b55b5760cfb36f29449False0.1908042594178082data5.069165535169385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .bss0x29f0000xcb00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .idata0x2a00000x11800x1200639e2c53a8b3a75c1ff57ec93e18be3bFalse0.314453125data4.234187742404477IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .CRT0x2a20000x600x200c763ed33786bdf672a771e19d0ae8b3aFalse0.06640625data0.3124937745953951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .tls0x2a30000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .reloc0x2a40000x16840x18004f4f97b146c1904b770a19b01a0caf58False0.37890625data5.3554449882646145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              DLLImport
                              KERNEL32.dllCloseHandle, CreateFileW, CreateToolhelp32Snapshot, DeleteCriticalSection, EnterCriticalSection, FormatMessageA, GetCurrentProcess, GetLastError, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetStartupInfoA, GetSystemTimeAsFileTime, GetTempPathA, GetTempPathW, GetThreadId, InitializeConditionVariable, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, LoadLibraryA, LoadLibraryW, LocalFree, MultiByteToWideChar, Process32First, Process32Next, RaiseException, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetLastError, SetUnhandledExceptionFilter, Sleep, SleepConditionVariableCS, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryEnterCriticalSection, VirtualProtect, VirtualQuery, WakeAllConditionVariable, WakeConditionVariable, WideCharToMultiByte, WriteFile
                              msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _errno, _filelengthi64, _fileno, _fmode, _fstat64, _get_osfhandle, _initterm, _lseeki64, _onexit, _strlwr, _time64, _wfopen, abort, calloc, exit, fclose, fflush, fgetpos, fopen, fprintf, fputc, fputs, fread, free, fsetpos, fwrite, getc, getenv, getwc, iswctype, localeconv, malloc, memchr, memcmp, memcpy, memmove, memset, putc, putwc, rand, realloc, setlocale, setvbuf, signal, srand, strchr, strcmp, strcoll, strcpy_s, strerror, strftime, strlen, strncmp, strstr, strtoul, strxfrm, towlower, towupper, ungetc, ungetwc, vfprintf, wcscoll, wcsftime, wcslen, wcstombs, wcsxfrm, _write, _read, _fileno, _fdopen
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-10-12T22:39:13.826218+02002049441ET MALWARE Win32/Unknown Grabber Base64 Data Exfiltration Attempt1192.168.2.749699109.107.181.16215666TCP
                              2024-10-12T22:39:13.826218+02002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.749699109.107.181.16215666TCP
                              2024-10-12T22:39:13.826218+02002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.749699109.107.181.16215666TCP
                              2024-10-12T22:39:13.831482+02002050806ET MALWARE [ANY.RUN] Meduza Stealer Exfiltration M21192.168.2.749699109.107.181.16215666TCP
                              2024-10-12T22:39:13.831482+02002050807ET MALWARE [ANY.RUN] Possible Meduza Stealer Exfiltration (TCP)1192.168.2.749699109.107.181.16215666TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Oct 12, 2024 22:39:06.371028900 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:06.375983953 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:06.376086950 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:07.008949995 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:07.008974075 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:07.009047985 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:07.020597935 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:07.020611048 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:07.515991926 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:07.516094923 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:08.488236904 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:08.488281012 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:08.489248991 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:08.489321947 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:08.491499901 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:08.539408922 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:08.603363037 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:08.603435040 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:08.603457928 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:08.603514910 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:08.603524923 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:08.603595972 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:08.603634119 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:08.603647947 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:08.653820992 CEST49700443192.168.2.7172.67.74.152
                              Oct 12, 2024 22:39:08.653848886 CEST44349700172.67.74.152192.168.2.7
                              Oct 12, 2024 22:39:13.826217890 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.831237078 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.831250906 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.831264973 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.831275940 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.831296921 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.831481934 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.835129976 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.835141897 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.835154057 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.835165024 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.835175037 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.835213900 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.835278034 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.836334944 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.836374998 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.836429119 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.836430073 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.836442947 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.836455107 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.836467028 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.836504936 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.836555958 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.836594105 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.836659908 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.836678028 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.836764097 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.840085983 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.840163946 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.840183973 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.840217113 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.840254068 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.840296984 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.840296984 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.840367079 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.841269970 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.841351986 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.841363907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.841391087 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.841466904 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.841470003 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.841483116 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.841567039 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.841692924 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.841768026 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.841835976 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.841847897 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.841923952 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.845067024 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845144987 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.845161915 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845174074 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845192909 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845204115 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845232010 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845249891 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845251083 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.845262051 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845274925 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845285892 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845288038 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.845320940 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845329046 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.845366001 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845374107 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.845377922 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845388889 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.845438957 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846127033 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846139908 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846153021 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846163988 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846221924 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846236944 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846249104 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846314907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846328020 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846339941 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846399069 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846410990 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846417904 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846457005 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846467972 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846493006 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846510887 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846538067 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846540928 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846574068 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846599102 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846601963 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846656084 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846668005 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846672058 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846678972 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846698999 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846709967 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846723080 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846734047 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846757889 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846770048 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846818924 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846821070 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846831083 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846843004 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846860886 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846873045 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846884012 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846905947 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846916914 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846918106 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846926928 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846940041 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846951008 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846965075 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.846971035 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.846982956 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.847006083 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.847069979 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850155115 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850207090 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850224018 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850272894 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850318909 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850337982 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850380898 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850450993 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850512028 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850594997 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850605965 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850619078 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850656986 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850668907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850681067 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850706100 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850739002 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850786924 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850791931 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850802898 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850815058 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850867987 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850904942 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850925922 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850936890 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850948095 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850969076 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.850987911 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.850999117 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851005077 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851072073 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851073980 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851083994 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851129055 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851140022 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851175070 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851206064 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851218939 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851229906 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851264000 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851275921 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851294041 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851294994 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851336002 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851346970 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851356983 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851357937 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851371050 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851382017 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851421118 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851433039 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851444006 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851454020 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851468086 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851480961 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851502895 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851511002 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851515055 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851537943 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851548910 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851557016 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851560116 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851573944 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851584911 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851596117 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851608038 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851614952 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851643085 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851650953 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851654053 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851665974 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851676941 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851687908 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851687908 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851699114 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851715088 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851720095 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851731062 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851758957 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851761103 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851768970 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851788998 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851810932 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851862907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851862907 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851875067 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851886988 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851897955 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851917982 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851934910 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851968050 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851978064 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.851979017 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.851990938 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852010965 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852021933 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852081060 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852108002 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852118969 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852129936 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852140903 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852145910 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852166891 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852179050 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852185011 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852199078 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852210999 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852233887 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852241039 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852278948 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852287054 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852298021 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852318048 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852329969 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852339029 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852339983 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852372885 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852390051 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852401972 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852412939 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852423906 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852425098 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852433920 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852447033 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852458954 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852468967 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852479935 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852488041 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852490902 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852510929 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852521896 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852533102 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852543116 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852544069 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852566957 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852608919 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852643967 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.852801085 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852814913 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.852888107 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855079889 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855104923 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855151892 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855190039 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855258942 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855271101 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855282068 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855295897 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855307102 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855318069 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855351925 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855391979 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855405092 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855417967 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855474949 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855495930 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855555058 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855745077 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855756044 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855770111 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855781078 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855803013 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855817080 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855828047 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855830908 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855848074 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855859995 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855870962 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855900049 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855907917 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855920076 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855932951 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855938911 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.855942965 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.855988979 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856025934 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856038094 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856049061 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856060028 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856070042 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856081009 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856092930 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856103897 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856113911 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856126070 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856137037 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856148005 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856158972 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856164932 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856170893 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856182098 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856193066 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856204033 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856225014 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856235027 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856235981 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856247902 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856261015 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856271982 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856280088 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856345892 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856348038 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856417894 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856475115 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856540918 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856555939 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856570959 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856595993 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856625080 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856637001 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856642008 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856647015 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856699944 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856719971 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856720924 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856733084 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856767893 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856843948 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856856108 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856875896 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856887102 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856937885 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856942892 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.856949091 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856961012 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.856971979 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857021093 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857033014 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857044935 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857067108 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857078075 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857088089 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857100964 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857124090 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857127905 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857139111 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857158899 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857170105 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857204914 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857233047 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857299089 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857359886 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857363939 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857376099 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857389927 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857446909 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857445955 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857458115 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857518911 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857521057 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857532978 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857543945 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857554913 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857566118 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857585907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857593060 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857597113 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857606888 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857619047 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857630014 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857650042 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857661009 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857671022 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857671976 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857697964 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857718945 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857729912 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857733965 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857742071 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857754946 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857765913 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857785940 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857798100 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857800961 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857809067 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857820034 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857831955 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857842922 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857862949 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857873917 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857880116 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857886076 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857897043 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857908964 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857919931 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857932091 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857940912 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857953072 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857963085 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.857964993 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857975960 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.857988119 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858005047 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858007908 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858020067 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858031988 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858042955 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858045101 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858053923 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858066082 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858078957 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858078957 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858091116 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858103037 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858123064 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858130932 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858144999 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858156919 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858169079 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858181953 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858217955 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858225107 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858237028 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858263016 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858285904 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858298063 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858308077 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858309984 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858323097 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858335018 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858345032 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858376026 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858387947 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858396053 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858397961 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858428001 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858439922 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858445883 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858469963 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858480930 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858481884 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858494997 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858505964 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858565092 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858567953 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858576059 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858645916 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858705044 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858784914 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858799934 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858812094 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858823061 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858875036 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858886003 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858896971 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858899117 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858925104 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858936071 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858948946 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858958960 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.858983994 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.858995914 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859006882 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.859026909 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859080076 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.859122992 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859133959 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859143972 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859154940 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859165907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859203100 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.859210968 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859222889 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859234095 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859242916 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.859245062 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859258890 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859270096 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859281063 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859292030 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859302998 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859309912 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.859323978 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859334946 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859345913 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859357119 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859359980 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.859440088 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.859863997 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859875917 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859916925 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859929085 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859929085 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.859940052 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859954119 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859966993 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859978914 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.859981060 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.860013962 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.860055923 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.903301954 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.904057980 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.904268980 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.904386997 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.904531956 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.904644966 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.904772043 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.904881001 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.905025959 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.905128956 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.905246973 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.905350924 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.905466080 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.905524015 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.922350883 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.924278021 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.924431086 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.924520969 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.924629927 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.924669027 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.929270983 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.929502010 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.929631948 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.929698944 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:13.971194983 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:13.971330881 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.019279957 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.019341946 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.022242069 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.022469044 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.022604942 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.022699118 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.022809029 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.022902012 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.023022890 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.023127079 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.023231983 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.023292065 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.027462006 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.027692080 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.027822018 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.027909040 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.071355104 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.071589947 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.084589958 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.084965944 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.085103989 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.085196972 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.085295916 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.090221882 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.090473890 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.090622902 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.090702057 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.131181955 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.131375074 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.159441948 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.159595013 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.159621954 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.159714937 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.159782887 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.159851074 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.159904957 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.159971952 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.160029888 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.160087109 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.160104036 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.164608002 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.164747953 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.207190037 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.207247972 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.223803997 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.223959923 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224037886 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224102974 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224172115 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224220037 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.224236012 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224294901 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224347115 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224404097 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224456072 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224524975 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224580050 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224658012 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.224674940 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.228934050 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.229094028 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.229188919 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.229206085 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.275196075 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.275840998 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.276073933 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.276185989 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.276331902 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.276407003 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.284490108 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.284686089 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.285038948 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.285186052 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.285300016 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.285425901 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.285525084 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.285651922 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.285746098 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.285866022 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.285964012 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.286108017 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.286214113 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.286338091 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.286408901 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.289731026 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289799929 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.289818048 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289830923 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289841890 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289855957 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289868116 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289890051 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289895058 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.289901018 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289911985 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289923906 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289935112 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289937973 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.289957047 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289968967 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289979935 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.289988995 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290003061 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290015936 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290026903 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290028095 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290038109 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290054083 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290060043 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290071964 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290082932 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290093899 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290105104 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290112972 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290116072 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290138960 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290150881 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290153027 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290163040 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290174961 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290184975 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290194988 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290210009 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290225983 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290237904 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290250063 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290251017 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290275097 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290287018 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290298939 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290306091 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290309906 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290322065 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290343046 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290347099 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290359974 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290371895 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290383101 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290390968 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290431976 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290465117 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290618896 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290632010 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290643930 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290657043 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290679932 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290682077 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290693998 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290707111 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290716887 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290716887 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290772915 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290843010 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290855885 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290867090 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290878057 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290889025 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290899992 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290910959 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290913105 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290921926 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290932894 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290944099 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290955067 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290966034 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290973902 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.290987015 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.290998936 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291011095 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291022062 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291033983 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291033983 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291044950 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291055918 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291079044 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291090012 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291100979 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291102886 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291111946 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291125059 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291136026 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291146040 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291151047 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291167974 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291181087 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291192055 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291193008 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291203022 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291224957 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291224957 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291237116 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291249990 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291269064 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291270971 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291282892 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291294098 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291306019 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291315079 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291327000 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291338921 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291349888 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291354895 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291364908 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291389942 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291410923 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291423082 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291434050 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291441917 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291450024 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291461945 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291470051 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291485071 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291498899 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291516066 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291527987 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291527987 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291539907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291553974 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291558027 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291583061 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291588068 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291600943 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291610956 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291618109 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291640997 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291651964 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291657925 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291662931 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291682959 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291695118 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291727066 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291735888 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291749001 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291759968 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291774035 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291781902 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291802883 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291804075 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291815996 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291827917 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291838884 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291877985 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.291902065 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291913986 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291925907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291937113 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291948080 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291969061 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.291975975 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292020082 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292021990 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292048931 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292061090 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292073011 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292084932 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292113066 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292119026 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292130947 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292141914 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292166948 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292170048 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292182922 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292195082 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292208910 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292215109 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292227983 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292238951 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292248964 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292262077 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292275906 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292287111 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292288065 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292300940 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292315006 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292320967 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292342901 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292351961 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292355061 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292373896 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292382956 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292431116 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292473078 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292485952 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292496920 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292507887 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292526960 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292538881 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292541027 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292572975 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292581081 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292593002 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.292604923 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.292820930 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.339117050 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.340179920 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.340393066 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.340483904 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.340600014 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.340739012 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.340888023 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.340986967 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.341109037 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.341208935 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.341324091 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.341430902 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.341562986 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.341664076 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.341787100 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.341886044 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.342004061 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.342101097 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.342252016 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.342312098 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.345323086 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345347881 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345360994 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345372915 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345489025 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345498085 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.345511913 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345523119 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345536947 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345547915 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345560074 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345581055 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345630884 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345642090 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345643997 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.345647097 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345706940 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.345727921 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345741034 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345752001 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345762968 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345772982 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345783949 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345803976 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345808029 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.345814943 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345828056 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345839977 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345850945 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345854998 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.345870972 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345890999 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345916033 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.345921040 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345933914 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345949888 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345963001 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.345980883 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345993042 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.345998049 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346028090 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346040010 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346081018 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346098900 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346100092 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346115112 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346132994 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346143961 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346146107 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346184969 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346190929 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346204042 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346210957 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346214056 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346227884 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346240044 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346266031 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346266985 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346278906 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346290112 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346318007 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346323013 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346329927 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346350908 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346370935 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346384048 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346405983 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346422911 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346437931 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346481085 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346503019 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346514940 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346534014 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346554041 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346565008 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346565962 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346599102 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346626043 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346642971 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346683979 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346700907 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346721888 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346735954 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346746922 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346782923 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346784115 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346796036 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346818924 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346849918 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346851110 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346863985 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346883059 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346899033 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346911907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346915007 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346923113 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346975088 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.346976042 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.346988916 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347002983 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347013950 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347024918 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347045898 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347045898 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347057104 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347088099 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347101927 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347114086 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347116947 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347147942 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347158909 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347170115 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347177982 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347196102 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347208023 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347218990 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347224951 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347232103 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347243071 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347254038 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347260952 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347266912 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347279072 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347309113 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347342968 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347348928 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347357035 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347412109 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347414017 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347426891 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347471952 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347480059 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347482920 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347497940 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347537994 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347543955 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347549915 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347560883 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347600937 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347604036 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347613096 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347623110 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347634077 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347655058 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347666025 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347690105 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347698927 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347709894 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347721100 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347728968 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347742081 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347753048 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347767115 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347770929 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347810984 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347821951 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347821951 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347843885 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347856045 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347867012 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347867966 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347877026 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347891092 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347894907 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347902060 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347913027 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347923994 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347956896 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347961903 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.347969055 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347980022 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.347990990 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348031044 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348047018 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348058939 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348072052 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348083973 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348097086 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348123074 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348134995 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348143101 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348146915 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348159075 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348184109 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348186970 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348213911 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348239899 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348248005 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348262072 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348273039 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348292112 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348304033 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348319054 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348356962 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348437071 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348448992 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348459005 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348469973 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348480940 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348491907 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348500967 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348501921 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348526001 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348537922 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348548889 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348558903 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348560095 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348571062 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348592997 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348603010 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348612070 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348613977 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348624945 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348635912 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348648071 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348648071 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348659039 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348670006 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348680973 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348691940 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348695993 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348704100 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348714113 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348737001 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348747969 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348748922 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348761082 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348772049 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348783016 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348793030 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348800898 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348807096 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348819017 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348829985 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348833084 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348840952 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348851919 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348862886 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348875046 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348886013 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348892927 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348897934 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348908901 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348921061 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348932981 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348943949 CEST1566649699109.107.181.162192.168.2.7
                              Oct 12, 2024 22:39:14.348943949 CEST4969915666192.168.2.7109.107.181.162
                              Oct 12, 2024 22:39:14.348954916 CEST1566649699109.107.181.162192.168.2.7
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Oct 12, 2024 22:39:06.995239973 CEST192.168.2.71.1.1.10xbdccStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Oct 12, 2024 22:39:07.002191067 CEST1.1.1.1192.168.2.70xbdccNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                              Oct 12, 2024 22:39:07.002191067 CEST1.1.1.1192.168.2.70xbdccNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                              Oct 12, 2024 22:39:07.002191067 CEST1.1.1.1192.168.2.70xbdccNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.749700172.67.74.1524436768C:\Users\user\Desktop\bot.exe
                              TimestampBytes transferredDirectionData
                              2024-10-12 20:39:08 UTC100OUTGET / HTTP/1.1
                              Accept: text/html; text/plain; */*
                              Host: api.ipify.org
                              Cache-Control: no-cache
                              2024-10-12 20:39:08 UTC211INHTTP/1.1 200 OK
                              Date: Sat, 12 Oct 2024 20:39:08 GMT
                              Content-Type: text/plain
                              Content-Length: 11
                              Connection: close
                              Vary: Origin
                              CF-Cache-Status: DYNAMIC
                              Server: cloudflare
                              CF-RAY: 8d19e5c66ba732d3-EWR
                              2024-10-12 20:39:08 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                              Data Ascii: 8.46.123.33


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:16:39:04
                              Start date:12/10/2024
                              Path:C:\Users\user\Desktop\bot.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\bot.exe"
                              Imagebase:0x7ff7f8910000
                              File size:2'746'880 bytes
                              MD5 hash:3870B1E1CA36DEEC20214C6AE51F8F16
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:16:39:05
                              Start date:12/10/2024
                              Path:C:\Users\user\Desktop\bot.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\bot.exe"
                              Imagebase:0x7ff7f8910000
                              File size:2'746'880 bytes
                              MD5 hash:3870B1E1CA36DEEC20214C6AE51F8F16
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_MeduzaStealer, Description: Yara detected Meduza Stealer, Source: 00000002.00000002.1456698198.000001EC251E0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:12
                              Start time:16:39:22
                              Start date:12/10/2024
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\bot.exe"
                              Imagebase:0x7ff7f3ae0000
                              File size:289'792 bytes
                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:13
                              Start time:16:39:22
                              Start date:12/10/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff75da10000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:14
                              Start time:16:39:23
                              Start date:12/10/2024
                              Path:C:\Windows\System32\PING.EXE
                              Wow64 process (32bit):false
                              Commandline:ping 1.1.1.1 -n 1 -w 3000
                              Imagebase:0x7ff669640000
                              File size:22'528 bytes
                              MD5 hash:2F46799D79D22AC72C241EC0322B011D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:1.9%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:14.2%
                                Total number of Nodes:1717
                                Total number of Limit Nodes:23
                                execution_graph 12117 7ff7f8911dc0 12127 7ff7f8a12cd0 12117->12127 12119 7ff7f8911d5a 12119->12117 12120 7ff7f8912256 12119->12120 12125 7ff7f8911d30 rand 12119->12125 12126 7ff7f8a12cd0 47 API calls 12119->12126 12167 7ff7f89b9390 12119->12167 12178 7ff7f89b95e0 12119->12178 12189 7ff7f8911910 12119->12189 12195 7ff7f89499a0 12119->12195 12125->12119 12126->12119 12130 7ff7f8a12d0a 12127->12130 12135 7ff7f8a12d68 12127->12135 12128 7ff7f8a12d7a 12132 7ff7f8a12de8 12128->12132 12140 7ff7f8a12d88 12128->12140 12129 7ff7f8a12d11 12134 7ff7f8a0f8b0 32 API calls 12129->12134 12157 7ff7f8a12d1a 12129->12157 12130->12129 12131 7ff7f89b95e0 32 API calls 12130->12131 12131->12135 12132->12157 12198 7ff7f8a0f8b0 12132->12198 12133 7ff7f8a12d44 12133->12119 12134->12140 12135->12128 12135->12129 12136 7ff7f8a12d9d 12138 7ff7f8a12db9 12136->12138 12141 7ff7f8a0f8b0 32 API calls 12136->12141 12136->12157 12137 7ff7f8a130f1 12143 7ff7f8a1acd0 14 API calls 12137->12143 12145 7ff7f8a1305c 12138->12145 12156 7ff7f8a12f75 12138->12156 12138->12157 12140->12136 12140->12137 12142 7ff7f89499a0 memcmp 12140->12142 12146 7ff7f8a12e53 12140->12146 12141->12138 12142->12146 12144 7ff7f8a130fb 12143->12144 12147 7ff7f8a1310f 12144->12147 12148 7ff7f8a13123 12144->12148 12149 7ff7f8a13068 12145->12149 12155 7ff7f8a130c8 12145->12155 12146->12136 12151 7ff7f8a0f8b0 32 API calls 12146->12151 12222 7ff7f8a1ae20 12147->12222 12153 7ff7f8a1b390 14 API calls 12148->12153 12154 7ff7f89499a0 memcmp 12149->12154 12149->12157 12150 7ff7f8a0f8b0 32 API calls 12150->12133 12151->12136 12165 7ff7f8a13128 12153->12165 12154->12157 12155->12137 12203 7ff7f8a1acd0 12155->12203 12156->12157 12161 7ff7f8a0f8b0 32 API calls 12156->12161 12157->12133 12157->12150 12161->12157 12164 7ff7f8a1b390 14 API calls 12164->12165 12165->12164 12166 7ff7f8a1ae20 3 API calls 12165->12166 12225 7ff7f89b9e00 12165->12225 12229 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 12165->12229 12166->12165 12168 7ff7f89b9405 12167->12168 12169 7ff7f89b93bc 12167->12169 12170 7ff7f89b93c3 12168->12170 12174 7ff7f89b9416 12168->12174 12169->12170 12171 7ff7f89b95e0 32 API calls 12169->12171 12172 7ff7f8a0f8b0 32 API calls 12170->12172 12176 7ff7f89b93c8 12170->12176 12171->12168 12172->12176 12173 7ff7f89b93f2 12173->12119 12175 7ff7f8a0f8b0 32 API calls 12174->12175 12174->12176 12175->12176 12176->12173 12177 7ff7f8a0f8b0 32 API calls 12176->12177 12177->12173 12179 7ff7f89b95fd 12178->12179 12188 7ff7f89b964d 12178->12188 12180 7ff7f89b9665 12179->12180 12181 7ff7f89b961a 12179->12181 12182 7ff7f89b95e0 32 API calls 12179->12182 12180->12181 12183 7ff7f89b9676 12180->12183 12184 7ff7f8a0f8b0 32 API calls 12181->12184 12186 7ff7f89b9623 12181->12186 12182->12180 12185 7ff7f8a0f8b0 32 API calls 12183->12185 12183->12186 12184->12186 12185->12186 12187 7ff7f8a0f8b0 32 API calls 12186->12187 12186->12188 12187->12188 12188->12119 12190 7ff7f8a12cd0 47 API calls 12189->12190 12194 7ff7f8911932 12190->12194 12191 7ff7f89119a0 12192 7ff7f89499a0 memcmp 12192->12194 12193 7ff7f89b9390 32 API calls 12193->12194 12194->12191 12194->12192 12194->12193 12196 7ff7f8949ab6 memcmp 12195->12196 12196->12119 12199 7ff7f8a0f8be 12198->12199 12200 7ff7f8a0f8c6 12199->12200 12230 7ff7f8a1c950 12199->12230 12200->12157 12205 7ff7f8a1acdd 12203->12205 12204 7ff7f8a130db 12204->12165 12218 7ff7f8a1b390 12204->12218 12205->12204 12206 7ff7f8a1acd0 14 API calls 12205->12206 12207 7ff7f8a1ad62 12206->12207 12208 7ff7f8a1acd0 14 API calls 12207->12208 12209 7ff7f8a1ad87 12208->12209 12290 7ff7f8a1afa0 12209->12290 12213 7ff7f8a1ad8c 12214 7ff7f8a1ade6 12213->12214 12215 7ff7f8a1b390 14 API calls 12213->12215 12295 7ff7f89383b0 12213->12295 12301 7ff7f89384e0 12213->12301 12306 7ff7f89387d0 12214->12306 12215->12213 12220 7ff7f8a1b39a 12218->12220 12221 7ff7f8a1acd0 14 API calls 12220->12221 12319 7ff7f892bbf0 12220->12319 12221->12220 12223 7ff7f8a1afa0 3 API calls 12222->12223 12224 7ff7f8a1ae29 12223->12224 12224->12157 12226 7ff7f89b9e1d 12225->12226 12228 7ff7f89b9e3d 12225->12228 12227 7ff7f8a0f8b0 32 API calls 12226->12227 12226->12228 12227->12228 12228->12165 12231 7ff7f8a1c963 12230->12231 12240 7ff7f89cbff0 12231->12240 12233 7ff7f8a1c989 12249 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 12233->12249 12241 7ff7f89cc024 12240->12241 12250 7ff7f89f9bf0 12241->12250 12244 7ff7f89f9bf0 31 API calls 12247 7ff7f89cc0a3 12244->12247 12245 7ff7f89cc041 strlen 12245->12244 12265 7ff7f89e3360 12247->12265 12248 7ff7f89cc0f3 12248->12233 12251 7ff7f89f9c25 12250->12251 12252 7ff7f89f9d2d 12250->12252 12255 7ff7f89f9c4b 12251->12255 12256 7ff7f89f9ce8 12251->12256 12253 7ff7f8a1c0a0 23 API calls 12252->12253 12254 7ff7f89f9d39 12253->12254 12254->12245 12258 7ff7f89f9c5d 12255->12258 12259 7ff7f89f9cc8 12255->12259 12276 7ff7f89fe690 12256->12276 12262 7ff7f89f9c79 memcpy 12258->12262 12264 7ff7f89f9c81 12258->12264 12268 7ff7f89fa480 12259->12268 12260 7ff7f89f9c9e 12260->12245 12262->12264 12263 7ff7f89f9c90 memcpy 12263->12260 12264->12260 12264->12263 12266 7ff7f89cac20 23 API calls 12265->12266 12267 7ff7f89e338a 12266->12267 12267->12248 12269 7ff7f89fa4ae 12268->12269 12270 7ff7f89fa4b4 12268->12270 12269->12270 12271 7ff7f89fa4bb memcpy 12269->12271 12272 7ff7f89fa4e9 memcpy 12270->12272 12273 7ff7f89fa4e3 12270->12273 12271->12270 12272->12273 12274 7ff7f89fa50e 12273->12274 12275 7ff7f89fa55d memcpy 12273->12275 12274->12260 12275->12274 12277 7ff7f89fe6d2 12276->12277 12278 7ff7f89fe84a 12277->12278 12282 7ff7f89fe6e9 12277->12282 12279 7ff7f8a1c0a0 23 API calls 12278->12279 12281 7ff7f89fe856 12279->12281 12280 7ff7f8a1ab80 malloc 12283 7ff7f89fe715 12280->12283 12281->12260 12282->12280 12284 7ff7f89fe735 12283->12284 12286 7ff7f89fe72a memcpy 12283->12286 12285 7ff7f89fe769 12284->12285 12288 7ff7f89fe759 memcpy 12284->12288 12287 7ff7f89fe771 12285->12287 12289 7ff7f89fe7bc memcpy 12285->12289 12286->12284 12287->12260 12288->12285 12289->12287 12291 7ff7f8a1afc0 12290->12291 12292 7ff7f8a1afb4 12290->12292 12310 7ff7f892b6c0 GetLastError TlsGetValue SetLastError 12291->12310 12292->12213 12294 7ff7f8a1afcb 12294->12213 12296 7ff7f89383ca 12295->12296 12297 7ff7f89384da abort 12296->12297 12298 7ff7f8938486 12296->12298 12299 7ff7f89383e2 12296->12299 12311 7ff7f8938670 12298->12311 12299->12213 12302 7ff7f8938508 12301->12302 12303 7ff7f89385bc 12302->12303 12304 7ff7f8938670 13 API calls 12302->12304 12305 7ff7f893860c abort 12302->12305 12303->12213 12304->12302 12305->12303 12307 7ff7f89387d6 abort 12306->12307 12308 7ff7f8a1acd0 12 API calls 12307->12308 12309 7ff7f89387e3 abort 12308->12309 12310->12294 12312 7ff7f8938681 12311->12312 12313 7ff7f893868e 12311->12313 12312->12313 12314 7ff7f89387c0 abort 12312->12314 12313->12299 12315 7ff7f89387d0 abort 12314->12315 12317 7ff7f8a1acd0 11 API calls 12315->12317 12318 7ff7f89387e3 abort 12317->12318 12320 7ff7f892bc32 RaiseException 12319->12320 12321 7ff7f892bc00 RaiseException 12319->12321 12322 7ff7f892bc70 abort RaiseException 12320->12322 12321->12220 12323 7ff7f892bce5 12322->12323 12323->12220 12324 7ff7f892a1c0 12325 7ff7f892a1c9 12324->12325 12327 7ff7f892a1d3 12324->12327 12325->12327 12328 7ff7f8925b20 12325->12328 12329 7ff7f8925f99 12328->12329 12330 7ff7f8925b51 strncmp 12328->12330 12329->12330 12336 7ff7f8925b6e 12329->12336 12330->12336 12331 7ff7f8925c6b strlen 12331->12336 12337 7ff7f8925f70 12331->12337 12333 7ff7f8925bd1 strlen 12333->12336 12333->12337 12334 7ff7f8919bf0 free strcmp 12334->12336 12335 7ff7f8925c33 strlen 12335->12336 12336->12331 12336->12333 12336->12334 12336->12335 12336->12337 12338 7ff7f8915a20 12336->12338 12337->12327 12340 7ff7f8915a3e 12338->12340 12339 7ff7f8915a8c 12350 7ff7f8915bef 12339->12350 12365 7ff7f8919910 12339->12365 12340->12339 12341 7ff7f8915b38 12340->12341 12344 7ff7f8915b72 12340->12344 12341->12344 12346 7ff7f8916420 12341->12346 12349 7ff7f8915c58 12341->12349 12343 7ff7f8915abd 12343->12336 12344->12343 12347 7ff7f8917a8f 12344->12347 12348 7ff7f8917be0 12344->12348 12361 7ff7f891648f 12346->12361 12375 7ff7f8918d50 12346->12375 12381 7ff7f8917290 12347->12381 12352 7ff7f8917290 strcmp 12348->12352 12349->12346 12357 7ff7f8915c7d 12349->12357 12350->12343 12369 7ff7f8916900 12350->12369 12351 7ff7f8915ab8 12356 7ff7f8915a20 strcmp 12351->12356 12363 7ff7f8917ba8 12352->12363 12354 7ff7f8a1c6ae 12354->12336 12355 7ff7f8a1c6a0 free 12355->12354 12356->12343 12360 7ff7f8915a20 strcmp 12357->12360 12360->12343 12361->12354 12361->12355 12362 7ff7f8917b98 12362->12363 12364 7ff7f8918d50 strcmp 12362->12364 12363->12336 12364->12363 12366 7ff7f8919980 12365->12366 12367 7ff7f8915a9c 12366->12367 12399 7ff7f8916650 12366->12399 12367->12343 12367->12350 12367->12351 12370 7ff7f891690f 12369->12370 12371 7ff7f891692b 12370->12371 12372 7ff7f8915a20 2 API calls 12370->12372 12371->12344 12373 7ff7f8916982 12372->12373 12373->12371 12374 7ff7f8916650 2 API calls 12373->12374 12374->12371 12379 7ff7f8918e50 12375->12379 12380 7ff7f8918d6e 12375->12380 12377 7ff7f8915a20 2 API calls 12377->12380 12378 7ff7f8918d50 2 API calls 12378->12380 12379->12361 12380->12377 12380->12378 12380->12379 12403 7ff7f8918b30 12380->12403 12382 7ff7f89172b4 12381->12382 12383 7ff7f89173a7 12382->12383 12385 7ff7f891734a 12382->12385 12396 7ff7f8917430 12382->12396 12426 7ff7f8916760 12383->12426 12385->12362 12386 7ff7f8915a20 2 API calls 12387 7ff7f8917a36 12386->12387 12387->12385 12388 7ff7f8916650 2 API calls 12387->12388 12388->12385 12389 7ff7f8917823 12389->12385 12389->12387 12397 7ff7f8917831 12389->12397 12390 7ff7f8917968 12392 7ff7f8915a20 2 API calls 12390->12392 12391 7ff7f8916a40 2 API calls 12393 7ff7f8917978 12391->12393 12392->12393 12393->12391 12395 7ff7f8917590 12393->12395 12395->12385 12395->12386 12396->12385 12396->12387 12396->12389 12396->12390 12396->12393 12396->12395 12431 7ff7f8916a40 12396->12431 12397->12385 12398 7ff7f8916650 2 API calls 12397->12398 12398->12385 12401 7ff7f8916700 12399->12401 12402 7ff7f891668f 12399->12402 12400 7ff7f8915a20 2 API calls 12400->12402 12401->12366 12402->12400 12402->12401 12404 7ff7f8918b43 12403->12404 12411 7ff7f8918b7a 12403->12411 12405 7ff7f8918b5d 12404->12405 12407 7ff7f8918bd0 12404->12407 12404->12411 12406 7ff7f8915a20 free 12405->12406 12410 7ff7f8918b65 12406->12410 12407->12411 12412 7ff7f8919bf0 12407->12412 12409 7ff7f8918c39 strcmp 12409->12411 12410->12409 12410->12411 12411->12380 12418 7ff7f8917a70 12412->12418 12414 7ff7f8919c1a 12414->12411 12415 7ff7f8915a20 2 API calls 12417 7ff7f8919c04 12415->12417 12416 7ff7f8916650 2 API calls 12416->12417 12417->12414 12417->12415 12417->12416 12419 7ff7f8917a8f 12418->12419 12420 7ff7f8917be0 12418->12420 12422 7ff7f8917290 2 API calls 12419->12422 12421 7ff7f8917290 2 API calls 12420->12421 12424 7ff7f8917ba8 12421->12424 12423 7ff7f8917b98 12422->12423 12423->12424 12425 7ff7f8918d50 2 API calls 12423->12425 12424->12417 12425->12424 12427 7ff7f89167a5 12426->12427 12428 7ff7f891677a 12426->12428 12427->12385 12428->12427 12429 7ff7f8915a20 2 API calls 12428->12429 12430 7ff7f89168cb 12429->12430 12430->12385 12432 7ff7f8916a95 12431->12432 12433 7ff7f8916a5f 12431->12433 12432->12396 12435 7ff7f8916a6c 12433->12435 12440 7ff7f8916b10 12433->12440 12434 7ff7f8915a20 2 API calls 12437 7ff7f8916a88 12434->12437 12435->12432 12436 7ff7f8916a40 2 API calls 12435->12436 12435->12437 12436->12437 12437->12432 12437->12434 12438 7ff7f8915a20 2 API calls 12438->12440 12439 7ff7f8916a40 2 API calls 12439->12440 12440->12432 12440->12438 12440->12439 12441 7ff7f8916c30 12440->12441 12442 7ff7f8916a40 free strcmp 12441->12442 12443 7ff7f8915a20 free strcmp 12441->12443 12444 7ff7f891727e 12441->12444 12442->12441 12443->12441 13256 7ff7f892b7c0 TryEnterCriticalSection 13257 7ff7f89367c0 13258 7ff7f89367fa 13257->13258 13259 7ff7f89357b0 6 API calls 13258->13259 13262 7ff7f8936816 13259->13262 13261 7ff7f893689e 13263 7ff7f8936866 13262->13263 13265 7ff7f8935910 13262->13265 13263->13261 13264 7ff7f8935910 9 API calls 13263->13264 13264->13263 13267 7ff7f8935930 13265->13267 13266 7ff7f893595b 13266->13262 13267->13266 13268 7ff7f89357b0 6 API calls 13267->13268 13269 7ff7f893598b 13268->13269 13269->13266 13270 7ff7f8935993 memcpy 13269->13270 13271 7ff7f89359b2 free 13270->13271 13272 7ff7f89359bf 13270->13272 13271->13266 13273 7ff7f8935680 4 API calls 13272->13273 13274 7ff7f89359c6 13273->13274 13274->13266 13275 7ff7f89359e5 LeaveCriticalSection 13274->13275 13275->13266 13276 7ff7f892ebc0 13277 7ff7f892ebcb 13276->13277 13278 7ff7f89357b0 6 API calls 13277->13278 13279 7ff7f892ebd2 13278->13279 13654 7ff7f892acc0 13655 7ff7f892acd6 13654->13655 13656 7ff7f892ace0 13654->13656 13656->13655 13657 7ff7f892acf7 EnterCriticalSection LeaveCriticalSection 13656->13657 13657->13655 13658 7ff7f89190c4 13659 7ff7f89190cf 13658->13659 13663 7ff7f8918f40 13658->13663 13660 7ff7f8915a20 2 API calls 13659->13660 13664 7ff7f8919000 13659->13664 13660->13663 13661 7ff7f8917290 2 API calls 13661->13663 13662 7ff7f8918d50 2 API calls 13662->13663 13663->13661 13663->13662 13663->13664 12891 7ff7f8931ec9 12893 7ff7f8931ed2 12891->12893 12892 7ff7f893245d strlen 12894 7ff7f892efa0 3 API calls 12892->12894 12893->12892 12896 7ff7f892efa0 3 API calls 12893->12896 12895 7ff7f8932474 12894->12895 12895->12895 12897 7ff7f8931f0c 12896->12897 12897->12892 13280 7ff7f89347c7 13281 7ff7f89357b0 6 API calls 13280->13281 13282 7ff7f89347dd _errno 13281->13282 13665 7ff7f89338cc 13668 7ff7f89338e2 13665->13668 13666 7ff7f8935f60 9 API calls 13666->13668 13667 7ff7f8933d2b 13668->13666 13668->13667 12445 7ff7f892b5d0 Sleep 13283 7ff7f892c3d0 fgetpos 13284 7ff7f892c3e2 13283->13284 13672 7ff7f892b8d0 13673 7ff7f892b9ba 13672->13673 13676 7ff7f892b8f3 13672->13676 13674 7ff7f892b9b0 13674->13673 13675 7ff7f892bacc RtlUnwindEx abort RaiseException 13674->13675 13676->13673 13676->13674 13677 7ff7f892b94e 13676->13677 13679 7ff7f892ba20 13676->13679 13677->13673 13678 7ff7f892b9ab abort 13677->13678 13680 7ff7f892b97a RaiseException 13677->13680 13678->13674 13679->13673 13679->13678 13681 7ff7f892ba7a RtlUnwindEx 13679->13681 13680->13678 13681->13678 13682 7ff7f8931cd5 13683 7ff7f8931cf6 13682->13683 13687 7ff7f8931d14 13682->13687 13685 7ff7f892efa0 3 API calls 13683->13685 13684 7ff7f892f140 6 API calls 13686 7ff7f893222b 13684->13686 13685->13687 13686->13686 13687->13684 12902 7ff7f8931e98 12903 7ff7f8931eaf 12902->12903 12904 7ff7f8931ec4 12902->12904 12908 7ff7f8930d20 12903->12908 12906 7ff7f8930d20 24 API calls 12904->12906 12907 7ff7f893225c 12906->12907 12907->12907 12909 7ff7f8930d3d 12908->12909 12910 7ff7f8930e40 12909->12910 12911 7ff7f8930dd6 12909->12911 12914 7ff7f8930f2c 12910->12914 12915 7ff7f892efa0 3 API calls 12910->12915 12916 7ff7f8930800 12911->12916 12913 7ff7f8930de1 12913->12904 12914->12904 12915->12913 12917 7ff7f8930833 12916->12917 12918 7ff7f8930ca8 fputc 12917->12918 12919 7ff7f8930cec fputc 12917->12919 12920 7ff7f8930d09 fputc 12917->12920 12921 7ff7f8930b90 fputc 12917->12921 12922 7ff7f8930ba0 fputc 12917->12922 12923 7ff7f8930ab0 fputc 12917->12923 12924 7ff7f8930c50 fputc 12917->12924 12925 7ff7f892fe10 13 API calls 12917->12925 12926 7ff7f8930ac8 fputc 12917->12926 12918->12917 12919->12917 12920->12917 12921->12917 12922->12917 12923->12917 12924->12917 12925->12917 12926->12917 13688 7ff7f891cc9c 13692 7ff7f891cca9 13688->13692 13694 7ff7f8919fa8 13688->13694 13689 7ff7f891ccfb strcmp 13689->13692 13690 7ff7f891cd34 strcmp 13691 7ff7f8923eb5 strcmp 13690->13691 13690->13694 13691->13692 13693 7ff7f8924381 13691->13693 13692->13689 13692->13690 13692->13694 13295 7ff7f8915f9f 13297 7ff7f8915fa6 13295->13297 13296 7ff7f8915bb8 13297->13296 13298 7ff7f8915a20 2 API calls 13297->13298 13298->13297 13695 7ff7f8915ca0 13696 7ff7f8916900 2 API calls 13695->13696 13697 7ff7f8915ca8 13696->13697 12446 7ff7f892b5a0 GetThreadId GetThreadId 12930 7ff7f892caa0 12931 7ff7f892cb70 12930->12931 12935 7ff7f892cabc 12930->12935 12934 7ff7f89357b0 6 API calls 12931->12934 12932 7ff7f892cb1d 12933 7ff7f892cadc memset 12933->12932 12934->12935 12935->12932 12935->12933 13299 7ff7f892b7a0 LeaveCriticalSection 13698 7ff7f892c4a0 13699 7ff7f89364f0 6 API calls 13698->13699 13700 7ff7f892c4d0 13699->13700 13701 7ff7f892c5f8 13700->13701 13708 7ff7f892c4f5 13700->13708 13702 7ff7f892c5d8 13701->13702 13703 7ff7f892c770 13701->13703 13711 7ff7f892c563 13701->13711 13704 7ff7f8935f60 9 API calls 13703->13704 13705 7ff7f892c6e0 13704->13705 13705->13702 13706 7ff7f892c790 _errno 13705->13706 13706->13702 13707 7ff7f892c621 13707->13702 13712 7ff7f89357b0 6 API calls 13707->13712 13709 7ff7f89357b0 6 API calls 13708->13709 13708->13711 13710 7ff7f892c8cb memcpy 13709->13710 13710->13711 13711->13702 13711->13705 13711->13707 13713 7ff7f892c972 memcpy 13712->13713 13713->13702 12936 7ff7f89316a5 12937 7ff7f89316b3 12936->12937 12938 7ff7f892f140 6 API calls 12937->12938 12939 7ff7f89316e0 12938->12939 12939->12939 12092 7ff7f89146a4 12093 7ff7f89146af 12092->12093 12106 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 12093->12106 12095 7ff7f89146b7 12096 7ff7f8914860 12095->12096 12097 7ff7f8914705 CreateToolhelp32Snapshot 12095->12097 12098 7ff7f8a05ca0 23 API calls 12096->12098 12101 7ff7f8914747 Process32First 12097->12101 12105 7ff7f89147f5 12097->12105 12100 7ff7f8914870 12098->12100 12104 7ff7f8914778 12101->12104 12102 7ff7f8914630 29 API calls 12102->12104 12103 7ff7f891478c Process32Next 12103->12104 12104->12102 12104->12103 12104->12105 13300 7ff7f8931fa3 13301 7ff7f8931fb3 fputc 13300->13301 13714 7ff7f8931ca4 13715 7ff7f8931ca9 13714->13715 13716 7ff7f892f340 6 API calls 13715->13716 13716->13715 13303 7ff7f89cb7b0 13304 7ff7f89cb875 13303->13304 13305 7ff7f89cb7d5 strlen 13303->13305 13308 7ff7f8a1bfb0 23 API calls 13304->13308 13306 7ff7f89cb7e5 13305->13306 13307 7ff7f89cb80f 13305->13307 13310 7ff7f89be620 23 API calls 13306->13310 13309 7ff7f89cb881 13308->13309 13311 7ff7f89cac20 23 API calls 13309->13311 13312 7ff7f89cb7f4 13310->13312 13313 7ff7f89cb8ba 13311->13313 13312->13307 13314 7ff7f89cb801 memcpy 13312->13314 13314->13307 13315 7ff7f892a7ab 13316 7ff7f892a731 13315->13316 13317 7ff7f892a7b5 13315->13317 13317->13316 13318 7ff7f892a8e4 VirtualProtect 13317->13318 13318->13316 13318->13317 12447 7ff7f8931db1 12449 7ff7f8931c58 12447->12449 12448 7ff7f89323fd strlen 12452 7ff7f892efa0 3 API calls 12448->12452 12449->12447 12449->12448 12450 7ff7f8932321 wcslen 12449->12450 12456 7ff7f892f140 12449->12456 12466 7ff7f892efa0 12449->12466 12451 7ff7f892f140 6 API calls 12450->12451 12453 7ff7f8932338 12451->12453 12452->12449 12453->12453 12474 7ff7f8936d60 12456->12474 12458 7ff7f892f23a 12458->12449 12459 7ff7f892f16f 12460 7ff7f892f308 fputc 12459->12460 12464 7ff7f892f189 12459->12464 12460->12459 12461 7ff7f8936d60 3 API calls 12461->12464 12462 7ff7f892f27c fputc 12463 7ff7f892f22d 12462->12463 12463->12458 12463->12462 12464->12458 12464->12461 12464->12463 12465 7ff7f892f206 fputc 12464->12465 12465->12464 12467 7ff7f892efcb 12466->12467 12469 7ff7f892f0b0 12466->12469 12468 7ff7f892f038 12467->12468 12471 7ff7f892f025 fputc 12467->12471 12473 7ff7f892f045 12467->12473 12472 7ff7f892f08c fputc 12468->12472 12468->12473 12469->12467 12470 7ff7f892f110 fputc 12469->12470 12470->12469 12471->12467 12471->12468 12472->12468 12473->12449 12475 7ff7f8937630 12474->12475 12476 7ff7f8936d7d ___lc_codepage_func 12475->12476 12479 7ff7f8936cd0 12476->12479 12478 7ff7f8936d95 12478->12459 12480 7ff7f8936d00 WideCharToMultiByte 12479->12480 12481 7ff7f8936ce4 12479->12481 12480->12481 12482 7ff7f8936d44 _errno 12480->12482 12481->12482 12483 7ff7f8936ceb 12481->12483 12482->12478 12483->12478 13319 7ff7f891dff8 13322 7ff7f891e00c 13319->13322 13320 7ff7f8914cc0 2 API calls 13321 7ff7f891ed03 strlen 13320->13321 13323 7ff7f8919fb2 13321->13323 13322->13320 13728 7ff7f892b4f9 GetSystemTimeAsFileTime 13729 7ff7f892b54f 13728->13729 12945 7ff7f8915ef8 12946 7ff7f8915a20 2 API calls 12945->12946 12947 7ff7f8915f08 12946->12947 12948 7ff7f8915a20 2 API calls 12947->12948 12949 7ff7f8915bb8 12947->12949 12948->12949 13324 7ff7f892c401 13325 7ff7f892c41e 13324->13325 13326 7ff7f892c450 13324->13326 13327 7ff7f8931990 2 API calls 13325->13327 13328 7ff7f8931990 2 API calls 13326->13328 13329 7ff7f892c437 13327->13329 13330 7ff7f892c465 13328->13330 12950 7ff7f8911f00 rand 12951 7ff7f8a12cd0 47 API calls 12950->12951 12952 7ff7f8911f39 12951->12952 12963 7ff7f89baff0 12952->12963 12954 7ff7f8911f47 12955 7ff7f89499a0 memcmp 12954->12955 12956 7ff7f8912256 12954->12956 12957 7ff7f89b9390 32 API calls 12954->12957 12958 7ff7f89b95e0 32 API calls 12954->12958 12959 7ff7f8912251 12954->12959 12961 7ff7f8911fb0 rand 12954->12961 12990 7ff7f8938180 12954->12990 12955->12954 12957->12954 12958->12954 12959->12956 12960 7ff7f8a1bcc0 14 API calls 12959->12960 12960->12956 12961->12954 12961->12961 12964 7ff7f89bb020 12963->12964 12968 7ff7f89bb075 12963->12968 12965 7ff7f89bb027 12964->12965 12966 7ff7f89b95e0 32 API calls 12964->12966 12967 7ff7f8a0f8b0 32 API calls 12965->12967 12974 7ff7f89bb030 12965->12974 12966->12968 12971 7ff7f89bb130 12967->12971 12968->12965 12969 7ff7f89bb086 12968->12969 12969->12971 12972 7ff7f89bb1da 12969->12972 12976 7ff7f89bb0a4 12969->12976 12970 7ff7f89bb05a 12970->12954 12973 7ff7f89499a0 memcmp 12971->12973 12971->12976 12975 7ff7f8a1acd0 14 API calls 12972->12975 12980 7ff7f89bb208 12972->12980 12973->12976 12974->12970 12985 7ff7f8a0f8b0 32 API calls 12974->12985 12979 7ff7f89bb1f2 12975->12979 12976->12974 12977 7ff7f8a0f8b0 32 API calls 12976->12977 12977->12974 12978 7ff7f8a1acd0 14 API calls 12978->12980 12979->12980 12983 7ff7f8a1b390 14 API calls 12979->12983 12980->12978 12981 7ff7f89bb24a 12980->12981 12982 7ff7f8a1b390 14 API calls 12980->12982 12987 7ff7f8a1ae20 3 API calls 12980->12987 12988 7ff7f89b9e00 32 API calls 12980->12988 12999 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 12980->12999 12984 7ff7f8a1ae20 3 API calls 12981->12984 12982->12980 12983->12980 12986 7ff7f89bb24f 12984->12986 12985->12970 12986->12986 12987->12980 12988->12980 12991 7ff7f8a12cd0 47 API calls 12990->12991 12996 7ff7f89381b5 12991->12996 12992 7ff7f893825a 12994 7ff7f89381f8 12994->12992 12995 7ff7f89499a0 memcmp 12994->12995 12998 7ff7f89b9390 32 API calls 12994->12998 12995->12994 12996->12994 12997 7ff7f8a12cd0 47 API calls 12996->12997 13000 7ff7f89ba3b0 12996->13000 12997->12996 12998->12994 13001 7ff7f89ba435 13000->13001 13002 7ff7f89ba3e4 13000->13002 13003 7ff7f89ba446 13001->13003 13004 7ff7f89ba3eb 13001->13004 13002->13004 13005 7ff7f89b95e0 32 API calls 13002->13005 13008 7ff7f89ba4f0 13003->13008 13009 7ff7f89ba59a 13003->13009 13012 7ff7f89ba464 13003->13012 13007 7ff7f8a0f8b0 32 API calls 13004->13007 13011 7ff7f89ba3f4 13004->13011 13005->13001 13006 7ff7f89ba41e 13006->12996 13007->13008 13010 7ff7f89499a0 memcmp 13008->13010 13008->13012 13015 7ff7f8a1acd0 14 API calls 13009->13015 13023 7ff7f89ba5c8 13009->13023 13010->13012 13011->13006 13019 7ff7f8a0f8b0 32 API calls 13011->13019 13012->13011 13013 7ff7f8a0f8b0 32 API calls 13012->13013 13013->13011 13014 7ff7f8a1acd0 14 API calls 13014->13023 13016 7ff7f89ba5b2 13015->13016 13021 7ff7f8a1b390 14 API calls 13016->13021 13016->13023 13017 7ff7f89ba60a 13018 7ff7f8a1ae20 3 API calls 13017->13018 13022 7ff7f89ba60f 13018->13022 13019->13006 13020 7ff7f8a1b390 14 API calls 13020->13023 13021->13023 13022->13022 13023->13014 13023->13017 13023->13020 13024 7ff7f8a1ae20 3 API calls 13023->13024 13025 7ff7f89b9e00 32 API calls 13023->13025 13027 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 13023->13027 13024->13023 13025->13023 13331 7ff7f8912000 rand 13332 7ff7f8a12cd0 47 API calls 13331->13332 13333 7ff7f8912039 13332->13333 13334 7ff7f89baff0 47 API calls 13333->13334 13343 7ff7f8912047 13334->13343 13335 7ff7f89499a0 memcmp 13335->13343 13336 7ff7f8912256 13337 7ff7f89b9390 32 API calls 13337->13343 13338 7ff7f89b95e0 32 API calls 13338->13343 13339 7ff7f8912251 13339->13336 13340 7ff7f8a1bcc0 14 API calls 13339->13340 13340->13336 13341 7ff7f89120b8 rand 13341->13341 13341->13343 13343->13335 13343->13336 13343->13337 13343->13338 13343->13339 13343->13341 13344 7ff7f8938260 13343->13344 13345 7ff7f8a12cd0 47 API calls 13344->13345 13347 7ff7f8938295 13345->13347 13346 7ff7f893833a 13346->13343 13349 7ff7f8a12cd0 47 API calls 13347->13349 13351 7ff7f89382d6 13347->13351 13348 7ff7f89499a0 memcmp 13348->13351 13349->13347 13350 7ff7f89b9390 32 API calls 13350->13351 13351->13346 13351->13348 13351->13350 12494 7ff7f8935a00 12501 7ff7f8935680 12494->12501 12497 7ff7f8935a1a 12498 7ff7f8935a2d 12497->12498 12499 7ff7f8935a90 LeaveCriticalSection 12497->12499 12499->12498 12500 7ff7f8935a6d malloc 12500->12497 12500->12498 12502 7ff7f8935698 12501->12502 12503 7ff7f893569c 12501->12503 12502->12503 12505 7ff7f89356e7 InitializeCriticalSection InitializeCriticalSection 12502->12505 12504 7ff7f8935716 EnterCriticalSection 12503->12504 12506 7ff7f89356cb 12503->12506 12507 7ff7f89356b0 Sleep 12503->12507 12504->12503 12505->12503 12506->12497 12506->12500 12507->12503 12507->12507 13028 7ff7f892ab00 13030 7ff7f892ab21 13028->13030 13029 7ff7f892aba4 13030->13029 13031 7ff7f892ac7c signal 13030->13031 13032 7ff7f892abde signal 13030->13032 13031->13029 13032->13030 13033 7ff7f892ac90 signal 13032->13033 13033->13029 12508 7ff7f8914206 12509 7ff7f8913d8b 12508->12509 12510 7ff7f8913e16 strlen 12509->12510 12512 7ff7f89134d0 40 API calls 12509->12512 12513 7ff7f8913ece LoadLibraryA GetProcAddress 12509->12513 12514 7ff7f89140f2 12509->12514 12515 7ff7f8913f3e GetProcAddress 12509->12515 12516 7ff7f8913f8e GetProcAddress 12509->12516 12517 7ff7f8913fbb 12509->12517 12518 7ff7f8912e10 24 API calls 12509->12518 12511 7ff7f8912d70 24 API calls 12510->12511 12511->12509 12512->12509 12513->12509 12515->12509 12516->12509 12516->12514 12519 7ff7f8912e10 24 API calls 12517->12519 12518->12509 12520 7ff7f8913fd9 wcslen 12519->12520 12521 7ff7f89142f3 12520->12521 12522 7ff7f8914006 12520->12522 12523 7ff7f8a1c0a0 23 API calls 12521->12523 12524 7ff7f8a05ae0 27 API calls 12522->12524 12531 7ff7f89142c7 12523->12531 12525 7ff7f8914011 12524->12525 12525->12525 12526 7ff7f8914031 12525->12526 12525->12531 12527 7ff7f8914286 12526->12527 12528 7ff7f8914093 LdrLoadDll 12526->12528 12528->12514 12530 7ff7f89140aa GetProcAddress 12528->12530 12532 7ff7f89140cb 12530->12532 12533 7ff7f89140cd VirtualProtect 12530->12533 12535 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 12531->12535 12532->12533 12533->12514 12534 7ff7f89140ea LdrUnloadDll 12533->12534 12534->12514 13352 7ff7f8931c08 13353 7ff7f893251b 13352->13353 13355 7ff7f8931c1e 13352->13355 13356 7ff7f892f9c0 13355->13356 13358 7ff7f892f9f3 13356->13358 13357 7ff7f892fade memset 13357->13358 13359 7ff7f892fb03 13357->13359 13358->13357 13358->13359 13361 7ff7f892fb3b 13358->13361 13360 7ff7f892fb47 13359->13360 13359->13361 13362 7ff7f892fdbd 13359->13362 13363 7ff7f892fbaa fputc 13360->13363 13367 7ff7f892fb68 13360->13367 13361->13360 13364 7ff7f892fda8 fputc 13361->13364 13362->13360 13366 7ff7f892fdd0 memset 13362->13366 13363->13360 13363->13367 13364->13361 13365 7ff7f892fbcc 13365->13355 13366->13360 13367->13365 13368 7ff7f892fc13 fputc 13367->13368 13368->13367 13038 7ff7f892b70e InitializeCriticalSection 13377 7ff7f8911010 13379 7ff7f891104b 13377->13379 13378 7ff7f891106d __set_app_type 13380 7ff7f8911077 13378->13380 13379->13378 13379->13380 13739 7ff7f8911d10 13740 7ff7f8911d30 rand 13739->13740 13745 7ff7f8911d5a 13740->13745 13741 7ff7f8a12cd0 47 API calls 13741->13745 13742 7ff7f89499a0 memcmp 13742->13745 13743 7ff7f8912256 13744 7ff7f89b9390 32 API calls 13744->13745 13745->13740 13745->13741 13745->13742 13745->13743 13745->13744 13746 7ff7f89b95e0 32 API calls 13745->13746 13747 7ff7f8911910 47 API calls 13745->13747 13746->13745 13747->13745 12536 7ff7f8932610 12537 7ff7f893261c 12536->12537 12540 7ff7f89357b0 12537->12540 12541 7ff7f8935680 4 API calls 12540->12541 12542 7ff7f89357bf 12541->12542 12543 7ff7f89357d7 12542->12543 12544 7ff7f893581c malloc 12542->12544 12545 7ff7f893263b 12543->12545 12546 7ff7f89357e7 LeaveCriticalSection 12543->12546 12544->12543 12544->12545 12546->12545 13381 7ff7f892ac10 signal 13382 7ff7f892ac26 signal 13381->13382 13383 7ff7f892ab66 13381->13383 13387 7ff7f892aba4 13382->13387 13384 7ff7f892ac7c signal 13383->13384 13385 7ff7f892abde signal 13383->13385 13383->13387 13384->13387 13385->13383 13386 7ff7f892ac90 signal 13385->13386 13386->13387 13388 7ff7f892b410 WakeConditionVariable 13389 7ff7f8935c10 13391 7ff7f8935d40 13389->13391 13400 7ff7f8935c2a 13389->13400 13390 7ff7f8935680 Sleep InitializeCriticalSection InitializeCriticalSection EnterCriticalSection 13390->13400 13392 7ff7f89357b0 6 API calls 13391->13392 13391->13400 13396 7ff7f8935da9 13392->13396 13393 7ff7f8935c46 13394 7ff7f8935ac0 7 API calls 13393->13394 13398 7ff7f8935cf9 13393->13398 13402 7ff7f8935cb6 LeaveCriticalSection 13393->13402 13404 7ff7f8935c84 free 13393->13404 13406 7ff7f8935680 Sleep InitializeCriticalSection InitializeCriticalSection EnterCriticalSection 13393->13406 13409 7ff7f8935ce8 LeaveCriticalSection 13393->13409 13394->13393 13395 7ff7f8935de4 13395->13393 13397 7ff7f8935ded LeaveCriticalSection 13395->13397 13396->13398 13399 7ff7f8935dff memcpy 13396->13399 13397->13393 13399->13400 13401 7ff7f8935e1e free 13399->13401 13400->13390 13400->13393 13400->13395 13400->13398 13403 7ff7f8935f2d malloc 13400->13403 13405 7ff7f8935ef5 LeaveCriticalSection 13400->13405 13408 7ff7f8935ea4 LeaveCriticalSection 13400->13408 13401->13400 13402->13393 13403->13400 13407 7ff7f8935f3f 13403->13407 13404->13393 13405->13403 13406->13393 13408->13400 13409->13393 13409->13398 13751 7ff7f892bd10 RtlCaptureContext 13752 7ff7f892be3a RtlLookupFunctionEntry 13751->13752 13753 7ff7f892bdd0 RtlVirtualUnwind 13752->13753 13754 7ff7f892be5d 13752->13754 13755 7ff7f892be24 13753->13755 13755->13752 13755->13754 12547 7ff7f8931e16 12548 7ff7f8931e2d 12547->12548 12552 7ff7f8931e42 12547->12552 12553 7ff7f8930680 12548->12553 12550 7ff7f8930680 29 API calls 12551 7ff7f893228d 12550->12551 12551->12551 12552->12550 12554 7ff7f8930694 12553->12554 12555 7ff7f89306dc 12554->12555 12556 7ff7f8930758 12554->12556 12562 7ff7f892ffd0 12555->12562 12558 7ff7f892efa0 3 API calls 12556->12558 12561 7ff7f89306f6 12558->12561 12559 7ff7f893073f fputc 12560 7ff7f89306e7 12559->12560 12560->12559 12560->12561 12561->12552 12568 7ff7f892fff4 12562->12568 12563 7ff7f8930309 12567 7ff7f89305eb fputc 12563->12567 12572 7ff7f8930315 12563->12572 12564 7ff7f8930070 12565 7ff7f89303a8 12564->12565 12570 7ff7f89302d1 12564->12570 12577 7ff7f8930079 12564->12577 12569 7ff7f8930638 fputc 12565->12569 12565->12570 12566 7ff7f8930541 fputc 12566->12570 12567->12572 12568->12564 12568->12570 12575 7ff7f89302b0 fputc 12568->12575 12568->12577 12569->12570 12570->12563 12570->12566 12570->12572 12573 7ff7f8930655 fputc 12570->12573 12571 7ff7f89300a6 12571->12570 12579 7ff7f89300ae 12571->12579 12574 7ff7f892fe10 13 API calls 12572->12574 12583 7ff7f8930348 12572->12583 12573->12570 12574->12583 12575->12568 12576 7ff7f8930672 12576->12576 12577->12570 12577->12571 12578 7ff7f8930450 fputc 12577->12578 12578->12577 12581 7ff7f8930138 fputc 12579->12581 12584 7ff7f893014e 12579->12584 12588 7ff7f892f140 6 API calls 12579->12588 12580 7ff7f893015b 12580->12560 12581->12579 12581->12584 12582 7ff7f8930392 fputc 12582->12583 12583->12576 12583->12582 12585 7ff7f8930178 12583->12585 12584->12580 12589 7ff7f892fe10 12584->12589 12585->12580 12587 7ff7f89301e0 fputc 12585->12587 12587->12585 12588->12579 12590 7ff7f892ff38 localeconv 12589->12590 12591 7ff7f892fe2c 12589->12591 12604 7ff7f8936ea0 ___mb_cur_max_func ___lc_codepage_func 12590->12604 12592 7ff7f892fe39 12591->12592 12593 7ff7f892fee0 12591->12593 12598 7ff7f8936d60 3 API calls 12592->12598 12596 7ff7f892ff20 fputc 12593->12596 12597 7ff7f892fef0 12593->12597 12595 7ff7f892ff5e 12601 7ff7f892fecb 12595->12601 12602 7ff7f892ffb6 fputc 12595->12602 12596->12597 12597->12585 12599 7ff7f892fe69 12598->12599 12599->12595 12600 7ff7f892fe71 12599->12600 12600->12601 12603 7ff7f892feb5 fputc 12600->12603 12601->12585 12602->12601 12603->12600 12603->12601 12605 7ff7f8936f98 12604->12605 12607 7ff7f8936ef2 12604->12607 12605->12595 12606 7ff7f8936f78 12610 7ff7f8936fd8 MultiByteToWideChar 12606->12610 12611 7ff7f8936f7d 12606->12611 12607->12605 12607->12606 12608 7ff7f8936f2d 12607->12608 12609 7ff7f8936f20 IsDBCSLeadByteEx 12607->12609 12608->12605 12612 7ff7f8936f4d MultiByteToWideChar 12608->12612 12609->12606 12609->12608 12610->12611 12613 7ff7f8937000 _errno 12610->12613 12611->12595 12612->12613 12614 7ff7f8936f63 12612->12614 12613->12605 12614->12595 12615 7ff7f89111d9 12617 7ff7f89111e0 12615->12617 12616 7ff7f891142d 12617->12616 12618 7ff7f8911244 SetUnhandledExceptionFilter 12617->12618 12619 7ff7f89112fe malloc 12617->12619 12620 7ff7f8911330 strlen malloc memcpy 12617->12620 12618->12617 12619->12616 12619->12617 12620->12617 12620->12620 12621 7ff7f892a5d8 12622 7ff7f892a66e 12621->12622 12624 7ff7f892a5eb 12621->12624 12623 7ff7f892a62d VirtualQuery 12623->12622 12623->12624 12624->12622 12624->12623 12625 7ff7f892a680 VirtualProtect 12624->12625 12625->12622 12626 7ff7f892a6b8 GetLastError 12625->12626 12626->12624 13756 7ff7f891a0e0 13757 7ff7f891a0ed 13756->13757 13758 7ff7f8914cc0 2 API calls 13757->13758 13759 7ff7f89218c3 strlen 13758->13759 13759->13757 13043 7ff7f8931ae2 13046 7ff7f8931a48 13043->13046 13044 7ff7f8931b6f 13045 7ff7f89325fc fputc 13045->13046 13046->13043 13046->13044 13046->13045 12627 7ff7f892c1e0 strcmp 12628 7ff7f892c1fc strcmp 12627->12628 12631 7ff7f892c2da 12627->12631 12629 7ff7f892c213 strcmp 12628->12629 12628->12631 12630 7ff7f892c22a strcmp 12629->12630 12629->12631 12630->12631 12632 7ff7f892c241 strcmp 12630->12632 12632->12631 12633 7ff7f892c258 strcmp 12632->12633 12633->12631 12634 7ff7f892c26f strcmp 12633->12634 12634->12631 12635 7ff7f892c286 strcmp 12634->12635 12635->12631 12636 7ff7f892c29d strcmp 12635->12636 12636->12631 12637 7ff7f892c2b0 strcmp 12636->12637 12637->12631 12638 7ff7f892c2c3 strcmp 12637->12638 12638->12631 13414 7ff7f892b7e0 13415 7ff7f892b7e9 13414->13415 13416 7ff7f892b7f6 abort 13414->13416 13417 7ff7f892b809 13416->13417 13418 7ff7f892b816 abort 13416->13418 13419 7ff7f8931fe3 13420 7ff7f8931fec localeconv 13419->13420 13424 7ff7f8931a48 13419->13424 13421 7ff7f8936ea0 6 API calls 13420->13421 13421->13424 13422 7ff7f89325fc fputc 13422->13424 13423 7ff7f8931b6f 13424->13422 13424->13423 12639 7ff7f8914df0 12643 7ff7f8914cc0 12639->12643 12642 7ff7f8914e23 12646 7ff7f892c470 12643->12646 12649 7ff7f8931990 _errno 12646->12649 12650 7ff7f8914ce4 strlen 12649->12650 12651 7ff7f8931a37 12649->12651 12650->12642 12651->12650 12652 7ff7f89325fc fputc 12651->12652 12652->12651 13425 7ff7f8914bf0 13426 7ff7f8914c13 13425->13426 13428 7ff7f8914c50 13425->13428 13427 7ff7f8914c1a memcpy 13426->13427 13430 7ff7f8914c3d 13426->13430 13427->13430 13428->13428 13429 7ff7f8914c68 realloc 13428->13429 13428->13430 13429->13426 13429->13430 12653 7ff7f892b5f0 12654 7ff7f892b610 12653->12654 12657 7ff7f892b5ff 12653->12657 12655 7ff7f892b628 Sleep 12654->12655 12654->12657 12656 7ff7f892b632 Sleep 12655->12656 12655->12657 12656->12655 12656->12657 13431 7ff7f8931bf0 13434 7ff7f8931a48 13431->13434 13432 7ff7f8931b6f 13433 7ff7f89325fc fputc 13433->13434 13434->13432 13434->13433 13773 7ff7f892c0f0 13774 7ff7f892c0ff 13773->13774 13776 7ff7f892c140 13773->13776 13775 7ff7f892c112 MultiByteToWideChar 13774->13775 13775->13776 13047 7ff7f891d6f5 13048 7ff7f8914cc0 2 API calls 13047->13048 13049 7ff7f891d70d strlen 13048->13049 13050 7ff7f8919fb2 13049->13050 12658 7ff7f892a93a 12659 7ff7f892a948 12658->12659 12661 7ff7f892a7b8 12658->12661 12660 7ff7f892a731 12661->12660 12662 7ff7f892a8e4 VirtualProtect 12661->12662 12662->12660 12662->12661 12663 7ff7f8913539 12670 7ff7f8a05b70 12663->12670 12666 7ff7f89135c3 12667 7ff7f8913580 WriteFile 12668 7ff7f89135ae CloseHandle 12667->12668 12669 7ff7f89138c0 CloseHandle 12667->12669 12668->12666 12671 7ff7f8913544 CreateFileW 12670->12671 12672 7ff7f8a05b87 12670->12672 12671->12666 12671->12667 12673 7ff7f8a05ba4 12672->12673 12674 7ff7f8a05c8d 12672->12674 12677 7ff7f8a05bdb 12672->12677 12673->12671 12675 7ff7f8a05c14 memcpy 12673->12675 12676 7ff7f8a1c0a0 23 API calls 12674->12676 12675->12671 12678 7ff7f8a05c99 12676->12678 12679 7ff7f8a1ab80 malloc 12677->12679 12679->12673 12683 7ff7f8935140 12686 7ff7f893516b 12683->12686 12684 7ff7f89351a2 12685 7ff7f89353a1 memset 12685->12684 12686->12684 12686->12685 13051 7ff7f8913642 13052 7ff7f8913649 13051->13052 13053 7ff7f8913664 wcslen 13051->13053 13052->13053 13076 7ff7f8a05930 13053->13076 13055 7ff7f89136d2 13057 7ff7f8a05ae0 27 API calls 13055->13057 13063 7ff7f8913c12 13055->13063 13056 7ff7f8a1c0a0 23 API calls 13056->13063 13058 7ff7f89136ff 13057->13058 13059 7ff7f891371a 13058->13059 13060 7ff7f8913c55 13058->13060 13062 7ff7f8a05ae0 27 API calls 13059->13062 13061 7ff7f8a1c0a0 23 API calls 13060->13061 13061->13063 13070 7ff7f8913728 13062->13070 13063->13056 13089 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 13063->13089 13064 7ff7f8913c06 13067 7ff7f8a1c0a0 23 API calls 13064->13067 13066 7ff7f8a05ae0 27 API calls 13066->13070 13067->13063 13068 7ff7f8a007f0 31 API calls 13068->13070 13069 7ff7f8913a9c 13070->13064 13070->13066 13070->13068 13070->13069 13071 7ff7f8913544 CreateFileW 13070->13071 13072 7ff7f8913580 WriteFile 13071->13072 13075 7ff7f89135c3 13071->13075 13073 7ff7f89135ae CloseHandle 13072->13073 13074 7ff7f89138c0 CloseHandle 13072->13074 13073->13075 13078 7ff7f8a0594d 13076->13078 13077 7ff7f8a05956 13077->13055 13078->13077 13079 7ff7f8a0597b 13078->13079 13080 7ff7f8a05a3f 13078->13080 13082 7ff7f8a1ab80 malloc 13079->13082 13081 7ff7f8a1c0a0 23 API calls 13080->13081 13083 7ff7f8a05a4b 13081->13083 13084 7ff7f8a05995 13082->13084 13085 7ff7f8a05a94 13083->13085 13087 7ff7f8a05a82 memcpy 13083->13087 13086 7ff7f8a059b1 memcpy 13084->13086 13088 7ff7f8a059c4 13084->13088 13085->13055 13086->13088 13087->13085 13088->13055 13438 7ff7f892b740 EnterCriticalSection 13439 7ff7f892c340 13440 7ff7f892c352 13439->13440 13444 7ff7f892c35d 13439->13444 13441 7ff7f892c3be _errno 13440->13441 13440->13444 13442 7ff7f892c36f 13441->13442 13443 7ff7f892c362 fsetpos 13443->13442 13444->13442 13444->13443 13090 7ff7f8931e47 13091 7ff7f8931e5e 13090->13091 13092 7ff7f8931e73 13090->13092 13096 7ff7f8930f70 13091->13096 13093 7ff7f8930f70 39 API calls 13092->13093 13095 7ff7f89322be 13093->13095 13095->13095 13097 7ff7f8930f8a 13096->13097 13098 7ff7f89310a0 13096->13098 13097->13098 13099 7ff7f8930fcc 13097->13099 13100 7ff7f892efa0 3 API calls 13098->13100 13101 7ff7f8931060 13099->13101 13104 7ff7f8930fe1 13099->13104 13105 7ff7f893100d 13100->13105 13102 7ff7f893106f 13101->13102 13103 7ff7f8931064 strlen 13101->13103 13108 7ff7f8930800 21 API calls 13102->13108 13103->13102 13106 7ff7f8930fe9 13104->13106 13107 7ff7f8931158 strlen 13104->13107 13105->13092 13109 7ff7f892ffd0 25 API calls 13106->13109 13107->13106 13108->13105 13111 7ff7f8930ffe 13109->13111 13110 7ff7f893104b fputc 13110->13111 13111->13105 13111->13110 13785 7ff7f892e44c _errno 13786 7ff7f892d588 13785->13786 13787 7ff7f892e5d9 13786->13787 13792 7ff7f892c9b0 7 API calls 13786->13792 13794 7ff7f8935f60 9 API calls 13786->13794 13796 7ff7f892e140 _errno 13786->13796 13797 7ff7f892e44d _errno 13786->13797 13798 7ff7f892e628 _errno 13786->13798 13799 7ff7f892de0d memset 13786->13799 13788 7ff7f892ec89 13787->13788 13789 7ff7f892e7ec 13787->13789 13793 7ff7f89357b0 6 API calls 13788->13793 13790 7ff7f892e812 memset 13789->13790 13791 7ff7f892e853 13789->13791 13790->13791 13792->13786 13795 7ff7f892ec98 13793->13795 13794->13786 13796->13786 13797->13786 13797->13798 13799->13786 13445 7ff7f8914350 13446 7ff7f89143a0 13445->13446 13446->13446 13447 7ff7f8914465 13446->13447 13448 7ff7f8914406 strcmp 13446->13448 13448->13447 13449 7ff7f8914415 strcmp 13448->13449 13449->13447 13112 7ff7f8918652 13113 7ff7f891865f 13112->13113 13114 7ff7f8918202 13113->13114 13117 7ff7f8917f10 13113->13117 13118 7ff7f8917f2c 13117->13118 13123 7ff7f8917f3b 13117->13123 13119 7ff7f8917a70 2 API calls 13118->13119 13118->13123 13119->13123 13120 7ff7f8917f51 13121 7ff7f8915a20 2 API calls 13121->13123 13122 7ff7f8916650 2 API calls 13122->13123 13123->13120 13123->13121 13123->13122 13451 7ff7f892a350 13452 7ff7f892a359 13451->13452 13454 7ff7f892a35d 13452->13454 13456 7ff7f892adc0 13452->13456 13455 7ff7f892a375 13457 7ff7f892aef0 13456->13457 13458 7ff7f892add3 13456->13458 13457->13455 13459 7ff7f892ae08 13458->13459 13460 7ff7f892add5 13458->13460 13463 7ff7f892adeb 13459->13463 13464 7ff7f892ae17 EnterCriticalSection 13459->13464 13461 7ff7f892ae88 13460->13461 13462 7ff7f892addd 13460->13462 13465 7ff7f892af08 EnterCriticalSection 13461->13465 13466 7ff7f892ae92 13461->13466 13462->13463 13467 7ff7f892af70 InitializeCriticalSection 13462->13467 13463->13455 13468 7ff7f892ae74 LeaveCriticalSection 13464->13468 13475 7ff7f892ae33 13464->13475 13469 7ff7f892af5c LeaveCriticalSection 13465->13469 13477 7ff7f892af24 13465->13477 13466->13463 13472 7ff7f892aec1 DeleteCriticalSection 13466->13472 13473 7ff7f892aeb0 free 13466->13473 13467->13477 13468->13463 13469->13466 13470 7ff7f892ae48 TlsGetValue GetLastError 13470->13475 13471 7ff7f892af38 TlsGetValue GetLastError 13471->13477 13472->13463 13473->13472 13473->13473 13474 7ff7f892af91 13474->13469 13475->13468 13475->13470 13476 7ff7f892afa5 13475->13476 13476->13468 13477->13469 13477->13471 13477->13474 13478 7ff7f892ab50 signal 13479 7ff7f892aca4 signal 13478->13479 13481 7ff7f892ab66 13478->13481 13480 7ff7f892acb8 13479->13480 13482 7ff7f892ac7c signal 13481->13482 13483 7ff7f892abde signal 13481->13483 13485 7ff7f892aba4 13481->13485 13482->13485 13483->13481 13484 7ff7f892ac90 signal 13483->13484 13484->13485 13486 7ff7f8919f54 13487 7ff7f8919f6a 13486->13487 13488 7ff7f8914cc0 2 API calls 13487->13488 13490 7ff7f8919fa4 13487->13490 13489 7ff7f8920412 strlen 13488->13489 13489->13490 13128 7ff7f8918256 13129 7ff7f8918240 13128->13129 13129->13128 13130 7ff7f8917f10 free strcmp 13129->13130 13130->13129 12687 7ff7f8931d19 12689 7ff7f8931d30 12687->12689 12688 7ff7f89322de 12690 7ff7f892efa0 3 API calls 12688->12690 12689->12688 12691 7ff7f89325ba 12689->12691 12692 7ff7f892efa0 3 API calls 12689->12692 12690->12688 12692->12689 13131 7ff7f892e619 13132 7ff7f892e628 _errno 13131->13132 13133 7ff7f8911e18 rand rand rand 13134 7ff7f8a12cd0 47 API calls 13133->13134 13135 7ff7f8911e87 13134->13135 13136 7ff7f8a12cd0 47 API calls 13135->13136 13140 7ff7f8911ea9 13136->13140 13137 7ff7f89499a0 memcmp 13137->13140 13138 7ff7f89b9390 32 API calls 13138->13140 13139 7ff7f8912256 13140->13137 13140->13138 13140->13139 13141 7ff7f89b95e0 32 API calls 13140->13141 13143 7ff7f8911640 13140->13143 13141->13140 13144 7ff7f8911800 13143->13144 13145 7ff7f8911655 13143->13145 13146 7ff7f8a12cd0 47 API calls 13144->13146 13148 7ff7f8911665 13145->13148 13154 7ff7f89116cf 13145->13154 13165 7ff7f8911862 13145->13165 13147 7ff7f891181c 13146->13147 13155 7ff7f8a12cd0 47 API calls 13147->13155 13151 7ff7f8a12cd0 47 API calls 13148->13151 13148->13154 13149 7ff7f8a12cd0 47 API calls 13149->13154 13150 7ff7f8a12cd0 47 API calls 13152 7ff7f891188c 13150->13152 13153 7ff7f891168b 13151->13153 13156 7ff7f8a12cd0 47 API calls 13152->13156 13158 7ff7f8a12cd0 47 API calls 13153->13158 13154->13149 13159 7ff7f89499a0 memcmp 13154->13159 13160 7ff7f8911901 13154->13160 13162 7ff7f89b9390 32 API calls 13154->13162 13157 7ff7f8911840 13155->13157 13161 7ff7f89118ae 13156->13161 13163 7ff7f8a12cd0 47 API calls 13157->13163 13164 7ff7f89116ad 13158->13164 13159->13154 13166 7ff7f8a12cd0 47 API calls 13161->13166 13162->13154 13163->13165 13167 7ff7f8a12cd0 47 API calls 13164->13167 13165->13150 13166->13154 13167->13154 13800 7ff7f893141a 13801 7ff7f8931489 13800->13801 13802 7ff7f8931510 fputc 13801->13802 13803 7ff7f8931499 fputc 13801->13803 13802->13801 13805 7ff7f891c01b 13806 7ff7f891c028 13805->13806 13808 7ff7f8919fa8 13805->13808 13807 7ff7f891c05f strcmp 13806->13807 13806->13808 13807->13808 13172 7ff7f8933e21 13173 7ff7f893404a 13172->13173 13177 7ff7f8933e47 13172->13177 13174 7ff7f8935f60 9 API calls 13173->13174 13176 7ff7f8933060 13173->13176 13174->13176 13175 7ff7f8935910 9 API calls 13175->13177 13177->13173 13177->13175 13177->13176 13491 7ff7f891ab21 13492 7ff7f891ab34 13491->13492 13494 7ff7f8914cc0 2 API calls 13492->13494 13496 7ff7f8914ec0 13492->13496 13495 7ff7f891ad6c strlen 13494->13495 13495->13492 13497 7ff7f8914ed9 13496->13497 13498 7ff7f8914cc0 2 API calls 13497->13498 13499 7ff7f8914f0c strlen 13498->13499 13500 7ff7f8914f1d 13499->13500 13500->13492 13809 7ff7f892a420 13810 7ff7f892a43f 13809->13810 13811 7ff7f892a47d fprintf 13810->13811 13501 7ff7f8918f2a 13502 7ff7f8919000 13501->13502 13505 7ff7f8918f40 13501->13505 13503 7ff7f8917290 2 API calls 13503->13505 13504 7ff7f8918d50 2 API calls 13504->13505 13505->13502 13505->13503 13505->13504 13178 7ff7f891822b 13179 7ff7f8917a70 2 API calls 13178->13179 13180 7ff7f8918235 13179->13180 13181 7ff7f8917f10 free strcmp 13180->13181 13181->13180 13506 7ff7f8918730 13509 7ff7f891873d 13506->13509 13513 7ff7f891875f 13506->13513 13507 7ff7f8918b30 2 API calls 13508 7ff7f8918af8 13507->13508 13510 7ff7f8915a20 2 API calls 13508->13510 13509->13508 13511 7ff7f8918d50 2 API calls 13509->13511 13509->13513 13512 7ff7f8918b08 13510->13512 13511->13513 13513->13507 13513->13508 13513->13512 12693 7ff7f8911530 12694 7ff7f891153b 12693->12694 12695 7ff7f891158d 12694->12695 12696 7ff7f8911560 rand 12694->12696 12696->12695 12696->12696 13182 7ff7f8915e30 13183 7ff7f8915bb8 13182->13183 13184 7ff7f8915e44 13182->13184 13184->13183 13185 7ff7f8915a20 2 API calls 13184->13185 13185->13183 13514 7ff7f8912f30 13515 7ff7f8912f70 13514->13515 13515->13515 13516 7ff7f8912f7e LoadLibraryA 13515->13516 13517 7ff7f8912fb8 13516->13517 13517->13517 13518 7ff7f8912fc8 GetProcAddress 13517->13518 13520 7ff7f8912fe2 13518->13520 13519 7ff7f8913040 13522 7ff7f8913013 wcslen 13519->13522 13520->13519 13521 7ff7f8913050 13520->13521 13520->13522 13524 7ff7f8a1bfb0 23 API calls 13521->13524 13523 7ff7f8912ea0 24 API calls 13522->13523 13525 7ff7f891302a 13523->13525 13526 7ff7f891305c 13524->13526 12697 7ff7f8912932 12698 7ff7f89129aa 12697->12698 12698->12698 12715 7ff7f89127e0 12698->12715 12701 7ff7f89127e0 10 API calls 12702 7ff7f8912a8e 12701->12702 12703 7ff7f89127e0 10 API calls 12702->12703 12704 7ff7f8912ade 12703->12704 12705 7ff7f89127e0 10 API calls 12704->12705 12706 7ff7f8912b36 12705->12706 12707 7ff7f89127e0 10 API calls 12706->12707 12708 7ff7f8912b86 12707->12708 12709 7ff7f89127e0 10 API calls 12708->12709 12710 7ff7f8912bb0 12709->12710 12711 7ff7f89127e0 10 API calls 12710->12711 12712 7ff7f8912c0e 12711->12712 12713 7ff7f89127e0 10 API calls 12712->12713 12714 7ff7f8912c76 12713->12714 12724 7ff7f8912600 12715->12724 12718 7ff7f8912804 strlen 12720 7ff7f891281f 12718->12720 12719 7ff7f891285e strlen 12719->12720 12720->12719 12721 7ff7f89128c1 12720->12721 12723 7ff7f89128cf 12720->12723 12722 7ff7f8a1ab80 malloc 12721->12722 12722->12723 12723->12701 12725 7ff7f8912774 12724->12725 12726 7ff7f891264e 12724->12726 12725->12718 12725->12723 12726->12725 12727 7ff7f89126a0 WideCharToMultiByte 12726->12727 12728 7ff7f891271e 6 API calls 12726->12728 12727->12726 12728->12725 12728->12726 12729 7ff7f8913932 12734 7ff7f8913765 12729->12734 12730 7ff7f8913c06 12733 7ff7f8a1c0a0 23 API calls 12730->12733 12731 7ff7f8a05ae0 27 API calls 12731->12734 12735 7ff7f8913c12 12733->12735 12734->12729 12734->12730 12734->12731 12734->12734 12736 7ff7f8913a9c 12734->12736 12737 7ff7f8913544 CreateFileW 12734->12737 12744 7ff7f8a007f0 12734->12744 12742 7ff7f8a1c0a0 23 API calls 12735->12742 12759 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 12735->12759 12738 7ff7f8913580 WriteFile 12737->12738 12743 7ff7f89135c3 12737->12743 12740 7ff7f89135ae CloseHandle 12738->12740 12741 7ff7f89138c0 CloseHandle 12738->12741 12740->12743 12742->12735 12745 7ff7f8a00825 12744->12745 12746 7ff7f8a0092e 12744->12746 12749 7ff7f8a0084b 12745->12749 12750 7ff7f8a008e8 12745->12750 12747 7ff7f8a1c0a0 23 API calls 12746->12747 12748 7ff7f8a0093a 12747->12748 12748->12734 12752 7ff7f8a0085d 12749->12752 12753 7ff7f8a008c9 12749->12753 12751 7ff7f8a05d20 26 API calls 12750->12751 12754 7ff7f8a008a0 12751->12754 12755 7ff7f8a00882 12752->12755 12757 7ff7f8a00879 memcpy 12752->12757 12760 7ff7f8a01210 12753->12760 12754->12734 12755->12754 12758 7ff7f8a00891 memcpy 12755->12758 12757->12755 12758->12754 12761 7ff7f8a0123e 12760->12761 12762 7ff7f8a01244 12760->12762 12761->12762 12763 7ff7f8a0124d memcpy 12761->12763 12764 7ff7f8a01282 memcpy 12762->12764 12765 7ff7f8a0127a 12762->12765 12763->12762 12764->12765 12766 7ff7f8a01313 memcpy 12765->12766 12767 7ff7f8a012ad 12765->12767 12766->12767 12767->12754 12768 7ff7f892ad30 12769 7ff7f892ad42 12768->12769 12770 7ff7f892ad50 EnterCriticalSection 12768->12770 12771 7ff7f892ad93 LeaveCriticalSection 12770->12771 12772 7ff7f892ad6c 12770->12772 12772->12771 12773 7ff7f892ad8e free 12772->12773 12773->12771 13186 7ff7f8932230 13187 7ff7f8931eaf 13186->13187 13188 7ff7f8931ec4 13186->13188 13189 7ff7f8930d20 24 API calls 13187->13189 13190 7ff7f8930d20 24 API calls 13188->13190 13189->13188 13191 7ff7f893225c 13190->13191 13191->13191 13819 7ff7f892b430 SleepConditionVariableCS 13820 7ff7f892b450 GetLastError 13819->13820 13821 7ff7f892b444 13819->13821 13822 7ff7f8bb0488 13820->13822 13823 7ff7f892b030 strlen 13824 7ff7f892b0ae 13823->13824 13825 7ff7f892b045 13823->13825 13825->13824 13826 7ff7f892b099 strncmp 13825->13826 13826->13824 13826->13825 12774 7ff7f8913d77 12792 7ff7f8913d8b 12774->12792 12775 7ff7f8913e16 strlen 12776 7ff7f8912d70 24 API calls 12775->12776 12776->12792 12777 7ff7f89134d0 40 API calls 12777->12792 12778 7ff7f8913ece LoadLibraryA GetProcAddress 12778->12792 12779 7ff7f8913f3e GetProcAddress 12779->12792 12780 7ff7f8913f8e GetProcAddress 12780->12792 12793 7ff7f89140f2 12780->12793 12781 7ff7f8913fbb 12783 7ff7f8912e10 24 API calls 12781->12783 12782 7ff7f8912e10 24 API calls 12782->12792 12784 7ff7f8913fd9 wcslen 12783->12784 12785 7ff7f89142f3 12784->12785 12786 7ff7f8914006 12784->12786 12787 7ff7f8a1c0a0 23 API calls 12785->12787 12788 7ff7f8a05ae0 27 API calls 12786->12788 12790 7ff7f89142c7 12787->12790 12789 7ff7f8914011 12788->12789 12789->12790 12791 7ff7f8914031 12789->12791 12801 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 12790->12801 12794 7ff7f8914286 12791->12794 12795 7ff7f8914093 LdrLoadDll 12791->12795 12792->12775 12792->12777 12792->12778 12792->12779 12792->12780 12792->12781 12792->12782 12792->12792 12792->12793 12795->12793 12797 7ff7f89140aa GetProcAddress 12795->12797 12798 7ff7f89140cb 12797->12798 12799 7ff7f89140cd VirtualProtect 12797->12799 12798->12799 12799->12793 12800 7ff7f89140ea LdrUnloadDll 12799->12800 12800->12793 12802 7ff7f892d57b 12806 7ff7f892d588 12802->12806 12803 7ff7f892e5d9 12804 7ff7f892ec89 12803->12804 12805 7ff7f892e7ec 12803->12805 12810 7ff7f89357b0 6 API calls 12804->12810 12807 7ff7f892e812 memset 12805->12807 12808 7ff7f892e853 12805->12808 12806->12803 12813 7ff7f892e140 _errno 12806->12813 12814 7ff7f892e44d _errno 12806->12814 12815 7ff7f892e628 _errno 12806->12815 12816 7ff7f892de0d memset 12806->12816 12817 7ff7f8935f60 12806->12817 12829 7ff7f892c9b0 12806->12829 12807->12808 12812 7ff7f892ec98 12810->12812 12813->12806 12814->12806 12814->12815 12816->12806 12818 7ff7f8935f8d 12817->12818 12819 7ff7f89357b0 6 API calls 12818->12819 12820 7ff7f8935f9f 12819->12820 12821 7ff7f89360ed 12820->12821 12822 7ff7f8935fb3 memset 12820->12822 12823 7ff7f8935fc7 12820->12823 12821->12806 12822->12823 12824 7ff7f8936110 12823->12824 12825 7ff7f89360e5 free 12823->12825 12826 7ff7f8935680 4 API calls 12824->12826 12825->12821 12827 7ff7f8936117 12826->12827 12827->12821 12828 7ff7f8936137 LeaveCriticalSection 12827->12828 12828->12821 12831 7ff7f892c9d0 12829->12831 12830 7ff7f892c9e7 12830->12806 12831->12830 12832 7ff7f89357b0 6 API calls 12831->12832 12833 7ff7f892ca33 memcpy 12832->12833 12833->12830 13832 7ff7f8914480 13833 7ff7f89144c0 13832->13833 13834 7ff7f8914602 GetModuleHandleA 13833->13834 13836 7ff7f8914615 13833->13836 13834->13833 13835 7ff7f8914620 13834->13835 12834 7ff7f892b580 CloseHandle 13531 7ff7f892a380 13532 7ff7f892a392 13531->13532 13533 7ff7f892a3a2 13532->13533 13534 7ff7f892adc0 11 API calls 13532->13534 13535 7ff7f892a3f5 13534->13535 13837 7ff7f892b880 RtlLookupFunctionEntry 13838 7ff7f892b899 13837->13838 13195 7ff7f8918283 13196 7ff7f8917a70 2 API calls 13195->13196 13197 7ff7f8918240 13196->13197 13198 7ff7f8918a45 13197->13198 13199 7ff7f8917f10 free strcmp 13197->13199 13199->13197 13200 7ff7f8913a86 13207 7ff7f8913765 13200->13207 13201 7ff7f8913a9c 13202 7ff7f8913544 CreateFileW 13203 7ff7f8913580 WriteFile 13202->13203 13206 7ff7f89135c3 13202->13206 13204 7ff7f89135ae CloseHandle 13203->13204 13205 7ff7f89138c0 CloseHandle 13203->13205 13204->13206 13207->13201 13207->13202 13208 7ff7f8913c06 13207->13208 13209 7ff7f8a05ae0 27 API calls 13207->13209 13210 7ff7f8a007f0 31 API calls 13207->13210 13211 7ff7f8a1c0a0 23 API calls 13208->13211 13209->13207 13210->13207 13213 7ff7f8913c12 13211->13213 13214 7ff7f8a1c0a0 23 API calls 13213->13214 13215 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 13213->13215 13214->13213 13216 7ff7f892da84 13226 7ff7f892d588 13216->13226 13217 7ff7f892e5d9 13218 7ff7f892ec89 13217->13218 13219 7ff7f892e7ec 13217->13219 13223 7ff7f89357b0 6 API calls 13218->13223 13220 7ff7f892e812 memset 13219->13220 13221 7ff7f892e853 13219->13221 13220->13221 13222 7ff7f892c9b0 7 API calls 13222->13226 13225 7ff7f892ec98 13223->13225 13224 7ff7f8935f60 9 API calls 13224->13226 13226->13216 13226->13217 13226->13222 13226->13224 13227 7ff7f892e140 _errno 13226->13227 13228 7ff7f892e44d _errno 13226->13228 13229 7ff7f892e628 _errno 13226->13229 13230 7ff7f892de0d memset 13226->13230 13227->13226 13228->13226 13228->13229 13230->13226 11852 7ff7f892b688 TlsFree 11853 7ff7f892b6a8 GetLastError 11852->11853 11854 7ff7f892b69e 11852->11854 11855 7ff7f8bb0488 11853->11855 12835 7ff7f893198e 12836 7ff7f8931994 _errno 12835->12836 12837 7ff7f8931a37 12836->12837 12839 7ff7f8931b6f 12836->12839 12838 7ff7f89325fc fputc 12837->12838 12837->12839 12838->12837 12840 7ff7f8912590 strcpy_s strcpy_s _strlwr _strlwr 12841 7ff7f89125e8 12840->12841 13237 7ff7f8932292 13238 7ff7f8931e5e 13237->13238 13241 7ff7f8931e73 13237->13241 13240 7ff7f8930f70 39 API calls 13238->13240 13239 7ff7f8930f70 39 API calls 13242 7ff7f89322be 13239->13242 13240->13241 13241->13239 13242->13242 13848 7ff7f8911c90 rand 13849 7ff7f8911cb7 13848->13849 13850 7ff7f8911ced 13848->13850 13851 7ff7f8911cc0 rand 13849->13851 13856 7ff7f8911ad0 _time64 13850->13856 13851->13850 13851->13851 13853 7ff7f8911cf2 13854 7ff7f8911ad0 41 API calls 13853->13854 13855 7ff7f8911cfc 13854->13855 13864 7ff7f8911af9 13856->13864 13857 7ff7f8911b10 rand 13858 7ff7f8911c6e 13857->13858 13857->13864 13859 7ff7f8a1bcc0 14 API calls 13858->13859 13877 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 13858->13877 13859->13858 13860 7ff7f8911b70 rand 13860->13860 13860->13864 13863 7ff7f8911c47 13863->13853 13864->13857 13864->13860 13864->13863 13865 7ff7f89f89e0 13864->13865 13866 7ff7f89f8a16 13865->13866 13867 7ff7f89f8ac8 13865->13867 13871 7ff7f8a1ab80 malloc 13866->13871 13868 7ff7f8a1c0a0 23 API calls 13867->13868 13869 7ff7f89f8ad4 13868->13869 13870 7ff7f89f8af5 13869->13870 13872 7ff7f8a1ab80 malloc 13869->13872 13870->13864 13873 7ff7f89f8a4c 13871->13873 13874 7ff7f89f8bea 13872->13874 13875 7ff7f89f8a88 memcpy 13873->13875 13876 7ff7f89f8a61 13873->13876 13875->13876 13876->13864 13540 7ff7f8931b90 13541 7ff7f893250d 13540->13541 13542 7ff7f8931ba2 13540->13542 13542->13541 13543 7ff7f893243b 13542->13543 13544 7ff7f8931bd5 13542->13544 13546 7ff7f892f9c0 5 API calls 13543->13546 13555 7ff7f892f340 13544->13555 13546->13541 13547 7ff7f89323fd strlen 13550 7ff7f892efa0 3 API calls 13547->13550 13548 7ff7f8932321 wcslen 13549 7ff7f892f140 6 API calls 13548->13549 13552 7ff7f8932338 13549->13552 13551 7ff7f8931be2 13550->13551 13551->13547 13551->13548 13553 7ff7f892f140 6 API calls 13551->13553 13554 7ff7f892efa0 3 API calls 13551->13554 13552->13552 13553->13551 13554->13551 13557 7ff7f892f364 13555->13557 13556 7ff7f892f62d memset 13563 7ff7f892f42a 13556->13563 13557->13556 13557->13557 13557->13563 13558 7ff7f892f552 13558->13551 13559 7ff7f892f792 13561 7ff7f892f4d6 13559->13561 13562 7ff7f892f434 13559->13562 13566 7ff7f892f7c9 memset 13559->13566 13560 7ff7f892f75b 13560->13561 13560->13562 13565 7ff7f892f8e7 memset 13560->13565 13561->13558 13564 7ff7f892f53a fputc 13561->13564 13567 7ff7f892f54d 13561->13567 13562->13561 13568 7ff7f892f9b8 13562->13568 13569 7ff7f892f4bd fputc 13562->13569 13563->13559 13563->13560 13563->13561 13563->13562 13564->13561 13564->13567 13565->13561 13566->13561 13567->13558 13570 7ff7f892f58d fputc 13567->13570 13568->13568 13569->13561 13569->13562 13570->13558 13570->13567 13878 7ff7f8933495 13879 7ff7f89334b8 13878->13879 13880 7ff7f89334b0 13878->13880 13881 7ff7f8933f3d 13879->13881 13891 7ff7f89334cf 13879->13891 13882 7ff7f8935f60 9 API calls 13880->13882 13883 7ff7f89357b0 6 API calls 13881->13883 13882->13879 13884 7ff7f8933f45 memcpy 13883->13884 13885 7ff7f8935f60 9 API calls 13884->13885 13888 7ff7f8933628 13885->13888 13886 7ff7f8933ffc 13887 7ff7f8935f60 9 API calls 13886->13887 13892 7ff7f8933060 13886->13892 13887->13892 13888->13886 13889 7ff7f8935910 9 API calls 13888->13889 13888->13892 13889->13888 13890 7ff7f8935910 9 API calls 13890->13891 13891->13886 13891->13888 13891->13890 12107 7ff7f8911294 12111 7ff7f891121c 12107->12111 12108 7ff7f89112fe malloc 12109 7ff7f891142d 12108->12109 12108->12111 12110 7ff7f8911330 strlen malloc memcpy 12110->12110 12110->12111 12111->12108 12111->12109 12111->12110 12112 7ff7f8911244 SetUnhandledExceptionFilter 12111->12112 12112->12111 13897 7ff7f8911c58 13899 7ff7f8911c5b 13897->13899 13900 7ff7f8a1bcc0 14 API calls 13899->13900 13901 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 13899->13901 13900->13899 13571 7ff7f892e758 13572 7ff7f892e760 13571->13572 13584 7ff7f892d588 13571->13584 13573 7ff7f8935f60 9 API calls 13572->13573 13572->13584 13573->13584 13574 7ff7f8935f60 9 API calls 13574->13584 13575 7ff7f892ec89 13579 7ff7f89357b0 6 API calls 13575->13579 13576 7ff7f892e7ec 13577 7ff7f892e812 memset 13576->13577 13578 7ff7f892e853 13576->13578 13577->13578 13580 7ff7f892ec98 13579->13580 13581 7ff7f892e44d _errno 13583 7ff7f892e628 _errno 13581->13583 13581->13584 13582 7ff7f892e140 _errno 13582->13584 13584->13574 13584->13581 13584->13582 13584->13583 13585 7ff7f892de0d memset 13584->13585 13586 7ff7f892c9b0 7 API calls 13584->13586 13587 7ff7f892e5d9 13584->13587 13585->13584 13586->13584 13587->13575 13587->13576 13902 7ff7f8931c58 13903 7ff7f8932321 wcslen 13902->13903 13909 7ff7f8931c79 13902->13909 13904 7ff7f892f140 6 API calls 13903->13904 13905 7ff7f8932338 13904->13905 13905->13905 13906 7ff7f892f140 6 API calls 13906->13909 13907 7ff7f89323fd strlen 13908 7ff7f892efa0 3 API calls 13907->13908 13908->13909 13909->13902 13909->13906 13909->13907 13910 7ff7f892efa0 3 API calls 13909->13910 13910->13909 13247 7ff7f8932261 13248 7ff7f8931e2d 13247->13248 13249 7ff7f8931e42 13247->13249 13250 7ff7f8930680 29 API calls 13248->13250 13251 7ff7f8930680 29 API calls 13249->13251 13250->13249 13252 7ff7f893228d 13251->13252 13252->13252 12842 7ff7f8912560 strlen 12843 7ff7f891257d 12842->12843 12844 7ff7f892c160 ___lc_codepage_func WideCharToMultiByte 12845 7ff7f892c1b4 12844->12845 13588 7ff7f892b760 TryEnterCriticalSection 13589 7ff7f892b789 13588->13589 13590 7ff7f892b772 13588->13590 13591 7ff7f892b77a 13590->13591 13592 7ff7f892b780 LeaveCriticalSection 13590->13592 13592->13589 12846 7ff7f8911d68 12847 7ff7f8a12cd0 47 API calls 12846->12847 12848 7ff7f8911d7d 12847->12848 12849 7ff7f89499a0 memcmp 12848->12849 12851 7ff7f8912256 12848->12851 12855 7ff7f8911d9f 12848->12855 12849->12855 12850 7ff7f89b9390 32 API calls 12852 7ff7f8911dab 12850->12852 12853 7ff7f89b95e0 32 API calls 12852->12853 12854 7ff7f8911db3 12853->12854 12864 7ff7f89119b0 rand 12854->12864 12855->12850 12855->12851 12865 7ff7f8911ac2 12864->12865 12866 7ff7f89119f2 12864->12866 12876 7ff7f8a1bcc0 12865->12876 12869 7ff7f8911a3b 12866->12869 12870 7ff7f8911a10 rand 12866->12870 12868 7ff7f8911ac7 12871 7ff7f8a12cd0 47 API calls 12869->12871 12870->12869 12870->12870 12873 7ff7f8911a57 12871->12873 12872 7ff7f89499a0 memcmp 12872->12873 12873->12868 12873->12872 12874 7ff7f89b9390 32 API calls 12873->12874 12875 7ff7f89b95e0 32 API calls 12873->12875 12874->12873 12875->12873 12877 7ff7f8a1bcce 12876->12877 12878 7ff7f89387d0 14 API calls 12877->12878 12879 7ff7f8a1bd13 12878->12879 13593 7ff7f892d367 13595 7ff7f892d37d 13593->13595 13621 7ff7f892d495 13593->13621 13594 7ff7f892e140 _errno 13594->13621 13596 7ff7f892d3dc 13595->13596 13599 7ff7f892e02e 13595->13599 13597 7ff7f8935f60 9 API calls 13596->13597 13598 7ff7f892d431 13596->13598 13596->13621 13597->13598 13628 7ff7f89364f0 13598->13628 13601 7ff7f892e05c 13599->13601 13602 7ff7f892ebc3 13599->13602 13606 7ff7f892e081 memset 13601->13606 13601->13621 13607 7ff7f89357b0 6 API calls 13602->13607 13604 7ff7f892e44d _errno 13605 7ff7f892e628 _errno 13604->13605 13604->13621 13606->13621 13608 7ff7f892ebd2 13607->13608 13609 7ff7f892dccc 13611 7ff7f8935f60 9 API calls 13609->13611 13610 7ff7f892dad8 13635 7ff7f892ed30 13610->13635 13611->13621 13612 7ff7f8935f60 9 API calls 13612->13621 13614 7ff7f892d479 13614->13609 13615 7ff7f892db98 13614->13615 13614->13621 13616 7ff7f8935f60 9 API calls 13615->13616 13617 7ff7f892db21 13616->13617 13618 7ff7f892e5d9 13619 7ff7f892ec89 13618->13619 13620 7ff7f892e7ec 13618->13620 13625 7ff7f89357b0 6 API calls 13619->13625 13622 7ff7f892e812 memset 13620->13622 13623 7ff7f892e853 13620->13623 13621->13594 13621->13604 13621->13605 13621->13612 13621->13617 13621->13618 13624 7ff7f892c9b0 7 API calls 13621->13624 13627 7ff7f892de0d memset 13621->13627 13622->13623 13624->13621 13626 7ff7f892ec98 13625->13626 13627->13621 13629 7ff7f8935680 4 API calls 13628->13629 13630 7ff7f893650c 13629->13630 13631 7ff7f8936619 malloc 13630->13631 13633 7ff7f893651c 13630->13633 13631->13633 13634 7ff7f892d44a 13631->13634 13632 7ff7f8936644 LeaveCriticalSection 13632->13633 13633->13632 13633->13634 13634->13609 13634->13610 13634->13614 13636 7ff7f892ed4e 13635->13636 13637 7ff7f89357b0 6 API calls 13636->13637 13638 7ff7f892ed65 13637->13638 13639 7ff7f89357b0 6 API calls 13638->13639 13641 7ff7f892ee4a 13638->13641 13640 7ff7f892ee7b memcpy 13639->13640 13640->13641 13641->13621 13914 7ff7f8913469 13915 7ff7f8913479 13914->13915 13918 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 13915->13918 11856 7ff7f8914270 11858 7ff7f8914045 11856->11858 11857 7ff7f8914286 11858->11857 11859 7ff7f8914093 LdrLoadDll 11858->11859 11860 7ff7f89140aa GetProcAddress 11859->11860 11864 7ff7f89140f2 11859->11864 11861 7ff7f89140cb 11860->11861 11862 7ff7f89140cd VirtualProtect 11860->11862 11861->11862 11863 7ff7f89140ea LdrUnloadDll 11862->11863 11862->11864 11863->11864 11865 7ff7f8913c70 GetCurrentProcess 11866 7ff7f8913cad 11865->11866 11867 7ff7f8914160 11866->11867 11868 7ff7f8913cb5 11866->11868 11869 7ff7f891418f 11867->11869 11871 7ff7f8914314 11867->11871 11907 7ff7f8913060 GetCurrentProcess 11868->11907 11872 7ff7f8912ea0 24 API calls 11869->11872 12013 7ff7f8a1bfb0 11871->12013 11886 7ff7f8913d57 11872->11886 11873 7ff7f8913ce0 GetTempPathW wcslen 11975 7ff7f8912ea0 11873->11975 11877 7ff7f8914320 11879 7ff7f8a1c0a0 23 API calls 11877->11879 11878 7ff7f8913d4c 11881 7ff7f8a05ae0 27 API calls 11878->11881 11882 7ff7f89142c7 11879->11882 11880 7ff7f8912e10 24 API calls 11880->11886 11881->11886 11981 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 11882->11981 11884 7ff7f8913e16 strlen 11927 7ff7f8912d70 11884->11927 11886->11880 11886->11884 11888 7ff7f89140f2 11886->11888 11889 7ff7f8913ece LoadLibraryA GetProcAddress 11886->11889 11890 7ff7f8913f3e GetProcAddress 11886->11890 11891 7ff7f8913f8e GetProcAddress 11886->11891 11892 7ff7f8913fbb 11886->11892 11933 7ff7f89134d0 11886->11933 11889->11886 11890->11886 11891->11886 11891->11888 11962 7ff7f8912e10 11892->11962 11895 7ff7f89142f3 11982 7ff7f8a1c0a0 11895->11982 11896 7ff7f8914006 11968 7ff7f8a05ae0 11896->11968 11899 7ff7f8914011 11899->11882 11899->11899 11900 7ff7f8914031 11899->11900 11901 7ff7f8914286 11900->11901 11902 7ff7f8914093 LdrLoadDll 11900->11902 11902->11888 11903 7ff7f89140aa GetProcAddress 11902->11903 11904 7ff7f89140cb 11903->11904 11905 7ff7f89140cd VirtualProtect 11903->11905 11904->11905 11905->11888 11906 7ff7f89140ea LdrUnloadDll 11905->11906 11906->11888 11908 7ff7f8913098 11907->11908 11909 7ff7f8913250 11908->11909 11910 7ff7f89130a0 GetTempPathA 11908->11910 11913 7ff7f8913294 strlen 11909->11913 11916 7ff7f89132d6 memcpy 11909->11916 11911 7ff7f89132bd 11910->11911 11912 7ff7f89130f6 11910->11912 12036 7ff7f89fe610 11911->12036 11912->11909 11915 7ff7f8913100 11912->11915 11917 7ff7f8912d70 24 API calls 11913->11917 12027 7ff7f894ee70 11915->12027 11926 7ff7f8913308 11916->11926 11917->11911 11921 7ff7f89131e4 strlen 12031 7ff7f894f710 11921->12031 11922 7ff7f8912d70 24 API calls 11924 7ff7f8913164 11922->11924 11924->11921 11924->11926 11925 7ff7f89131fd 11925->11873 11928 7ff7f8912dd0 11927->11928 11932 7ff7f8912d8e 11927->11932 11930 7ff7f89fe610 23 API calls 11928->11930 11929 7ff7f8912d97 11929->11886 11930->11932 11931 7ff7f8912dec memcpy 11931->11886 11932->11929 11932->11931 12040 7ff7f8a1ab80 malloc 11933->12040 11935 7ff7f8913503 memcpy 11936 7ff7f89135f8 11935->11936 11937 7ff7f8913544 CreateFileW 11935->11937 11939 7ff7f8913650 11936->11939 11943 7ff7f8a05ca0 23 API calls 11936->11943 11938 7ff7f8913580 WriteFile 11937->11938 11945 7ff7f89135c3 11937->11945 11940 7ff7f89135ae CloseHandle 11938->11940 11941 7ff7f89138c0 CloseHandle 11938->11941 11939->11939 11942 7ff7f8913664 wcslen 11939->11942 11961 7ff7f8913728 11939->11961 11940->11945 11944 7ff7f8a05930 25 API calls 11942->11944 11943->11939 11946 7ff7f89136d2 11944->11946 11945->11886 11949 7ff7f8a05ae0 27 API calls 11946->11949 11957 7ff7f8913c12 11946->11957 11947 7ff7f8913c06 11951 7ff7f8a1c0a0 23 API calls 11947->11951 11948 7ff7f8a1c0a0 23 API calls 11948->11957 11952 7ff7f89136ff 11949->11952 11950 7ff7f8a05ae0 27 API calls 11950->11961 11951->11957 11953 7ff7f891371a 11952->11953 11954 7ff7f8913c55 11952->11954 11956 7ff7f8a05ae0 27 API calls 11953->11956 11955 7ff7f8a1c0a0 23 API calls 11954->11955 11955->11957 11956->11961 11957->11948 11959 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 11957->11959 11958 7ff7f8913a9c 11959->11957 11960 7ff7f8a007f0 31 API calls 11960->11961 11961->11937 11961->11947 11961->11950 11961->11958 11961->11960 11963 7ff7f8912e38 11962->11963 11964 7ff7f8912e50 11962->11964 11965 7ff7f8912e41 wcslen 11963->11965 11967 7ff7f8912e90 memcpy 11963->11967 12042 7ff7f8a05ca0 11964->12042 11965->11895 11965->11896 11967->11965 11969 7ff7f8a05afd 11968->11969 11970 7ff7f8a05b06 11969->11970 11971 7ff7f8a05b38 11969->11971 11973 7ff7f8a05b15 memcpy 11970->11973 11974 7ff7f8a05b20 11970->11974 12047 7ff7f8a05d20 11971->12047 11973->11974 11974->11899 11976 7ff7f8912ee0 11975->11976 11979 7ff7f8912ec8 11975->11979 11977 7ff7f8a05ca0 23 API calls 11976->11977 11977->11979 11978 7ff7f8912ed1 wcslen 11978->11877 11978->11878 11979->11978 11980 7ff7f8912f20 memcpy 11979->11980 11980->11978 11983 7ff7f8a1c0b3 11982->11983 12061 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 11983->12061 12014 7ff7f8a1bfc3 12013->12014 12062 7ff7f89c9910 12014->12062 12016 7ff7f8a1bfd1 12075 7ff7f892bb40 RtlCaptureContext RtlUnwindEx abort 12016->12075 12028 7ff7f894ee87 12027->12028 12029 7ff7f8913130 12027->12029 12028->12029 12030 7ff7f894eea6 memchr 12028->12030 12029->11921 12029->11922 12030->12028 12030->12029 12032 7ff7f894f795 12031->12032 12033 7ff7f894f731 12031->12033 12032->11925 12033->12032 12034 7ff7f894f764 memchr 12033->12034 12034->12032 12035 7ff7f894f774 memcmp 12034->12035 12035->12032 12035->12033 12037 7ff7f89fe626 12036->12037 12038 7ff7f8a1c0a0 23 API calls 12037->12038 12039 7ff7f89fe677 12038->12039 12039->11916 12041 7ff7f8a1aba7 12040->12041 12043 7ff7f8a05d01 12042->12043 12046 7ff7f8a05cb6 12042->12046 12044 7ff7f8a1c0a0 23 API calls 12043->12044 12045 7ff7f8a05d0d 12044->12045 12045->11963 12048 7ff7f8a05d5e 12047->12048 12049 7ff7f8a05ec7 12048->12049 12051 7ff7f8a05d75 12048->12051 12050 7ff7f8a1c0a0 23 API calls 12049->12050 12055 7ff7f8a05ed3 12050->12055 12052 7ff7f8a1ab80 malloc 12051->12052 12053 7ff7f8a05dca 12052->12053 12054 7ff7f8a05deb 12053->12054 12056 7ff7f8a05ddf memcpy 12053->12056 12057 7ff7f8a05e0f memcpy 12054->12057 12060 7ff7f8a05e23 12054->12060 12055->11974 12056->12054 12057->12060 12058 7ff7f8a05e2b 12058->11974 12059 7ff7f8a05e67 memcpy 12059->12058 12060->12058 12060->12059 12063 7ff7f89c99d5 12062->12063 12064 7ff7f89c9935 strlen 12062->12064 12065 7ff7f8a1bfb0 21 API calls 12063->12065 12066 7ff7f89c9945 12064->12066 12067 7ff7f89c9988 12064->12067 12069 7ff7f89c99e1 12065->12069 12076 7ff7f89be620 12066->12076 12067->12016 12083 7ff7f89cac20 12069->12083 12070 7ff7f89c9954 12072 7ff7f89c9961 memcpy 12070->12072 12074 7ff7f89c996f 12070->12074 12072->12074 12073 7ff7f89c9a1a 12073->12016 12074->12016 12077 7ff7f89be692 12076->12077 12078 7ff7f89be637 12076->12078 12079 7ff7f8a1c0a0 23 API calls 12077->12079 12080 7ff7f8a1ab80 malloc 12078->12080 12082 7ff7f89be69e 12079->12082 12081 7ff7f89be681 12080->12081 12081->12070 12082->12070 12084 7ff7f89cac36 12083->12084 12085 7ff7f89cac90 12083->12085 12084->12083 12086 7ff7f89cac3f 12084->12086 12088 7ff7f8a1bfb0 22 API calls 12084->12088 12085->12073 12087 7ff7f89be620 22 API calls 12086->12087 12089 7ff7f89cac4e 12087->12089 12088->12084 12090 7ff7f89cac69 12089->12090 12091 7ff7f89cac5b memcpy 12089->12091 12090->12073 12091->12090 12880 7ff7f8915d70 12881 7ff7f8915d78 12880->12881 12882 7ff7f8915af9 12881->12882 12883 7ff7f89164d8 12881->12883 12885 7ff7f8915d9a 12881->12885 12884 7ff7f8918d50 2 API calls 12883->12884 12884->12882 12885->12882 12886 7ff7f8918d50 2 API calls 12885->12886 12886->12882 13646 7ff7f891876f 13647 7ff7f891877c 13646->13647 13648 7ff7f8918202 13647->13648 13649 7ff7f8917f10 2 API calls 13647->13649 13650 7ff7f891878e 13649->13650 13924 7ff7f892a070 13925 7ff7f892a08c 13924->13925 13931 7ff7f892a11e 13924->13931 13926 7ff7f8925b20 6 API calls 13925->13926 13925->13931 13927 7ff7f892a0c5 13926->13927 13928 7ff7f892a0d2 13927->13928 13929 7ff7f892a1a0 free 13927->13929 13930 7ff7f892a0f2 strlen 13928->13930 13928->13931 13929->13931 13932 7ff7f892a180 free 13930->13932 13933 7ff7f892a104 memcpy free 13930->13933 13932->13931 13933->13931 13934 7ff7f8916073 13935 7ff7f891607f 13934->13935 13936 7ff7f8a1c6ae 13935->13936 13937 7ff7f8a1c6a0 free 13935->13937 13937->13936

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 7ff7f8913c70-7ff7f8913caf GetCurrentProcess call 7ff7f8912d50 3 7ff7f8914160-7ff7f8914184 0->3 4 7ff7f8913cb5-7ff7f8913cdb call 7ff7f8913060 0->4 5 7ff7f891418f-7ff7f89141a5 call 7ff7f8912ea0 3->5 6 7ff7f8914186-7ff7f8914189 3->6 10 7ff7f8913ce0-7ff7f8913d46 GetTempPathW wcslen call 7ff7f8912ea0 wcslen 4->10 16 7ff7f89141b0-7ff7f89141dc call 7ff7f8912e10 5->16 6->5 8 7ff7f8914314-7ff7f891431b call 7ff7f8a1bfb0 6->8 15 7ff7f8914320-7ff7f891432f call 7ff7f8a1c0a0 8->15 10->15 17 7ff7f8913d4c-7ff7f8913d71 call 7ff7f8a05ae0 10->17 24 7ff7f89142d1-7ff7f89142f1 call 7ff7f8a007d0 call 7ff7f892bb40 call 7ff7f8a007d0 15->24 26 7ff7f89141e8-7ff7f89141fb 16->26 17->26 27 7ff7f8913d8b-7ff7f8913db5 17->27 46 7ff7f89142c7-7ff7f89142cc call 7ff7f8a007d0 24->46 31 7ff7f891422b-7ff7f8914230 26->31 32 7ff7f89141fd-7ff7f8914216 26->32 29 7ff7f8913db7-7ff7f8913dc4 call 7ff7f8a1ab40 27->29 30 7ff7f8913dc9-7ff7f8913e01 27->30 29->30 35 7ff7f8913e08-7ff7f8913e14 30->35 37 7ff7f8914234-7ff7f8914246 31->37 32->27 40 7ff7f891421c-7ff7f8914221 32->40 35->35 39 7ff7f8913e16-7ff7f8913e70 strlen call 7ff7f8912d70 call 7ff7f89134d0 35->39 37->37 41 7ff7f8914248-7ff7f8914250 37->41 50 7ff7f8913e72-7ff7f8913e7e call 7ff7f8a1ab40 39->50 51 7ff7f8913e83-7ff7f8913e86 39->51 41->32 46->24 50->51 53 7ff7f8913e8c-7ff7f8913eba 51->53 54 7ff7f8914111-7ff7f891411c 51->54 57 7ff7f8913ec0-7ff7f8913ecc 53->57 55 7ff7f891411e-7ff7f891412b call 7ff7f8a1ab40 54->55 56 7ff7f8914130-7ff7f8914138 54->56 55->56 59 7ff7f891414a-7ff7f891415d 56->59 60 7ff7f891413a-7ff7f8914149 call 7ff7f8a1ab40 56->60 57->57 61 7ff7f8913ece-7ff7f8913f28 LoadLibraryA GetProcAddress 57->61 60->59 63 7ff7f8913f30-7ff7f8913f3c 61->63 63->63 65 7ff7f8913f3e-7ff7f8913f7d GetProcAddress 63->65 66 7ff7f8913f80-7ff7f8913f8c 65->66 66->66 67 7ff7f8913f8e-7ff7f8913fa0 GetProcAddress 66->67 67->54 68 7ff7f8913fa6-7ff7f8913fac 67->68 68->54 69 7ff7f8913fb2-7ff7f8913fb5 68->69 69->16 70 7ff7f8913fbb-7ff7f8914000 call 7ff7f8912e10 wcslen 69->70 73 7ff7f89142f3-7ff7f8914302 call 7ff7f8a1c0a0 70->73 74 7ff7f8914006-7ff7f891402b call 7ff7f8a05ae0 70->74 73->46 79 7ff7f8914031-7ff7f891403d 74->79 80 7ff7f8914252-7ff7f8914265 74->80 83 7ff7f8914045-7ff7f891406d 79->83 81 7ff7f8914267-7ff7f8914280 80->81 82 7ff7f8914295-7ff7f891429a 80->82 81->83 90 7ff7f8914286-7ff7f891428b 81->90 85 7ff7f891429e-7ff7f89142b0 82->85 86 7ff7f891406f-7ff7f891407c call 7ff7f8a1ab40 83->86 87 7ff7f8914081-7ff7f89140a8 LdrLoadDll 83->87 85->85 88 7ff7f89142b2-7ff7f89142ba 85->88 86->87 92 7ff7f89140aa-7ff7f89140c9 GetProcAddress 87->92 93 7ff7f89140f2-7ff7f89140fd 87->93 88->46 88->81 94 7ff7f89140cb 92->94 95 7ff7f89140cd-7ff7f89140e8 VirtualProtect 92->95 93->54 96 7ff7f89140ff-7ff7f891410c call 7ff7f8a1ab40 93->96 94->95 95->93 97 7ff7f89140ea-7ff7f89140ef LdrUnloadDll 95->97 96->54 97->93
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CurrentPathProcessTempwcslen$memcpystrlen
                                • String ID: 1-+!$:a.dll$?$Execute$G$LdrLoadDll$_xQR$a.dll$basic_string: construction from null is not valid$basic_string::append
                                • API String ID: 2900198006-422064679
                                • Opcode ID: b435ad7ec5c172377df6c7db62dc04d68ec628c804fcb6cc879e325285b4db4d
                                • Instruction ID: 07a788541ce645b99223e1137d0fb4af7330bf46723ac7226bbc1abe529de125
                                • Opcode Fuzzy Hash: b435ad7ec5c172377df6c7db62dc04d68ec628c804fcb6cc879e325285b4db4d
                                • Instruction Fuzzy Hash: AAE1A12260DB8685EB20EB15E4403AAE761FB88B90FC44135DAAE07BD8DF3CD545D794

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 99 7ff7f8913d77-7ff7f8913d83 100 7ff7f8913d8b-7ff7f8913db5 99->100 101 7ff7f8913db7-7ff7f8913dc4 call 7ff7f8a1ab40 100->101 102 7ff7f8913dc9-7ff7f8913e01 100->102 101->102 104 7ff7f8913e08-7ff7f8913e14 102->104 104->104 105 7ff7f8913e16-7ff7f8913e70 strlen call 7ff7f8912d70 call 7ff7f89134d0 104->105 110 7ff7f8913e72-7ff7f8913e7e call 7ff7f8a1ab40 105->110 111 7ff7f8913e83-7ff7f8913e86 105->111 110->111 113 7ff7f8913e8c-7ff7f8913eba 111->113 114 7ff7f8914111-7ff7f891411c 111->114 117 7ff7f8913ec0-7ff7f8913ecc 113->117 115 7ff7f891411e-7ff7f891412b call 7ff7f8a1ab40 114->115 116 7ff7f8914130-7ff7f8914138 114->116 115->116 119 7ff7f891414a-7ff7f891415d 116->119 120 7ff7f891413a-7ff7f8914149 call 7ff7f8a1ab40 116->120 117->117 121 7ff7f8913ece-7ff7f8913f28 LoadLibraryA GetProcAddress 117->121 120->119 123 7ff7f8913f30-7ff7f8913f3c 121->123 123->123 125 7ff7f8913f3e-7ff7f8913f7d GetProcAddress 123->125 126 7ff7f8913f80-7ff7f8913f8c 125->126 126->126 127 7ff7f8913f8e-7ff7f8913fa0 GetProcAddress 126->127 127->114 128 7ff7f8913fa6-7ff7f8913fac 127->128 128->114 129 7ff7f8913fb2-7ff7f8913fb5 128->129 130 7ff7f8913fbb-7ff7f8914000 call 7ff7f8912e10 wcslen 129->130 131 7ff7f89141b0-7ff7f89141fb call 7ff7f8912e10 129->131 136 7ff7f89142f3-7ff7f8914302 call 7ff7f8a1c0a0 130->136 137 7ff7f8914006-7ff7f891402b call 7ff7f8a05ae0 130->137 143 7ff7f891422b-7ff7f8914230 131->143 144 7ff7f89141fd-7ff7f8914216 131->144 147 7ff7f89142c7-7ff7f89142f1 call 7ff7f8a007d0 * 2 call 7ff7f892bb40 call 7ff7f8a007d0 136->147 145 7ff7f8914031-7ff7f891403d 137->145 146 7ff7f8914252-7ff7f8914265 137->146 149 7ff7f8914234-7ff7f8914246 143->149 144->100 153 7ff7f891421c-7ff7f8914221 144->153 152 7ff7f8914045-7ff7f891406d 145->152 150 7ff7f8914267-7ff7f8914280 146->150 151 7ff7f8914295-7ff7f891429a 146->151 149->149 154 7ff7f8914248-7ff7f8914250 149->154 150->152 164 7ff7f8914286-7ff7f891428b 150->164 158 7ff7f891429e-7ff7f89142b0 151->158 159 7ff7f891406f-7ff7f891407c call 7ff7f8a1ab40 152->159 160 7ff7f8914081-7ff7f89140a8 LdrLoadDll 152->160 154->144 158->158 162 7ff7f89142b2-7ff7f89142ba 158->162 159->160 168 7ff7f89140aa-7ff7f89140c9 GetProcAddress 160->168 169 7ff7f89140f2-7ff7f89140fd 160->169 162->147 162->150 171 7ff7f89140cb 168->171 172 7ff7f89140cd-7ff7f89140e8 VirtualProtect 168->172 169->114 173 7ff7f89140ff-7ff7f891410c call 7ff7f8a1ab40 169->173 171->172 172->169 175 7ff7f89140ea-7ff7f89140ef LdrUnloadDll 172->175 173->114 175->169
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: AddressProc$Load$LibraryProtectUnloadVirtualstrlenwcslen
                                • String ID: 1-+!$1-+!_xQR$:a.dll$?$Execute$G$LdrLoadDll$_xQR
                                • API String ID: 3642747353-1020948967
                                • Opcode ID: ac7cbebfa299ef058e6635967f354b8f2964a2265605eb576fd2bb126a06853c
                                • Instruction ID: b3a545e7e7eacfdd544f2090dc7e5e99e14a58ad58302358f82b9f23e5d420f1
                                • Opcode Fuzzy Hash: ac7cbebfa299ef058e6635967f354b8f2964a2265605eb576fd2bb126a06853c
                                • Instruction Fuzzy Hash: CDA1902260DFC285EB20DB15E4503AAF7A1FB88B90F848136CA9E07B98DF3CD505D790

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 178 7ff7f89134d0-7ff7f8913533 call 7ff7f8a1ab80 memcpy 181 7ff7f89135f8-7ff7f891363c 178->181 182 7ff7f8913544-7ff7f891357a CreateFileW 178->182 185 7ff7f89138e8-7ff7f891391a call 7ff7f8a05ca0 181->185 186 7ff7f8913650-7ff7f8913662 181->186 183 7ff7f89138d0-7ff7f89138da 182->183 184 7ff7f8913580-7ff7f89135a8 WriteFile 182->184 190 7ff7f89138e0 183->190 191 7ff7f89135c3-7ff7f89135cd call 7ff7f8a1ab40 183->191 187 7ff7f89135ae-7ff7f89135c1 CloseHandle 184->187 188 7ff7f89138c0-7ff7f89138c6 CloseHandle 184->188 185->186 199 7ff7f8913928-7ff7f891392c 185->199 186->186 189 7ff7f8913664-7ff7f89136ec wcslen call 7ff7f8a05930 186->189 187->191 193 7ff7f89135d2-7ff7f89135f4 call 7ff7f8a1ab40 187->193 201 7ff7f89136f2-7ff7f8913714 call 7ff7f8a05ae0 189->201 202 7ff7f8913c44-7ff7f8913c53 call 7ff7f8a1c0a0 189->202 190->193 191->193 203 7ff7f89139bc-7ff7f89139c4 199->203 204 7ff7f8913776-7ff7f891378e 199->204 219 7ff7f891371a-7ff7f8913747 call 7ff7f8a05ae0 201->219 220 7ff7f8913c55-7ff7f8913c61 call 7ff7f8a1c0a0 201->220 217 7ff7f8913c27-7ff7f8913c3f call 7ff7f8a007d0 call 7ff7f8a1ab40 call 7ff7f892bb40 202->217 209 7ff7f89139c8-7ff7f89139cb 203->209 205 7ff7f8913794-7ff7f89137b9 call 7ff7f8a05ae0 204->205 206 7ff7f8913c06-7ff7f8913c0d call 7ff7f8a1c0a0 204->206 225 7ff7f8913a68-7ff7f8913a7b 205->225 226 7ff7f89137bf-7ff7f89137cb 205->226 218 7ff7f8913c12-7ff7f8913c22 call 7ff7f8a007d0 * 2 206->218 214 7ff7f89139cd-7ff7f89139d1 209->214 215 7ff7f8913a20-7ff7f8913a2c 209->215 221 7ff7f89139d7-7ff7f89139df 214->221 222 7ff7f8913b1e-7ff7f8913b2a 214->222 227 7ff7f8913a38-7ff7f8913a43 215->227 217->202 218->217 219->199 250 7ff7f891374d-7ff7f8913755 219->250 220->218 223 7ff7f8913b2f-7ff7f8913b62 221->223 224 7ff7f89139e5-7ff7f89139e9 221->224 222->215 232 7ff7f8913b68-7ff7f8913b6b 223->232 233 7ff7f8913a09-7ff7f8913a1e 223->233 234 7ff7f8913bac-7ff7f8913bd8 224->234 235 7ff7f89139ef-7ff7f89139f2 224->235 239 7ff7f8913aab-7ff7f8913ab0 225->239 240 7ff7f8913a7d-7ff7f8913a96 225->240 236 7ff7f89137d3-7ff7f89137ed 226->236 227->203 237 7ff7f8913a49-7ff7f8913a57 227->237 244 7ff7f8913b6d-7ff7f8913b7d 232->244 233->215 234->215 235->215 245 7ff7f89139f4-7ff7f8913a03 235->245 246 7ff7f89137f2-7ff7f89137fd 236->246 237->225 249 7ff7f8913ab4-7ff7f8913ac5 239->249 240->236 256 7ff7f8913a9c-7ff7f8913aa1 240->256 244->244 253 7ff7f8913b7f 244->253 245->233 254 7ff7f8913bdd-7ff7f8913c01 245->254 246->227 255 7ff7f8913803-7ff7f8913816 246->255 249->249 257 7ff7f8913ac7-7ff7f8913ace 249->257 250->204 258 7ff7f8913757-7ff7f891375f 250->258 253->233 254->215 255->209 262 7ff7f891381c-7ff7f891383b 255->262 257->240 259 7ff7f8913ad0 258->259 260 7ff7f8913765-7ff7f8913770 258->260 268 7ff7f8913ada-7ff7f8913aec 259->268 260->204 265 7ff7f8913950-7ff7f891397e call 7ff7f8a007f0 260->265 263 7ff7f891383d-7ff7f8913861 262->263 264 7ff7f8913875-7ff7f8913880 262->264 263->264 267 7ff7f8913863-7ff7f8913870 call 7ff7f8a1ab40 263->267 269 7ff7f8913882-7ff7f891388f call 7ff7f8a1ab40 264->269 270 7ff7f8913894-7ff7f891389f 264->270 265->268 279 7ff7f8913984-7ff7f8913990 265->279 267->264 273 7ff7f8913af2-7ff7f8913af8 268->273 274 7ff7f8913b84-7ff7f8913b89 268->274 269->270 270->182 276 7ff7f89138a5-7ff7f891393a call 7ff7f8a1ab40 270->276 280 7ff7f8913afa-7ff7f8913b00 273->280 281 7ff7f8913b06-7ff7f8913b09 273->281 277 7ff7f8913b8d-7ff7f8913b9e 274->277 276->260 287 7ff7f8913940-7ff7f8913943 276->287 277->277 282 7ff7f8913ba0-7ff7f8913ba7 277->282 284 7ff7f8913998-7ff7f89139b7 279->284 280->281 281->284 285 7ff7f8913b0f-7ff7f8913b19 281->285 282->273 284->246 285->284 287->205
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: mallocmemcpy
                                • String ID: basic_string::append
                                • API String ID: 4276657696-3811946249
                                • Opcode ID: f2a24654ebdb0de499fa3cb3071d86c97609a1b1a7bc6cc9d4f2037ee26fafcc
                                • Instruction ID: a8b9668829baf18e0b9093b9c3426eef31d9fb4db624fcb19885daba8a0921d0
                                • Opcode Fuzzy Hash: f2a24654ebdb0de499fa3cb3071d86c97609a1b1a7bc6cc9d4f2037ee26fafcc
                                • Instruction Fuzzy Hash: 82D1902260DAC585EB60DB15E8047AEF361FB85BA0F808235DAAD47BD8DF3CD444E794

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 288 7ff7f8913060-7ff7f8913093 GetCurrentProcess call 7ff7f8912d50 290 7ff7f8913098-7ff7f891309a 288->290 291 7ff7f8913268-7ff7f89132bd call 7ff7f8937860 strlen call 7ff7f8912d70 290->291 292 7ff7f89130a0-7ff7f89130f0 GetTempPathA 290->292 294 7ff7f89132c8-7ff7f89132e3 call 7ff7f89fe610 291->294 292->294 295 7ff7f89130f6-7ff7f89130fa 292->295 305 7ff7f89132e8-7ff7f89132f8 memcpy 294->305 298 7ff7f8913250-7ff7f8913253 295->298 299 7ff7f8913100-7ff7f8913134 call 7ff7f894ee70 295->299 300 7ff7f8913259 298->300 301 7ff7f8913461-7ff7f8913464 298->301 308 7ff7f891313a-7ff7f891316f call 7ff7f8912d70 299->308 309 7ff7f89131e4-7ff7f891320c strlen call 7ff7f894f710 299->309 300->291 301->305 312 7ff7f8913308-7ff7f8913310 305->312 308->312 318 7ff7f8913175-7ff7f8913185 308->318 320 7ff7f891321c-7ff7f8913224 309->320 321 7ff7f891320e-7ff7f8913217 call 7ff7f8a1ab40 309->321 313 7ff7f8913340-7ff7f8913348 312->313 314 7ff7f8913312-7ff7f891331d 312->314 319 7ff7f8913350-7ff7f8913353 313->319 317 7ff7f8913322-7ff7f891332f 314->317 317->313 318->319 322 7ff7f891318b-7ff7f89131aa 318->322 323 7ff7f8913393-7ff7f891339d 319->323 324 7ff7f8913355-7ff7f8913359 319->324 326 7ff7f8913234-7ff7f8913247 320->326 327 7ff7f8913226-7ff7f891322f call 7ff7f8a1ab40 320->327 321->320 322->317 328 7ff7f89131b0-7ff7f89131d1 322->328 330 7ff7f89133b0-7ff7f89133c5 323->330 329 7ff7f891335b-7ff7f8913360 324->329 324->330 327->326 328->309 332 7ff7f89131d3-7ff7f89131df call 7ff7f8a1ab40 328->332 333 7ff7f89133d0-7ff7f8913403 329->333 334 7ff7f8913362-7ff7f8913365 329->334 330->323 332->309 335 7ff7f8913409-7ff7f891340c 333->335 336 7ff7f8913383-7ff7f8913388 333->336 338 7ff7f891336b-7ff7f891336d 334->338 339 7ff7f8913425-7ff7f8913442 334->339 340 7ff7f891340e-7ff7f891341e 335->340 341 7ff7f891338d-7ff7f8913390 336->341 338->341 342 7ff7f891336f-7ff7f891337d 338->342 339->341 340->340 343 7ff7f8913420 340->343 341->323 342->336 344 7ff7f8913447-7ff7f891345c 342->344 343->336 344->341
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strlen$CurrentPathProcessTempmemchrmemcpy
                                • String ID:
                                • API String ID: 1237187527-0
                                • Opcode ID: b8ce6924fedb661b87884fb1d263ab3edc801dc2d5a500a0fb930ce7753d2c66
                                • Instruction ID: b8472579dce7dcd6562ff9dc5ff575dfd490795d76b082d3347bd39e262ecb3b
                                • Opcode Fuzzy Hash: b8ce6924fedb661b87884fb1d263ab3edc801dc2d5a500a0fb930ce7753d2c66
                                • Instruction Fuzzy Hash: 87A1732660CF8185EB50DB19E44036EE7A1FB85BA0F944235EAAD03BD8DF7CD005EB54

                                Control-flow Graph

                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 62107a3d02b81b5234c88d95762d057ed00c24eaffb834b4604cbe2bde97a6a7
                                • Instruction ID: 911e168ad3c189f9a1701a13446ed1dc46d1237289c8e0a781f14389e198ab24
                                • Opcode Fuzzy Hash: 62107a3d02b81b5234c88d95762d057ed00c24eaffb834b4604cbe2bde97a6a7
                                • Instruction Fuzzy Hash: 9C41BE21A0DA4699FB51FF15E890279E3A4BF04B92FC41438C92D473E1DF2CE401B3A8

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CaptureContextCreateFirstProcess32SnapshotToolhelp32Unwindabort
                                • String ID:
                                • API String ID: 1927501140-0
                                • Opcode ID: d0db7728f9c99ea370fcf01e04ea703f72949bf83f037fa8fe1b684acdd07e92
                                • Instruction ID: 993c13baeed53fd45165622c411de91e1393468ee510d68d09cad93b5bc61b35
                                • Opcode Fuzzy Hash: d0db7728f9c99ea370fcf01e04ea703f72949bf83f037fa8fe1b684acdd07e92
                                • Instruction Fuzzy Hash: 5B41C76270DA8685EB14EB11E4002BAE362FB897A1FC44131EE6E07BC5DF7CD4019794

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CloseFileHandle$CreateWrite
                                • String ID:
                                • API String ID: 3602564925-0
                                • Opcode ID: 394c0e051cec6e34f4efdc98b69a1e23df70269413b6b1c3fb0bf7fe79d9565c
                                • Instruction ID: d059ac98f9ae1592d352f16411e5253d76a7f9787d978b63fb97e528020f161a
                                • Opcode Fuzzy Hash: 394c0e051cec6e34f4efdc98b69a1e23df70269413b6b1c3fb0bf7fe79d9565c
                                • Instruction Fuzzy Hash: EF118F2270994642E710AB15F41477BE261BB84BB9F800231DD7E0BBD4DF3CE44AA798

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: malloc$memcpystrlen
                                • String ID:
                                • API String ID: 3553820921-0
                                • Opcode ID: 543d9a2a041976af41462432e31a9754b6760f675d962eca3c3379e79177352a
                                • Instruction ID: ac28afac479f051f264a0276a816e34b64ec33999e8e880b60aad02f679dd221
                                • Opcode Fuzzy Hash: 543d9a2a041976af41462432e31a9754b6760f675d962eca3c3379e79177352a
                                • Instruction Fuzzy Hash: A431B025E0DA565AF761EF15E4903B4E391AF41B92FC45038CE2D0B3D1DE2DA405E7A8

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: malloc$memcpystrlen
                                • String ID:
                                • API String ID: 3553820921-0
                                • Opcode ID: 56020effcdf1f183f441924a68ad24072c27b0678ef036c8d0d284124bb19e98
                                • Instruction ID: 8176e96958ea13edd44ec9e32a4a843880e7fba00ee6f5af97e74e15097b9fb3
                                • Opcode Fuzzy Hash: 56020effcdf1f183f441924a68ad24072c27b0678ef036c8d0d284124bb19e98
                                • Instruction Fuzzy Hash: 1F314D26A0DA069AE712FF15E4803B9E390AF41B96FC45135DE2D0B7D1DE3CA441E7A8

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: Free
                                • String ID:
                                • API String ID: 3978063606-0
                                • Opcode ID: 93c2952a0c8981b52afb0a14e18351ed005bad92f15dad71d93b2897e3149a8a
                                • Instruction ID: e0d7851fd7d0763df74ef12348043bb4c1156371d6daf0fb72554b99e926c52a
                                • Opcode Fuzzy Hash: 93c2952a0c8981b52afb0a14e18351ed005bad92f15dad71d93b2897e3149a8a
                                • Instruction Fuzzy Hash: 67115B97D0DAC34BF7622BBC4C65139FFA0EB51B207CD9075C354422C2E95D680396AD

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: malloc
                                • String ID:
                                • API String ID: 2803490479-0
                                • Opcode ID: 988b4ae5ae706df390a6233965e24e8829ae3f9e1bccf5fff257dc606ecde792
                                • Instruction ID: 20c7bf17ec7fe6631bdc3705d0c59692c91c8454bc1b0dd49aa94fc84bc12f83
                                • Opcode Fuzzy Hash: 988b4ae5ae706df390a6233965e24e8829ae3f9e1bccf5fff257dc606ecde792
                                • Instruction Fuzzy Hash: 1DD09E00B0F74A09FE5977A155527B4C1818F48361F480435DD6E453C2ED1CB84069B5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strlenstrncmp
                                • String ID: Z$Z$_$_$_$_GLOBAL_
                                • API String ID: 1310274236-662103887
                                • Opcode ID: 67900ba0dafbe8d0e4433077726af768059a8f719d3a5e9100497bef6a6a133d
                                • Instruction ID: 05e3552c2f72c717c88f453085a27dfdd86061ce0aa057958640fb659dd656c1
                                • Opcode Fuzzy Hash: 67900ba0dafbe8d0e4433077726af768059a8f719d3a5e9100497bef6a6a133d
                                • Instruction Fuzzy Hash: 0662D372A086828AF765EF25C8543FDB7A1FB0178AF914035DA3E0BBC5CB399540E794
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: $P$P
                                • API String ID: 2221118986-3733749394
                                • Opcode ID: 6c4975efa101d25bce8fb2713dfa8b24bac3f22bc36ad2dce6f035114948cbbe
                                • Instruction ID: 1897b648ad8e4b90b7c95d77dff712cde9fdbaed3d0ab68b57e032197f0eaa6e
                                • Opcode Fuzzy Hash: 6c4975efa101d25bce8fb2713dfa8b24bac3f22bc36ad2dce6f035114948cbbe
                                • Instruction Fuzzy Hash: B912E332A0C2868AE760EF24E4407BEF394FB84345F914135DA59477CADF7CE444ABA5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: ?$?$?$L]O[$m~RF
                                • API String ID: 1004003707-3421602070
                                • Opcode ID: 1d2fd37fcf9e9270826f93c39df50b07c1c31ca18e56336efe699e63f3ad2eb9
                                • Instruction ID: 3f8c47d2c97fa7c38e31633d3a2aea466cf79f74929fe7fa370ffdfa616a0bc7
                                • Opcode Fuzzy Hash: 1d2fd37fcf9e9270826f93c39df50b07c1c31ca18e56336efe699e63f3ad2eb9
                                • Instruction Fuzzy Hash: B631F77290C7858AEB11DF28E4402AAFBA4E799784FC44136EB9D07B85DB7CC541CF94
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: $!$P
                                • API String ID: 0-2344582389
                                • Opcode ID: e65736c1dc54ff8f8e83bf8e017ecec5d9c8dafb1b82336238fa23b941b4cde6
                                • Instruction ID: c5179618e135e483231e3357bf462fa4a19026bb5eb10805db97cbaf2a42fe47
                                • Opcode Fuzzy Hash: e65736c1dc54ff8f8e83bf8e017ecec5d9c8dafb1b82336238fa23b941b4cde6
                                • Instruction Fuzzy Hash: DBF1D03290C78986E774EF10D0843BEF7A1EB84345F818139D66953AC9DF7CE444ABA4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b2e773bbcf05a206fa72d67c052939a87a5037e1002fc13afee4ac7b2a9d1dd5
                                • Instruction ID: 686076f1026dcf1f6e531a4cea8db3924b2927bfca5fb60a028bcda7500a793a
                                • Opcode Fuzzy Hash: b2e773bbcf05a206fa72d67c052939a87a5037e1002fc13afee4ac7b2a9d1dd5
                                • Instruction Fuzzy Hash: 90C1FF72A181428AE764EF15D40067EF791FB94B89F859030EE2A477D5DE3CE800AFD4
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID: 0-3916222277
                                • Opcode ID: 7722b09541f8c3a1042df91a4b64b4147f17cf3696f4ae9f4b099ea08ef108bb
                                • Instruction ID: 74073a9f7c44d94c8593611c629f418a4e4d8d923216dcca03048df8efc53691
                                • Opcode Fuzzy Hash: 7722b09541f8c3a1042df91a4b64b4147f17cf3696f4ae9f4b099ea08ef108bb
                                • Instruction Fuzzy Hash: EFD11562B0C59146EB65DB15C90437DEA9ABB89786FC8C131DA2E073C4DE3CEA01F794
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CriticalLeaveSectionSleepmalloc
                                • String ID:
                                • API String ID: 1993596536-0
                                • Opcode ID: 40c92fb735db31c4a03f034ad08b64e87eddef291a1e133e22cfab3f13ba580c
                                • Instruction ID: ab2f9332f057ed4e748426f109b44946d98036f7f7a7db283aa3a984406e6684
                                • Opcode Fuzzy Hash: 40c92fb735db31c4a03f034ad08b64e87eddef291a1e133e22cfab3f13ba580c
                                • Instruction Fuzzy Hash: AF514AB1A1860146F71E9F15F404B7AEAA5EBA0785FC08139DA2A07BD4CE3CD641FBD4
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: Time$FileSystem
                                • String ID:
                                • API String ID: 2086374402-0
                                • Opcode ID: 46c7dbe23d092bf8a6cde5c49624f993adbbbb886253ff5ee6eafb8ff8e2e83b
                                • Instruction ID: dd8da88bbc850a6c263d2b66025dc6f30c93f2a7d63a1bc24738253622f2f6ce
                                • Opcode Fuzzy Hash: 46c7dbe23d092bf8a6cde5c49624f993adbbbb886253ff5ee6eafb8ff8e2e83b
                                • Instruction Fuzzy Hash: C4F02E93B2560983CF18DF78E865174E362DB58BD9B4D9831CE1F8A764EE1CD1518700
                                Strings
                                • not enough space for format expansion (Please submit full bug report at https://gcc.gnu.org/bugs/): , xrefs: 00007FF7F8A1C472
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: not enough space for format expansion (Please submit full bug report at https://gcc.gnu.org/bugs/):
                                • API String ID: 0-1835032153
                                • Opcode ID: 22c68a30ff3daa7df784249dc6277a948d227140d038bcbc91f8ea689e4fba7a
                                • Instruction ID: 4f714ca220dcab1a33735e98fc2e9622ac0ef174645bf17edf6dbc74aa5dd53a
                                • Opcode Fuzzy Hash: 22c68a30ff3daa7df784249dc6277a948d227140d038bcbc91f8ea689e4fba7a
                                • Instruction Fuzzy Hash: 71310411B09A4A99EB20FB22D8406A9E321FF55BE0FC01132D96D03BD5DE2CE106D7A8
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 26e0fa4ba8de209f33d981733c211bfc04209555fe558efc360ad56f06d6f81b
                                • Instruction ID: 25796f37ef882c12819f7aee2209ffee0a96aeb083efca9f12e4069a3eea0b8e
                                • Opcode Fuzzy Hash: 26e0fa4ba8de209f33d981733c211bfc04209555fe558efc360ad56f06d6f81b
                                • Instruction Fuzzy Hash: 2712C2A2E0DF8248FB52EB00A84177AE6D59B517A2FD58431CA7C067C6DE3CE541E3E4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7d695400308593cf20877fba39419934d70e09c66bbd3b3c0be29ad461eb275a
                                • Instruction ID: 0707360cffb2719816f8a01e0369b496822fe7a9fd99dbda0ed56463096580c6
                                • Opcode Fuzzy Hash: 7d695400308593cf20877fba39419934d70e09c66bbd3b3c0be29ad461eb275a
                                • Instruction Fuzzy Hash: 3B12C1B2A0DF4359EB55EF159440379E6A2EB44BA6F948034CA2D037CADE3CE891D3D4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CaptureContextUnwindabortstrlen
                                • String ID:
                                • API String ID: 1885994862-0
                                • Opcode ID: 64e9393206085fcb00df7a018d95655fe9d0974c3a9ce78d6eb726f0e18b7d0f
                                • Instruction ID: 2efe8880e53de097b3515c24b379572565615f358a2819be933a9797dd83c1b6
                                • Opcode Fuzzy Hash: 64e9393206085fcb00df7a018d95655fe9d0974c3a9ce78d6eb726f0e18b7d0f
                                • Instruction Fuzzy Hash: 4C413E60D0EA9744FB61B721A805BB5EA90EF167A4FC40135D8BD063D2DF6CA045ABFC

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: alnum$alpha$cntrl$digit$graph$lower$print$punct$space$upper$xdigit
                                • API String ID: 1004003707-2937198513
                                • Opcode ID: e67547db2ed2332a7f19e7dca95a45f00ddd27835b6d9e5c57363dc607d87d2e
                                • Instruction ID: d630e8b8a5ed068fe2466b919d463fa43f5b4a7ddd4eb17893e371e64c285323
                                • Opcode Fuzzy Hash: e67547db2ed2332a7f19e7dca95a45f00ddd27835b6d9e5c57363dc607d87d2e
                                • Instruction Fuzzy Hash: 4E310554B0C60755FB10FBA5E901375D289AF44386FC96032D92E862C5EEACF845F2BD

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: ExceptionRaiseUnwindabort
                                • String ID: CCG $CCG $CCG!$CCG!$CCG"
                                • API String ID: 4140830120-3297834124
                                • Opcode ID: e45fc8471f7cc306109c62edf8b254349e2b495fbaec3812b0675ed500c917f7
                                • Instruction ID: 540d6cdebc4d2227a5f3ee2b297ffca49dd232c8c55bc6e2d51e3c447f94270b
                                • Opcode Fuzzy Hash: e45fc8471f7cc306109c62edf8b254349e2b495fbaec3812b0675ed500c917f7
                                • Instruction Fuzzy Hash: 3D51C436A14B81C2E760DB15E4807A9B3B0F799B88F905236EE8D13798DF39D582D744
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID: UUUU
                                • API String ID: 1992160199-1798160573
                                • Opcode ID: f77c88ed8e2e0546aa95018f39101ab1acda64fb455bfe48ab528bf610eb644e
                                • Instruction ID: f4793f2c495f257da5b7864c2a464372090e1b6c3295c3811906efdd9695a86b
                                • Opcode Fuzzy Hash: f77c88ed8e2e0546aa95018f39101ab1acda64fb455bfe48ab528bf610eb644e
                                • Instruction Fuzzy Hash: 78128672A0910287EF65DF25C140379F7E5EB44B5AF948235CA1D072C8DA3CE840FBA8
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CriticalSection$DeleteEnterErrorInitializeLastLeaveValuefree
                                • String ID:
                                • API String ID: 100439675-0
                                • Opcode ID: 30aa02ae5bca33457ef710422f6a64a41ac8ead17b866e7ea412da05448c15c7
                                • Instruction ID: fb131571f47c51609b0076c1f2c0188fd9107da82e3c9eaf3d251bffde5da1f5
                                • Opcode Fuzzy Hash: 30aa02ae5bca33457ef710422f6a64a41ac8ead17b866e7ea412da05448c15c7
                                • Instruction Fuzzy Hash: 84414222A0960286FB55FB15E8412B9E3A0AF55B93FC94534CD2D477D4DE3CE842A3AC
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID:
                                • API String ID: 1992160199-0
                                • Opcode ID: f294bb9004327c1bec0d0349a18b948e00fe3e45a64ad46b07d7e6d5aa7348cc
                                • Instruction ID: a2a1345993d659fbb331c870d8ec0ac575b024c775c63227f14225fedd439c59
                                • Opcode Fuzzy Hash: f294bb9004327c1bec0d0349a18b948e00fe3e45a64ad46b07d7e6d5aa7348cc
                                • Instruction Fuzzy Hash: 62E18372A142028AEB64DF25D050739F7F5EB84B5AF648235CB19477C8DA39EC40FBA4
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProcwcslen
                                • String ID: 1-+!$G$TEMP$basic_string: construction from null is not valid
                                • API String ID: 1064947497-2238167505
                                • Opcode ID: b0833021c85c12311d7ea6ad174c81375b93a74c7c7ca75d79944687dd432d59
                                • Instruction ID: 8ebefb4a85f5714bfa4505cec3441d1a7c82a33e0d23a369fafe679fe31cc12d
                                • Opcode Fuzzy Hash: b0833021c85c12311d7ea6ad174c81375b93a74c7c7ca75d79944687dd432d59
                                • Instruction Fuzzy Hash: 2D31A121A1DB8682EB11AB54E4006A9F770EB85B94FC04032DA5E17B98DE3CE506D794
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: ExceptionRaise$abort
                                • String ID: CCG $CCG"$CCG"
                                • API String ID: 3325032505-1179968548
                                • Opcode ID: dc1771becb5f7d7a174ac4ee873c316158b39dbcf1eb3e3089c99a13fe7347f6
                                • Instruction ID: bb56ef22e4fd6caf1f1d2a4b5eef14ff8c85c73fd41edb9a7ede3a28d7ca8557
                                • Opcode Fuzzy Hash: dc1771becb5f7d7a174ac4ee873c316158b39dbcf1eb3e3089c99a13fe7347f6
                                • Instruction Fuzzy Hash: 7A218333A25F8483E750DF58E4403A97760F7D9788F60A226EA8D477A4DF7DD1928740
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CriticalLeaveSectionfree
                                • String ID:
                                • API String ID: 1679108487-0
                                • Opcode ID: 0ec2b4e6d6c535e2a887363803070b15498508364dcae1917e8e010573d5d365
                                • Instruction ID: 82d722cf9b07768a2024a7dd950549965ba249197585ab6aa2a2f0d9a975c3c6
                                • Opcode Fuzzy Hash: 0ec2b4e6d6c535e2a887363803070b15498508364dcae1917e8e010573d5d365
                                • Instruction Fuzzy Hash: C5918F31A09A0295EB25FB15ED402B9E2A9EF08786FC44435D93D0B7D4DF3CA551B3E8
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcpy_s$_strlwr$ByteCharMultiWidestrstr
                                • String ID:
                                • API String ID: 606828236-0
                                • Opcode ID: 740dde69bc923aa62291048bd7d2af24dee97c0faba599a4844422326155c18e
                                • Instruction ID: 802666c5d3b543065605e9a6a0f1080d61c5770bc6773cba74e61a401e49e6a5
                                • Opcode Fuzzy Hash: 740dde69bc923aa62291048bd7d2af24dee97c0faba599a4844422326155c18e
                                • Instruction Fuzzy Hash: 2A419D62608BC186EB21DF16E9407AAE765FB89BE4F804131EE9D03B98CF7CD142D744
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: Virtual$ErrorLastProtectQuery
                                • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                • API String ID: 637304234-2123141913
                                • Opcode ID: 7e5edb8918cca671259d210b3ecaa9bda19f23f623a60bfb8c9acd9308f120bb
                                • Instruction ID: d221b25226055790b60ace2b210eceaa9ca8d0f0c836eb2c213bd2cbdc704eae
                                • Opcode Fuzzy Hash: 7e5edb8918cca671259d210b3ecaa9bda19f23f623a60bfb8c9acd9308f120bb
                                • Instruction Fuzzy Hash: E1419263A08A4686DB11EF14E8419A9F7A0FB44B95FC54131DE2D073D4EF3CE446D7A8
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID:
                                • API String ID: 1992160199-0
                                • Opcode ID: 3c91229a8620996d77b275314aee762391fa8306f714f08d228cfd6e98818314
                                • Instruction ID: 087396777fddf544d557c86b4105d6914bf3a38b15bccde1966b47f273d2587d
                                • Opcode Fuzzy Hash: 3c91229a8620996d77b275314aee762391fa8306f714f08d228cfd6e98818314
                                • Instruction Fuzzy Hash: 05F1FB72E1854246EB30EF25D104B39E691BB14B6AF968234CD3E577C4CA3CF941E798
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: Byte$CharLeadMultiWide___lc_codepage_func___mb_cur_max_func
                                • String ID:
                                • API String ID: 2785433807-0
                                • Opcode ID: b8ade29cbcad1670599392aa2893148449ef957c3984b89b714999f8b731dc73
                                • Instruction ID: 750697808981ad839852152427f6272cd56d1dd58698dfcb1b5f66211db65dad
                                • Opcode Fuzzy Hash: b8ade29cbcad1670599392aa2893148449ef957c3984b89b714999f8b731dc73
                                • Instruction Fuzzy Hash: 5931292360920249F762AB25E8003B9E5986B417B9F844236EEB9477C0DE3DD181F394
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: rand
                                • String ID: and $+-*/$Performing arithmetic operations on:
                                • API String ID: 415692148-3864222635
                                • Opcode ID: f0d3409b9f0d6e33847339fe865cbda917983b98c22d437aab5b055a0af117dc
                                • Instruction ID: 415e6b116f241f5f88595c01908793563dc929e75aa7bfcb23537a692a14c8b7
                                • Opcode Fuzzy Hash: f0d3409b9f0d6e33847339fe865cbda917983b98c22d437aab5b055a0af117dc
                                • Instruction Fuzzy Hash: 45210512F0E91608EB14FB25984527DD7925F86B91FC89131DD2E073DADD3CE900A3E8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID: ;$=$=$HEN>
                                • API String ID: 4139908857-2188461147
                                • Opcode ID: de21482289b350c4a1ef8e9bc7a21981703884f7dfa1a2066d3a504667ed42bb
                                • Instruction ID: 301b1f9359e91ce8b3320cf02f05b108577195b672c7e25093d0aa523f467341
                                • Opcode Fuzzy Hash: de21482289b350c4a1ef8e9bc7a21981703884f7dfa1a2066d3a504667ed42bb
                                • Instruction Fuzzy Hash: 4F41A032A0CB8486EB11DB18F0403A9F7A0F789798FC10526DB9D03B98DB7CD245CB85
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: basic_string::_M_create
                                • API String ID: 0-3122258987
                                • Opcode ID: 20fa1f9c38397dc2b23d1681f4029f1745706513a81d31012c60e506a3e6e86a
                                • Instruction ID: 12c9ae66d67149bfdd8051b79b6cb57a056c196892071224c59e8f68f479f1aa
                                • Opcode Fuzzy Hash: 20fa1f9c38397dc2b23d1681f4029f1745706513a81d31012c60e506a3e6e86a
                                • Instruction Fuzzy Hash: 5CA1E662B1B68584EF20AF35D8404B9E250EB45BE4FD88631DA3D873D5EF2CE491D3A4
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 64ea054b2a2157d068e8ab586f5ae1021de10276e6996cd183b54ca99c2502e6
                                • Instruction ID: cb9176e7b0d8cbbce7846a40d26a7c63dbdef526f5682213a1436689ec15cb4d
                                • Opcode Fuzzy Hash: 64ea054b2a2157d068e8ab586f5ae1021de10276e6996cd183b54ca99c2502e6
                                • Instruction Fuzzy Hash: EEC19E73E0965286E771EF24C414739E7A1EB44B59F9A8231CA2D573C4CB3CE841E7A8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: Result of $basic_string::_M_create
                                • API String ID: 3510742995-1160149181
                                • Opcode ID: b576b05e5929d0f36fddaa43a352fc9423e68f72584ed5aec93aa7cb1d61b280
                                • Instruction ID: ac791e1cf078792d60bb52dce7c19ff17a95d80b79e8f71366188c0cc80b8f8b
                                • Opcode Fuzzy Hash: b576b05e5929d0f36fddaa43a352fc9423e68f72584ed5aec93aa7cb1d61b280
                                • Instruction Fuzzy Hash: C341F726B0A68658EB19FB15C10027EE652EB80BD9FD44932CD3D0B7C5DE3CE441E3A4
                                APIs
                                Strings
                                • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF7F892AA8A
                                • Unknown pseudo relocation protocol version %d., xrefs: 00007FF7F892AA96
                                • Unknown pseudo relocation bit size %d., xrefs: 00007FF7F892AA74
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                • API String ID: 544645111-1286557213
                                • Opcode ID: 8fbf73ca66cf12792ec4443d84e4f446cfa418b5437152a325ab49fbedd29060
                                • Instruction ID: 2b8a117392022db7cd5f5c59187ae43c89a1543341d361d1c15ebd5ec3e1e1c5
                                • Opcode Fuzzy Hash: 8fbf73ca66cf12792ec4443d84e4f446cfa418b5437152a325ab49fbedd29060
                                • Instruction Fuzzy Hash: 4271E637F1951246EB20E7159542279E3E1BF507A5FD68231CA3D17BD4DE2CE803A2E8
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: CCG
                                • API String ID: 0-1584390748
                                • Opcode ID: d3dbc5fc667eaa8116ddc9648ae4a223ff8f86823c9b38466b26c19195cb2a75
                                • Instruction ID: d1b809eaf88e669cd78256e06df646b3a8565bfade615204f53f7ef3c1bbcfdf
                                • Opcode Fuzzy Hash: d3dbc5fc667eaa8116ddc9648ae4a223ff8f86823c9b38466b26c19195cb2a75
                                • Instruction Fuzzy Hash: F3215E62E091024AFB68F3658552378E1C29FC9752F9A4936C93E863D1DD1CA8C1B2BD
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: freememcpystrlen
                                • String ID:
                                • API String ID: 2208669145-0
                                • Opcode ID: 616034b4082db6133acc050cdb7f1ef8251caf1ace96c15328d116e499333b8e
                                • Instruction ID: 98b0cfb007da36e9366edec59cca7487855aa3ff58e14f6ad55d50b287a57745
                                • Opcode Fuzzy Hash: 616034b4082db6133acc050cdb7f1ef8251caf1ace96c15328d116e499333b8e
                                • Instruction Fuzzy Hash: 03318723B4964245FB66FB11AA01379D2D16F40BF1F998230DD7D06AC6DE2C9441A394
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strlen
                                • String ID: t$ty$y
                                • API String ID: 39653677-1920740250
                                • Opcode ID: 87489741a1c735bb47c7c7fa151bb2518af881d747d5548b986082c319ae107a
                                • Instruction ID: 706f5a5b20ead613ab90d2efe95ae198d905162d13e4c0f52f158d7fe8cb1ab0
                                • Opcode Fuzzy Hash: 87489741a1c735bb47c7c7fa151bb2518af881d747d5548b986082c319ae107a
                                • Instruction Fuzzy Hash: E4E14D72508BC2C6E7568F34C0143E87AA1EB29F4CF4C8135CB990B799DBBE94959371
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: (
                                • API String ID: 1004003707-3887548279
                                • Opcode ID: 44ff3ea0eba828e30fde48cf3e6407d113ef1c86855c37323daa94a633f6d87f
                                • Instruction ID: 913cf6682a6164efc5c8d10d6afd3de962fe0d980127d17dbc539e7d4653c7ef
                                • Opcode Fuzzy Hash: 44ff3ea0eba828e30fde48cf3e6407d113ef1c86855c37323daa94a633f6d87f
                                • Instruction Fuzzy Hash: EEA19F72608B8685E755EF25C4043E9A761EB55F89F884032CE6E0B7D6CF7CD884A3A4
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strlen
                                • String ID: a$a$rm
                                • API String ID: 39653677-3573517395
                                • Opcode ID: c7bf3fc4039771aa151d5a77072f9711761caae911655a942766ef051505f1bc
                                • Instruction ID: 20d7fb173abb93bb8bfee91f78e59622210591e3ffc0689f699272df8fe97d56
                                • Opcode Fuzzy Hash: c7bf3fc4039771aa151d5a77072f9711761caae911655a942766ef051505f1bc
                                • Instruction Fuzzy Hash: 66B182729087C2C5E7569F28C0083E8BA91EB25F4CF5C8135CB980F799DBBE9446A375
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: basic_string::_M_create
                                • API String ID: 3510742995-3122258987
                                • Opcode ID: a8466455f48f34cbcacbad28185616ab40d0001ae848e4642dd8ce78300a4c7c
                                • Instruction ID: 6623dbd95aff52036982ce1ed6c39c966369831b808eeae116866afba11c2ce1
                                • Opcode Fuzzy Hash: a8466455f48f34cbcacbad28185616ab40d0001ae848e4642dd8ce78300a4c7c
                                • Instruction Fuzzy Hash: 9F61D162A1AA4591EB15EB25C8056B9E391EF01BD4FC48732DA3D237D4EF3CE442D394
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: ___lc_codepage_funcfputclocaleconv
                                • String ID:
                                • API String ID: 1339002523-0
                                • Opcode ID: ce1dac330c6f27128e61fe827faa414519fca3154a38c89fa2bd38bea5801416
                                • Instruction ID: 2ba3fce3cb5276d3f6b4b8b3b5d6116cbae242c65a3949932d232f0f704e3df6
                                • Opcode Fuzzy Hash: ce1dac330c6f27128e61fe827faa414519fca3154a38c89fa2bd38bea5801416
                                • Instruction Fuzzy Hash: A1518F73A0551189E731EF24D1413A9F7E1EB04F5AF964231EB2C477C9CA38E841E7A8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: basic_ios::clear$basic_string::_M_replace
                                • API String ID: 3510742995-1781676995
                                • Opcode ID: 9e4550a019cffcd376447f221df9850e9f31bf033150585d54ede76ce84063a6
                                • Instruction ID: 4a78b22e6cf2517163ddace2dceee145f0d13750bd60b794e7974e4fdcea7ad2
                                • Opcode Fuzzy Hash: 9e4550a019cffcd376447f221df9850e9f31bf033150585d54ede76ce84063a6
                                • Instruction Fuzzy Hash: 7631FB21B0968541EB29EB25D9087B9E790AB51FE5FD40231FD3D07BD9CD2CE141E398
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: $ : $new
                                • API String ID: 1004003707-2075650739
                                • Opcode ID: 3fc4c2fb453cfd023dde4cb91d12fe7f9a63e258c5c55c3d849b597dfd20e7c1
                                • Instruction ID: 799eed4d2b69920052d52dafc62ff594feda3c6434eff3240e701b2fec77225d
                                • Opcode Fuzzy Hash: 3fc4c2fb453cfd023dde4cb91d12fe7f9a63e258c5c55c3d849b597dfd20e7c1
                                • Instruction Fuzzy Hash: C6418D72B4874685EB55EF12A8003F9E750AB91B95FC44035CF2A0B7C6DE7CD885A3A4
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memcpystrlen
                                • String ID: basic_string::_M_replace$basic_string::_S_construct null not valid
                                • API String ID: 3412268980-2381965344
                                • Opcode ID: 79e987ffc4bcb91b5321d71e7488087a07853e24a2e21d4a92b84586f2bdd09f
                                • Instruction ID: d02f394c1e59bdfeadb6d10c94ffddc1a1719d34c331bafbbbe120ed6c68bfe7
                                • Opcode Fuzzy Hash: 79e987ffc4bcb91b5321d71e7488087a07853e24a2e21d4a92b84586f2bdd09f
                                • Instruction Fuzzy Hash: 8521D261A0AA4684EB01EB1AE8801ACE7A4FF05BC5FC44435D96D073D1DE3CD452E3E4
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: _strlwrstrcpy_s
                                • String ID:
                                • API String ID: 3746470816-0
                                • Opcode ID: 39eff12b834902331b533afb545837a96e33ccd5846002bbcdcfc94689f971a5
                                • Instruction ID: 33b1064d7e07ca5b26be113e005714b8fb4827fcfa79fe878232263a0b2cb2b9
                                • Opcode Fuzzy Hash: 39eff12b834902331b533afb545837a96e33ccd5846002bbcdcfc94689f971a5
                                • Instruction Fuzzy Hash: 55F08C6175469695FE15AB23BD003B997199F86FD1F8C40329E4D03794CD2CE287D318
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-3474627141
                                • Opcode ID: 194a6ffba7f098d6450882ceade0846a3a5d892eff98fad5ff52d12c8e674ac6
                                • Instruction ID: 1b0d3c9ed8438f9cabf8a368f88430db76e06ef369d1c253e872936d7b9aaa6b
                                • Opcode Fuzzy Hash: 194a6ffba7f098d6450882ceade0846a3a5d892eff98fad5ff52d12c8e674ac6
                                • Instruction Fuzzy Hash: 4F01E122908E8886D312DF1CD8011FAF374FF9A79AFA55325EB8C262A0DF29D543D704
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-2713391170
                                • Opcode ID: 11d2b9735bd3709252506aa5ba5fa1e351431b4c673cdd365ea37068437d7b3c
                                • Instruction ID: c4c35b01cb99ad71911799c7663614a48a4786fbc8e5b34674e77f7c24bc2828
                                • Opcode Fuzzy Hash: 11d2b9735bd3709252506aa5ba5fa1e351431b4c673cdd365ea37068437d7b3c
                                • Instruction Fuzzy Hash: 4BF04F12908E8486D302EF1CA8000ABF364FF9E78AF955326EB9D261A5DF28D543A754
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-4283191376
                                • Opcode ID: ae991bd237688d46af379bc9e2c88ae6c4cf7060aa663ad11618093b77570e75
                                • Instruction ID: 5d9b03a397299cc51c3839f630b31e28801551b2fe13df0c8be79eb4401dcfda
                                • Opcode Fuzzy Hash: ae991bd237688d46af379bc9e2c88ae6c4cf7060aa663ad11618093b77570e75
                                • Instruction Fuzzy Hash: 0EF04F12908E8886D312DF1CA8000ABF364FF9D789F955326EB9D261A5DF28E543A754
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-4273532761
                                • Opcode ID: 22cc9ee71a5ffac9a6ca83f9a2c6e26604571fd27d9318c0ebbd99beaa658a45
                                • Instruction ID: 3b4f65eca98dcf06b901c9519ebba4fa6b304d74491e43d36ecb74cd9bc08617
                                • Opcode Fuzzy Hash: 22cc9ee71a5ffac9a6ca83f9a2c6e26604571fd27d9318c0ebbd99beaa658a45
                                • Instruction Fuzzy Hash: 6CF0AF12808E8482D302DF1CA8000ABF364FF8D78AF955326EB9C261A0DF28D543A354
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-4064033741
                                • Opcode ID: 011e2c0bcc3796c487ded507d96121c6e9820a89f73ee2ebf114777c49236ea0
                                • Instruction ID: a416310d6fe37ccd1aed3898c7c7419be063d765bfb736f99f962a5b571fa658
                                • Opcode Fuzzy Hash: 011e2c0bcc3796c487ded507d96121c6e9820a89f73ee2ebf114777c49236ea0
                                • Instruction Fuzzy Hash: 8DF04F12908E8482D302EF1CA8000ABF364FF9E789F955326EB9D261A5DF28D543A754
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-2187435201
                                • Opcode ID: 62e2639ade3852005c6560a781b013c3a86ab195a2881249103c75c778e9902b
                                • Instruction ID: 38300aff0f0001391649d058bd61e1db1a66a00003435e4926e25b247e91e5f5
                                • Opcode Fuzzy Hash: 62e2639ade3852005c6560a781b013c3a86ab195a2881249103c75c778e9902b
                                • Instruction Fuzzy Hash: F9F04F12908E8486D312DF1CA8000ABF364FF9D789FA55326EB9D261A5DF28D543A754
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1264148326.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000000.00000002.1264119563.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265462644.00007FF7F8A1D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265601901.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265832094.00007FF7F8BB0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265856284.00007FF7F8BB1000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1265880982.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-2468659920
                                • Opcode ID: a7c664df915d4e69880d0547989fba806fe34be971c47809b57ea1152bda214e
                                • Instruction ID: df924d3e8a61780f3f1634cb62cdd8e480527d4ab598960b4c65f43e39012e61
                                • Opcode Fuzzy Hash: a7c664df915d4e69880d0547989fba806fe34be971c47809b57ea1152bda214e
                                • Instruction Fuzzy Hash: 0DF06D12908E8886D302DF1CE8000ABF364FF8E78AF955326EF8C2A165DF28D543A754

                                Execution Graph

                                Execution Coverage:5.6%
                                Dynamic/Decrypted Code Coverage:0.1%
                                Signature Coverage:1.8%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:219
                                execution_graph 79859 14008426b 79860 140084291 79859->79860 79863 14008427c 79859->79863 79861 14008429a 79860->79861 79862 14008445f 79860->79862 79879 1400842f2 79861->79879 79899 14003fb40 79861->79899 79864 14008450f 79862->79864 79869 140084cf0 41 API calls 79862->79869 79873 140084210 3 API calls 79862->79873 79905 1400a9aa0 79863->79905 79870 140084cf0 41 API calls 79864->79870 79866 1400843c2 79875 140084cf0 41 API calls 79866->79875 79868 140084b53 79869->79862 79871 140084528 79870->79871 79872 140084210 3 API calls 79871->79872 79872->79863 79873->79862 79876 1400843fb 79875->79876 79877 140084210 3 API calls 79876->79877 79877->79863 79879->79866 79880 140084cf0 79879->79880 79895 140084210 79879->79895 79881 140084d2f 79880->79881 79886 140084f32 79880->79886 79883 140084fa8 79881->79883 79889 140084f2d 79881->79889 79912 140059570 38 API calls 79881->79912 79913 1400595d0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 79883->79913 79885 140084fc9 79914 140044520 79885->79914 79886->79879 79889->79886 79891 140044520 40 API calls 79889->79891 79892 14008503d 79891->79892 79893 1400ac0c8 Concurrency::cancel_current_task 2 API calls 79892->79893 79894 14008504e 79893->79894 79896 140084240 79895->79896 79897 1400a9aa0 _Strcoll 3 API calls 79896->79897 79898 140084b53 79897->79898 79898->79879 79900 14003fb64 79899->79900 79901 14003fb4d 79899->79901 79902 14003fb7e memcpy_s 79900->79902 79990 1400457e0 79900->79990 79901->79879 79902->79879 79904 14003fbcc 79904->79879 79907 1400a9aa9 79905->79907 79906 1400a9ab4 79906->79868 79907->79906 79908 1400a9f9c IsProcessorFeaturePresent 79907->79908 79909 1400a9fb4 79908->79909 80003 1400aa194 RtlCaptureContext RtlLookupFunctionEntry capture_previous_context 79909->80003 79911 1400a9fc7 79911->79868 79912->79881 79913->79885 79915 140044577 79914->79915 79928 14002e800 79915->79928 79918 140044704 ISource 79920 140044784 79918->79920 79921 1400a9aa0 _Strcoll 3 API calls 79918->79921 79919 1400445b5 ISource 79919->79920 79940 1400ab980 79919->79940 79922 140044776 79921->79922 79923 1400ac0c8 79922->79923 79924 1400ac0e7 Concurrency::cancel_current_task 79923->79924 79925 1400ac110 RtlPcToFileHeader 79924->79925 79926 1400ac132 RaiseException 79924->79926 79927 1400ac128 79925->79927 79926->79889 79927->79926 79929 14002e83b 79928->79929 79931 14002e970 79929->79931 79946 140045670 79929->79946 79932 14002ea13 ISource 79931->79932 79934 14002ea4c 79931->79934 79933 1400a9aa0 _Strcoll 3 API calls 79932->79933 79935 14002ea38 79933->79935 79958 1400aba10 79934->79958 79935->79919 79938 1400aba10 __std_exception_destroy 8 API calls 79939 14002eaa2 ISource 79938->79939 79939->79919 79941 1400ab9eb 79940->79941 79942 1400ab9a1 79940->79942 79941->79918 79942->79941 79943 1400ab9d6 79942->79943 79988 1400949d0 37 API calls 2 library calls 79942->79988 79989 14008cab0 8 API calls 3 library calls 79943->79989 79947 1400457c5 79946->79947 79950 14004569f 79946->79950 79971 14002b5d0 79947->79971 79949 1400457ca 79974 14002b510 40 API calls 2 library calls 79949->79974 79953 1400456f7 79950->79953 79954 140045733 79950->79954 79955 140045704 79950->79955 79957 1400456ea ISource memcpy_s 79950->79957 79953->79949 79953->79955 79956 1400a9be8 std::_Facet_Register 40 API calls 79954->79956 79962 1400a9be8 79955->79962 79956->79957 79957->79931 79959 1400aba1f 79958->79959 79960 14002ea95 79958->79960 79987 14008cab0 8 API calls 3 library calls 79959->79987 79960->79938 79963 1400a9bf3 79962->79963 79964 1400a9c0c 79963->79964 79966 1400a9c12 79963->79966 79975 1400a4d58 79963->79975 79964->79957 79967 1400a9c1d 79966->79967 79978 1400aab1c RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 79966->79978 79979 14002b510 40 API calls 2 library calls 79967->79979 79970 1400a9c23 79986 1400b75f0 40 API calls Concurrency::cancel_current_task 79971->79986 79974->79957 79980 1400a4d94 79975->79980 79978->79967 79979->79970 79985 140097d98 EnterCriticalSection 79980->79985 79987->79960 79988->79943 79989->79941 79991 14004596f 79990->79991 79996 14004580f 79990->79996 79992 14002b5d0 40 API calls 79991->79992 79994 140045974 79992->79994 79993 140045879 79995 1400a9be8 std::_Facet_Register 40 API calls 79993->79995 80002 14002b510 40 API calls 2 library calls 79994->80002 79997 14004585f ISource memcpy_s 79995->79997 79996->79993 79996->79997 79999 1400458a8 79996->79999 80000 14004586c 79996->80000 79997->79904 80001 1400a9be8 std::_Facet_Register 40 API calls 79999->80001 80000->79993 80000->79994 80001->79997 80002->79997 80003->79911 80004 14007d7a6 SelectObject BitBlt 80005 14007fbe4 80006 14007fc10 80005->80006 80143 14007de00 80006->80143 80008 14007fca9 80009 14007fcf3 80008->80009 80206 14008b938 39 API calls 80008->80206 80162 140085190 80009->80162 80012 14007fd03 80015 14007fd4c 80012->80015 80017 14007fd7c ISource memcpy_s 80012->80017 80207 1400946d0 80012->80207 80014 14007fe4a ISource 80016 1400a9aa0 _Strcoll 3 API calls 80014->80016 80015->80017 80018 1400946d0 37 API calls 80015->80018 80019 14007fe6f 80016->80019 80017->80014 80020 14007fe8c 80017->80020 80018->80015 80180 14007e0b0 80020->80180 80022 14007feef 80194 14007e3d0 80022->80194 80216 140077560 80143->80216 80147 14007dea3 80148 14007ded5 ISource memcpy_s 80147->80148 80149 14007dfc7 80147->80149 80161 14007def1 80148->80161 80227 140070170 60 API calls 80148->80227 80153 14007dfd0 RegGetValueA 80149->80153 80150 1400a9aa0 _Strcoll 3 API calls 80151 14007dfae 80150->80151 80151->80008 80156 14007e04d 80153->80156 80154 14007df2d 80228 1400702d0 60 API calls 2 library calls 80154->80228 80159 1400a9aa0 _Strcoll 3 API calls 80156->80159 80157 14007df54 80229 14003e020 80157->80229 80160 14007e08f 80159->80160 80160->80008 80161->80150 80163 1400852d8 80162->80163 80165 1400851d9 80162->80165 80164 14002b5d0 40 API calls 80163->80164 80167 1400852de 80164->80167 80166 140085218 80165->80166 80168 14008523a memcpy_s 80165->80168 80170 140085276 80165->80170 80169 1400a9be8 std::_Facet_Register 40 API calls 80166->80169 80172 140085231 80166->80172 80176 140085357 80167->80176 80259 140051010 80167->80259 80168->80012 80169->80172 80173 1400a9be8 std::_Facet_Register 40 API calls 80170->80173 80171 1400853fa ISource 80177 1400a9aa0 _Strcoll 3 API calls 80171->80177 80172->80168 80289 14002b510 40 API calls 2 library calls 80172->80289 80173->80168 80176->80171 80278 14008af60 80176->80278 80178 1400854ae 80177->80178 80178->80012 80181 14007e109 memcpy_s 80180->80181 80182 1400a9be8 std::_Facet_Register 40 API calls 80181->80182 80183 14007e173 80182->80183 80319 140047890 80183->80319 80185 14007e1b8 EnumDisplayDevicesW 80186 14007e1d5 ISource 80185->80186 80188 14007e279 80185->80188 80192 14007e241 EnumDisplayDevicesW 80186->80192 80193 14007e3bf 80186->80193 80329 14006f8d0 80186->80329 80338 140085880 40 API calls 2 library calls 80186->80338 80190 1400a9aa0 _Strcoll 3 API calls 80188->80190 80191 14007e39e 80190->80191 80191->80022 80192->80186 80192->80188 80195 14007e45f ISource 80194->80195 80199 14007e7bb 80195->80199 80341 1400b82f4 GetNativeSystemInfo 80195->80341 80197 14007e553 80342 140063560 80197->80342 80200 14007e5f4 ISource 80200->80199 80201 1400a9aa0 _Strcoll 3 API calls 80200->80201 80202 14007e79e 80201->80202 80203 14007dcc0 80202->80203 80348 1400aa760 80203->80348 80206->80008 80208 14009470a 80207->80208 80213 1400946e9 80207->80213 80350 1400958c8 80208->80350 80213->80012 80215 14009475e 80215->80012 80233 140075980 80216->80233 80218 1400776c2 80252 140075790 40 API calls Concurrency::cancel_current_task 80218->80252 80220 1400775ad 80220->80218 80240 140034b20 80220->80240 80223 140077687 ISource 80225 1400a9aa0 _Strcoll 3 API calls 80223->80225 80224 14007761e 80224->80218 80224->80223 80226 1400776ac GetVolumeInformationW 80225->80226 80226->80147 80226->80148 80227->80154 80228->80157 80230 14003e068 80229->80230 80231 14003e0cc 80230->80231 80258 1400414b0 40 API calls Concurrency::cancel_current_task 80230->80258 80231->80161 80234 1400759ff 80233->80234 80237 1400759e0 80233->80237 80234->80237 80255 1400454b0 40 API calls 4 library calls 80234->80255 80239 140075b15 80237->80239 80253 1400b67b4 GetCurrentDirectoryW 80237->80253 80256 1400454b0 40 API calls 4 library calls 80237->80256 80239->80220 80241 140034c44 80240->80241 80243 140034b46 80240->80243 80242 14002b5d0 40 API calls 80241->80242 80251 140034b51 memcpy_s 80242->80251 80244 140034c3f 80243->80244 80246 140034c02 80243->80246 80247 140034baa 80243->80247 80243->80251 80257 14002b510 40 API calls 2 library calls 80244->80257 80249 1400a9be8 std::_Facet_Register 40 API calls 80246->80249 80247->80244 80248 140034bb7 80247->80248 80250 1400a9be8 std::_Facet_Register 40 API calls 80248->80250 80249->80251 80250->80251 80251->80224 80254 1400b67c6 __std_fs_get_current_path 80253->80254 80254->80237 80255->80237 80256->80237 80257->80241 80260 14005104d 80259->80260 80262 1400510c1 80260->80262 80263 1400510e3 80260->80263 80268 14005105d ISource 80260->80268 80261 1400a9aa0 _Strcoll 3 API calls 80264 14005128f 80261->80264 80290 14008c104 80262->80290 80266 14008c104 37 API calls 80263->80266 80264->80176 80272 140051111 memcpy_s 80266->80272 80267 140051231 80267->80268 80270 140051317 80267->80270 80268->80261 80269 140045670 40 API calls 80269->80272 80271 140051344 80270->80271 80277 140051010 40 API calls 80270->80277 80271->80176 80272->80267 80272->80269 80274 14008c104 37 API calls 80272->80274 80276 1400512c7 80272->80276 80273 14005135b 80273->80176 80274->80272 80276->80267 80309 14008cbe4 37 API calls 3 library calls 80276->80309 80277->80273 80314 14008ae90 80278->80314 80280 14008b172 80280->80171 80281 14008b1a4 80282 14002b5d0 40 API calls 80281->80282 80283 14008b1af 80282->80283 80318 14002b510 40 API calls 2 library calls 80283->80318 80284 14008af9c ISource memcpy_s 80284->80280 80284->80281 80284->80283 80285 1400a9be8 40 API calls std::_Facet_Register 80284->80285 80287 14008ae90 40 API calls 80284->80287 80285->80284 80287->80284 80288 14008b1b5 80289->80163 80291 14008c13e 80290->80291 80292 14008c120 80290->80292 80310 14008c3ec EnterCriticalSection 80291->80310 80312 140091b6c 7 API calls _get_daylight 80292->80312 80295 14008c125 80313 14008d6a8 37 API calls _invalid_parameter_noinfo 80295->80313 80308 14008c130 ProcessCodePage 80308->80268 80309->80276 80311 1400d0200 80310->80311 80312->80295 80313->80308 80315 14008aea6 80314->80315 80316 14008aec3 80314->80316 80315->80316 80317 140051010 40 API calls 80315->80317 80316->80284 80317->80316 80318->80288 80320 1400478e1 ISource 80319->80320 80322 1400478bc 80319->80322 80320->80185 80321 1400479c2 80339 14002b510 40 API calls 2 library calls 80321->80339 80322->80320 80322->80321 80324 140047917 80322->80324 80325 1400478ee 80322->80325 80327 1400a9be8 std::_Facet_Register 40 API calls 80324->80327 80325->80321 80326 1400478fb 80325->80326 80328 1400a9be8 std::_Facet_Register 40 API calls 80326->80328 80327->80320 80328->80320 80330 14006f91e 80329->80330 80336 14006f8ff ISource 80329->80336 80332 140034b20 40 API calls 80330->80332 80331 1400a9aa0 _Strcoll 3 API calls 80333 14006f9be 80331->80333 80334 14006f947 80332->80334 80333->80186 80340 14006f9e0 40 API calls 2 library calls 80334->80340 80336->80331 80337 14006f9cc 80336->80337 80338->80186 80339->80320 80340->80336 80341->80197 80343 140063625 80342->80343 80346 140063590 memcpy_s 80342->80346 80347 140067920 41 API calls 4 library calls 80343->80347 80345 14006363a 80345->80200 80346->80200 80347->80345 80349 14007dcd0 GetUserNameW 80348->80349 80351 1400958dd __std_fs_get_current_path 80350->80351 80352 140095909 FlsSetValue 80351->80352 80353 1400958ec FlsGetValue 80351->80353 80355 14009591b 80352->80355 80358 1400958f9 _get_daylight 80352->80358 80354 140095903 80353->80354 80353->80358 80354->80352 80376 1400992a8 7 API calls 3 library calls 80355->80376 80357 14009592a 80359 140095948 FlsSetValue 80357->80359 80360 140095938 FlsSetValue 80357->80360 80363 14009470f 80358->80363 80383 140095298 37 API calls std::locale::_Setgloballocale 80358->80383 80361 140095954 FlsSetValue 80359->80361 80362 140095966 80359->80362 80364 140095941 80360->80364 80361->80364 80382 140095678 7 API calls _get_daylight 80362->80382 80371 140097b50 80363->80371 80377 140098c40 80364->80377 80368 14009596e 80370 140098c40 __free_lconv_num 7 API calls 80368->80370 80370->80358 80372 140094728 80371->80372 80373 140097b65 80371->80373 80372->80213 80375 14009b4c4 37 API calls 3 library calls 80372->80375 80373->80372 80385 1400a0d14 37 API calls 3 library calls 80373->80385 80375->80215 80376->80357 80378 140098c45 HeapFree 80377->80378 80379 140098c76 80377->80379 80378->80379 80380 140098c60 __std_fs_get_current_path __free_lconv_num 80378->80380 80379->80358 80384 140091b6c 7 API calls _get_daylight 80380->80384 80382->80368 80384->80379 80385->80372 80386 1400774a3 80387 1400774aa 80386->80387 80389 1400774ca 80386->80389 80392 1400421c0 80387->80392 80390 1400a9aa0 _Strcoll 3 API calls 80389->80390 80391 14007754d 80390->80391 80393 14003fb40 40 API calls 80392->80393 80394 14004222a 80393->80394 80395 14003fb40 40 API calls 80394->80395 80396 14004233d 80395->80396 80396->80389 80397 14007cdf0 80398 14007d004 InternetOpenA 80397->80398 80399 14007ce52 80397->80399 80400 14007d04d InternetOpenUrlA 80398->80400 80406 14007d02a 80398->80406 80427 1400a9b70 AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 80399->80427 80403 14007d0c0 HttpQueryInfoW 80400->80403 80400->80406 80405 14007d11d HttpQueryInfoW 80403->80405 80403->80406 80404 1400a9aa0 _Strcoll 3 API calls 80407 14007d40e 80404->80407 80409 14007d1a6 InternetQueryDataAvailable 80405->80409 80410 14007d17a 80405->80410 80406->80404 80411 14007d3a3 InternetCloseHandle 80409->80411 80412 14007d1c2 80409->80412 80428 1400919b0 37 API calls ProcessCodePage 80410->80428 80411->80406 80412->80411 80415 14007d269 InternetReadFile 80412->80415 80422 1400a9be8 std::_Facet_Register 40 API calls 80412->80422 80424 14007d429 80412->80424 80426 14007d21e ISource memcpy_s 80412->80426 80418 14007d35d 80415->80418 80415->80426 80417 14007d18b 80417->80409 80418->80411 80421 14007d392 ISource 80418->80421 80418->80424 80419 1400a9be8 std::_Facet_Register 40 API calls 80419->80426 80421->80411 80422->80412 80423 14007d434 80429 14002b510 40 API calls 2 library calls 80424->80429 80425 14007d336 InternetQueryDataAvailable 80425->80411 80425->80426 80426->80412 80426->80415 80426->80418 80426->80419 80426->80424 80426->80425 80428->80417 80429->80423 80430 14007d830 SelectObject DeleteDC ReleaseDC DeleteObject 80431 14007d890 80430->80431 80432 1400a9aa0 _Strcoll 3 API calls 80431->80432 80433 14007db05 80432->80433 80434 140044fe9 80435 14004504e 80434->80435 80436 14004500c 80434->80436 80437 1400a9be8 std::_Facet_Register 40 API calls 80435->80437 80436->80435 80438 140045041 80436->80438 80439 14004507d 80436->80439 80442 140045034 ISource memcpy_s 80436->80442 80437->80442 80438->80435 80440 140045100 80438->80440 80441 1400a9be8 std::_Facet_Register 40 API calls 80439->80441 80444 14002b510 40 API calls 2 library calls 80440->80444 80441->80442 80444->80442 80445 140088226 80446 140088242 80445->80446 80449 140088800 80446->80449 80448 140087df0 80450 140088825 80449->80450 80451 140088846 80449->80451 80453 1400888d0 80450->80453 80454 140045670 40 API calls 80450->80454 80452 140045670 40 API calls 80451->80452 80452->80450 80453->80448 80454->80450 80455 14005a337 80456 14005a353 ISource 80455->80456 80459 14005d2f3 80456->80459 80482 14005a45f ISource 80456->80482 80560 1400414b0 40 API calls Concurrency::cancel_current_task 80456->80560 80458 14005a7ce 80458->80459 80460 14005a9dc ISource 80458->80460 80609 14002de50 80459->80609 80545 14005b080 ISource 80460->80545 80557 140041ff0 80460->80557 80466 1400a9aa0 _Strcoll 3 API calls 80469 14005d2d8 80466->80469 80467 14005d200 ISource 80467->80466 80470 14005d5e1 80467->80470 80468 14005d354 80471 14002de50 40 API calls 80468->80471 80490 14005d377 80471->80490 80472 14003fcd0 40 API calls 80472->80482 80473 14003ec60 40 API calls 80473->80482 80475 14005bb90 ISource 80495 14005d43f 80475->80495 80498 14005c607 80475->80498 80554 14005c714 ISource memcpy_s 80475->80554 80599 140061fd0 41 API calls 2 library calls 80475->80599 80478 14002de50 40 API calls 80478->80495 80480 14002de50 40 API calls 80509 14005d501 80480->80509 80482->80458 80482->80459 80482->80472 80482->80473 80561 140052190 80482->80561 80483 14005d40b 80483->80478 80484 14005d4de 80484->80480 80487 14005d3fc 80619 14002dcd0 40 API calls 2 library calls 80487->80619 80489 14002de50 40 API calls 80489->80470 80493 140044520 40 API calls 80490->80493 80492 14005d5ad 80492->80489 80494 14005d3d6 80493->80494 80496 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80494->80496 80500 140044520 40 API calls 80495->80500 80499 14005d3ea 80496->80499 80497 14002b5d0 40 API calls 80502 14005d598 80497->80502 80498->80484 80498->80554 80615 14002cb80 80499->80615 80503 14005d4af 80500->80503 80507 14002cb80 2 API calls 80502->80507 80505 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80503->80505 80508 14005d4c3 80505->80508 80510 14005d59e 80507->80510 80620 14002dcd0 40 API calls 2 library calls 80508->80620 80621 14002b510 40 API calls 2 library calls 80509->80621 80622 14002dcd0 40 API calls 2 library calls 80510->80622 80511 14002d0f0 40 API calls 80546 14005bf42 ISource 80511->80546 80515 14005d4d8 80519 14002cb80 2 API calls 80515->80519 80517 14002cf80 41 API calls 80517->80546 80519->80484 80520 14005d535 80524 140044520 40 API calls 80520->80524 80526 14005d572 80524->80526 80525 140052190 40 API calls 80525->80545 80528 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80526->80528 80527 14002d0f0 40 API calls 80527->80554 80529 14005d586 80528->80529 80529->80497 80530 14002cf80 41 API calls 80530->80554 80534 140052190 40 API calls 80534->80546 80536 140052190 40 API calls 80536->80554 80537 14003fcd0 40 API calls 80537->80545 80539 14003fcd0 40 API calls 80539->80546 80540 14003ec60 40 API calls 80540->80545 80541 14003ec60 40 API calls 80541->80546 80542 1400a9be8 40 API calls std::_Facet_Register 80542->80554 80544 14003fcd0 40 API calls 80544->80554 80545->80468 80545->80475 80545->80483 80545->80487 80545->80490 80545->80499 80545->80525 80545->80537 80545->80540 80569 140061fd0 41 API calls 2 library calls 80545->80569 80570 14002d0f0 80545->80570 80574 14002cf80 80545->80574 80585 14003ee00 40 API calls 80545->80585 80586 140040730 80545->80586 80596 140041620 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 80545->80596 80597 140049b50 40 API calls 2 library calls 80545->80597 80598 1400596b0 41 API calls _Strcoll 80545->80598 80546->80495 80546->80498 80546->80508 80546->80511 80546->80515 80546->80517 80546->80534 80546->80539 80546->80541 80547 140040730 40 API calls 80546->80547 80600 14003ee00 40 API calls 80546->80600 80601 140041620 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 80546->80601 80602 140049b50 40 API calls 2 library calls 80546->80602 80603 1400596b0 41 API calls _Strcoll 80546->80603 80547->80546 80548 14003ec60 40 API calls 80548->80554 80553 140040730 40 API calls 80553->80554 80554->80467 80554->80492 80554->80502 80554->80509 80554->80510 80554->80520 80554->80527 80554->80529 80554->80530 80554->80536 80554->80542 80554->80544 80554->80548 80554->80553 80604 140061fd0 41 API calls 2 library calls 80554->80604 80605 14003ee00 40 API calls 80554->80605 80606 140041620 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 80554->80606 80607 140049b50 40 API calls 2 library calls 80554->80607 80608 1400596b0 41 API calls _Strcoll 80554->80608 80623 140034db0 80557->80623 80559 14004203c 80562 1400521c3 80561->80562 80563 1400a9be8 std::_Facet_Register 40 API calls 80562->80563 80564 1400521d8 80563->80564 80636 14003fcd0 80564->80636 80566 1400521f5 80567 1400a9aa0 _Strcoll 3 API calls 80566->80567 80568 14005220e 80567->80568 80568->80482 80569->80545 80573 14002d119 80570->80573 80571 140034b20 40 API calls 80572 14002d1aa 80571->80572 80572->80545 80573->80571 80575 14002cfb0 80574->80575 80649 1400b64a0 80575->80649 80577 14002cfbc __std_fs_convert_wide_to_narrow 80578 14002d04a 80577->80578 80579 14002d099 80577->80579 80581 14003fb40 40 API calls 80577->80581 80578->80545 80655 14002c140 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 80579->80655 80583 14002d020 __std_fs_convert_wide_to_narrow 80581->80583 80583->80578 80654 14002c140 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 80583->80654 80585->80545 80587 140040886 80586->80587 80588 140040763 80586->80588 80587->80588 80589 140040893 80587->80589 80590 1400a9aa0 _Strcoll 3 API calls 80588->80590 80661 140045220 40 API calls 3 library calls 80589->80661 80591 140040792 80590->80591 80591->80545 80593 1400408b4 80594 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80593->80594 80595 1400408c5 80594->80595 80596->80545 80597->80545 80598->80545 80599->80546 80600->80546 80601->80546 80602->80546 80603->80546 80604->80554 80605->80554 80606->80554 80607->80554 80608->80554 80610 14002de71 80609->80610 80662 14002d780 40 API calls 80610->80662 80616 14002cb9d 80615->80616 80617 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80616->80617 80618 14002cbae 80617->80618 80619->80483 80620->80515 80621->80520 80622->80492 80624 140034dde 80623->80624 80628 140034e94 80624->80628 80629 140034e6d 80624->80629 80631 140034dfa memcpy_s 80624->80631 80632 140034ed3 80624->80632 80634 140034e7e 80624->80634 80625 14002b5d0 40 API calls 80626 140034ed9 80625->80626 80630 1400a9be8 std::_Facet_Register 40 API calls 80628->80630 80633 1400a9be8 std::_Facet_Register 40 API calls 80629->80633 80629->80634 80630->80631 80631->80559 80632->80625 80633->80634 80634->80631 80635 14002b510 40 API calls 2 library calls 80634->80635 80635->80632 80639 14003fcfe 80636->80639 80637 14003fddd 80638 14002b5d0 40 API calls 80637->80638 80641 14003fde3 80638->80641 80639->80637 80640 14003fd4a 80639->80640 80642 14003fd1a memcpy_s 80639->80642 80644 14003fda2 80639->80644 80643 1400a9be8 std::_Facet_Register 40 API calls 80640->80643 80645 14003fd60 80640->80645 80642->80566 80643->80645 80646 1400a9be8 std::_Facet_Register 40 API calls 80644->80646 80645->80642 80648 14002b510 40 API calls 2 library calls 80645->80648 80646->80642 80648->80637 80656 1400a1aa4 80649->80656 80652 1400b64bf 80652->80577 80653 1400b64b2 AreFileApisANSI 80653->80652 80657 1400958c8 _Getcoll 37 API calls 80656->80657 80658 1400a1aad 80657->80658 80659 140097b50 _Getcoll 37 API calls 80658->80659 80660 1400a1ac6 80659->80660 80660->80652 80660->80653 80661->80593 80663 1400773f4 80664 1400773f8 GetTokenInformation 80663->80664 80665 140077434 80663->80665 80664->80665 80666 140077441 CloseHandle 80665->80666 80667 14007744d 80665->80667 80666->80667 80668 1400a9aa0 _Strcoll 3 API calls 80667->80668 80669 14007745c 80668->80669 80670 1400873fe 80671 140087406 80670->80671 80672 1400a9aa0 _Strcoll 3 API calls 80671->80672 80673 14008743b 80672->80673 80674 14007d7f3 SHCreateMemStream 80675 14007d898 80674->80675 80689 1400764f0 80675->80689 80677 14007d945 EnterCriticalSection LeaveCriticalSection 80697 140076680 GetObjectW 80677->80697 80682 14007d9d8 IStream_Read 80684 14007da3a memcpy_s 80682->80684 80724 14003e0f0 80684->80724 80688 14007da7d SelectObject DeleteDC 80690 140076510 80689->80690 80696 14007656f 80689->80696 80745 1400a9b70 AcquireSRWLockExclusive SleepConditionVariableSRW ReleaseSRWLockExclusive 80690->80745 80696->80677 80698 1400766c4 80697->80698 80699 1400a9aa0 _Strcoll 3 API calls 80698->80699 80700 14007675b 80699->80700 80701 140076770 80700->80701 80702 1400764f0 12 API calls 80701->80702 80703 1400767a4 80702->80703 80704 1400767ad EnterCriticalSection 80703->80704 80714 1400767ec 80703->80714 80705 140076810 LeaveCriticalSection GdipGetImageEncodersSize 80704->80705 80706 1400767be GdiplusStartup 80704->80706 80709 14007682c 80705->80709 80705->80714 80706->80705 80707 1400767e2 LeaveCriticalSection 80706->80707 80707->80714 80708 1400a9aa0 _Strcoll 3 API calls 80710 1400767fd IStream_Size IStream_Reset 80708->80710 80712 140076848 _Strcoll 80709->80712 80746 140076280 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 80709->80746 80710->80682 80713 1400768b0 GdipGetImageEncoders 80712->80713 80715 1400768a6 80712->80715 80713->80715 80717 1400768c4 80713->80717 80714->80708 80715->80714 80747 14008cab0 8 API calls 3 library calls 80715->80747 80717->80715 80718 1400769b8 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 80717->80718 80719 14007694d GdipCreateBitmapFromScan0 GdipSaveImageToStream 80717->80719 80720 1400769a8 GdipDisposeImage 80718->80720 80722 140076a10 GdipDisposeImage 80718->80722 80719->80720 80721 1400769b6 80719->80721 80720->80715 80721->80722 80722->80715 80748 140041960 80724->80748 80729 1400738b0 80730 1400738ef 80729->80730 80732 140073904 80730->80732 80813 140046ce0 40 API calls 2 library calls 80730->80813 80731 140073937 80735 1400739a3 80731->80735 80736 1400739e5 80731->80736 80732->80731 80809 14003f550 80732->80809 80734 1400739b4 80734->80688 80735->80734 80814 1400477c0 40 API calls 2 library calls 80735->80814 80815 14002c9d0 40 API calls 80736->80815 80739 140073a27 80740 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80739->80740 80741 140073a38 80740->80741 80816 140073610 38 API calls 80741->80816 80743 140073a5b ISource 80743->80688 80746->80712 80747->80715 80749 1400419c1 80748->80749 80750 1400a9be8 std::_Facet_Register 40 API calls 80748->80750 80766 1400b782c 80749->80766 80750->80749 80752 1400419d1 80775 140041cc0 80752->80775 80755 140041a5e 80756 14003e1af 80755->80756 80790 1400b7af8 EnterCriticalSection GetProcAddress std::_Lockit::_Lockit 80755->80790 80763 140040c40 80756->80763 80758 140041a86 80791 14002c9d0 40 API calls 80758->80791 80760 140041ac6 80761 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80760->80761 80762 140041ad7 80761->80762 80803 1400413b0 80763->80803 80792 1400b71cc 80766->80792 80768 1400b784e 80774 1400b7892 Concurrency::cancel_current_task memcpy_s 80768->80774 80796 1400b7a24 40 API calls std::_Facet_Register 80768->80796 80770 1400b7866 80797 1400b7a54 38 API calls std::locale::_Setgloballocale 80770->80797 80772 1400b7871 80772->80774 80798 14008cab0 8 API calls 3 library calls 80772->80798 80774->80752 80776 1400b71cc std::_Lockit::_Lockit 2 API calls 80775->80776 80777 140041cf0 80776->80777 80778 1400b71cc std::_Lockit::_Lockit 2 API calls 80777->80778 80780 140041d15 80777->80780 80778->80780 80779 140041d8d 80781 1400a9aa0 _Strcoll 3 API calls 80779->80781 80780->80779 80800 14002c670 59 API calls 5 library calls 80780->80800 80783 140041a02 80781->80783 80783->80755 80783->80758 80784 140041d9f 80785 140041da5 80784->80785 80786 140041e06 80784->80786 80801 1400b77ec 40 API calls std::_Facet_Register 80785->80801 80802 14002c1b0 40 API calls 2 library calls 80786->80802 80789 140041e0b 80790->80756 80791->80760 80793 1400b71db 80792->80793 80794 1400b71e0 80792->80794 80799 140097e08 EnterCriticalSection GetProcAddress std::_Lockit::_Lockit 80793->80799 80794->80768 80796->80770 80797->80772 80798->80774 80800->80784 80801->80779 80802->80789 80804 1400413b5 80803->80804 80805 1400a9be8 std::_Facet_Register 40 API calls 80804->80805 80806 140041427 80805->80806 80807 1400b782c 43 API calls 80806->80807 80808 14003e226 80807->80808 80808->80729 80810 14003f573 memcpy_s 80809->80810 80811 14003f5e6 80809->80811 80810->80811 80817 14003f210 80810->80817 80811->80731 80813->80732 80814->80734 80815->80739 80816->80743 80819 14003f238 80817->80819 80826 14003f23d ISource memcpy_s 80817->80826 80818 14003f2f7 80820 1400a9be8 std::_Facet_Register 40 API calls 80818->80820 80819->80818 80821 14003f2b9 80819->80821 80822 14003f2c6 80819->80822 80819->80826 80820->80826 80821->80822 80823 14003f3fc 80821->80823 80824 1400a9be8 std::_Facet_Register 40 API calls 80822->80824 80822->80826 80827 14002b510 40 API calls 2 library calls 80823->80827 80824->80826 80826->80810 80827->80826 80828 14008367e 80829 140083689 80828->80829 80830 14008369a 80829->80830 80831 14008368e CloseHandle 80829->80831 80832 1400a9aa0 _Strcoll 3 API calls 80830->80832 80831->80830 80833 1400836ab 80832->80833 80834 140086680 80835 140086991 80834->80835 80837 1400866cb memcpy_s 80834->80837 80883 140089fe0 80835->80883 80933 140062d50 40 API calls 80837->80933 80839 14008671b 80934 140089110 41 API calls 2 library calls 80839->80934 80840 1400869c4 80842 140086ad8 ISource 80840->80842 80844 140062eb0 41 API calls 80840->80844 80843 140040730 40 API calls 80842->80843 80850 140086b8c 80842->80850 80854 140086c70 80842->80854 80876 140086cc7 80842->80876 80843->80850 80846 140086a1d 80844->80846 80845 1400a9aa0 _Strcoll 3 API calls 80847 140086c1c 80845->80847 80848 140066750 41 API calls 80846->80848 80851 140086a43 80848->80851 80849 14008672b 80881 1400868c4 ISource 80849->80881 80935 140062eb0 80849->80935 80850->80854 80861 1400868f8 ISource 80850->80861 80855 140063430 41 API calls 80851->80855 80852 1400868dd 80856 140040730 40 API calls 80852->80856 80853 140086925 80858 140040730 40 API calls 80853->80858 80853->80861 81018 140061f10 38 API calls 80854->81018 80860 140086a52 ISource 80855->80860 80856->80861 80858->80861 80869 1400aba10 __std_exception_destroy 8 API calls 80860->80869 80860->80876 80880 140086c98 80860->80880 80861->80845 80862 140086783 80943 140066750 80862->80943 80863 140086c88 80866 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80863->80866 80866->80880 80867 140086cb7 80870 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80867->80870 80868 1400867a9 81011 140063430 80868->81011 80872 140086aca 80869->80872 80870->80876 80873 1400aba10 __std_exception_destroy 8 API calls 80872->80873 80873->80842 80875 1400867ce ISource 80877 1400aba10 __std_exception_destroy 8 API calls 80875->80877 80875->80880 80878 140086839 80877->80878 80879 1400aba10 __std_exception_destroy 8 API calls 80878->80879 80882 140086847 ISource 80879->80882 81019 140061f10 38 API calls 80880->81019 80881->80852 80881->80853 80882->80880 80882->80881 80884 14008a05d 80883->80884 80885 140062eb0 41 API calls 80884->80885 80886 14008ac6c 80885->80886 80887 140066750 41 API calls 80886->80887 80888 14008ac92 80887->80888 80889 140063430 41 API calls 80888->80889 80890 14008aca2 80889->80890 80891 14008ad0d 80890->80891 80892 14008acad 80890->80892 81025 140061f10 38 API calls 80891->81025 81020 14002ead0 80892->81020 80894 14008ad19 80896 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80894->80896 80897 14008ad29 80896->80897 81026 140061f10 38 API calls 80897->81026 80899 14008ad36 80900 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80899->80900 80901 14008ad46 80900->80901 81027 140061f10 38 API calls 80901->81027 80903 14008ad53 80904 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80903->80904 80906 14008ad63 80904->80906 80905 14008acc1 80907 1400a9aa0 _Strcoll 3 API calls 80905->80907 81028 140068510 38 API calls 80906->81028 80908 14008acf6 80907->80908 80908->80840 80910 14008ad70 80911 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80910->80911 80912 14008ad80 80911->80912 81029 140061f10 38 API calls 80912->81029 80914 14008ad8d 80915 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80914->80915 80916 14008ad9d 80915->80916 81030 140061f10 38 API calls 80916->81030 80918 14008adaa 80919 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80918->80919 80920 14008adba 80919->80920 81031 140061f10 38 API calls 80920->81031 80922 14008adc7 80923 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80922->80923 80924 14008add7 80923->80924 81032 140061f10 38 API calls 80924->81032 80926 14008ade4 80927 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80926->80927 80928 14008adf4 80927->80928 81033 140061f10 38 API calls 80928->81033 80930 1400ac0c8 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 80931 14008ae01 80930->80931 80931->80930 80932 140061f10 38 API calls 80931->80932 80932->80931 80933->80839 80934->80849 80937 140062efe 80935->80937 80936 140063430 41 API calls 80940 14006305b 80936->80940 80938 140045670 40 API calls 80937->80938 80939 140062f8f ISource 80937->80939 80938->80939 80939->80936 80942 140063113 ISource 80939->80942 80941 140045670 40 API calls 80940->80941 80940->80942 80941->80942 80942->80862 80944 1400667af 80943->80944 81034 140059ab0 11 API calls 2 library calls 80944->81034 80946 1400667c6 80947 14002e800 40 API calls 80946->80947 80949 140066802 ISource 80947->80949 80948 1400ab980 __std_exception_copy 38 API calls 80950 1400669b3 80948->80950 80949->80948 80954 140066a43 80949->80954 80952 140066a07 ISource 80950->80952 80950->80954 80951 1400a9aa0 _Strcoll 3 API calls 80953 140066a2c 80951->80953 80952->80951 80953->80868 80955 140062eb0 41 API calls 80954->80955 80956 1400676fc 80955->80956 80957 140066750 41 API calls 80956->80957 80958 140067722 80957->80958 80959 140063430 41 API calls 80958->80959 80960 140067732 80959->80960 80961 14006779d 80960->80961 80962 14006773d 80960->80962 81035 140061f10 38 API calls 80961->81035 80966 14002ead0 8 API calls 80962->80966 80964 1400677a9 80965 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80964->80965 80967 1400677b9 80965->80967 80976 140067751 80966->80976 81036 140061f10 38 API calls 80967->81036 80969 1400677c6 80970 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80969->80970 80971 1400677d6 80970->80971 81037 140061f10 38 API calls 80971->81037 80973 1400677e3 80974 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80973->80974 80975 1400677f3 80974->80975 81038 140068510 38 API calls 80975->81038 80978 1400a9aa0 _Strcoll 3 API calls 80976->80978 80980 140067786 80978->80980 80979 140067800 80981 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80979->80981 80980->80868 80982 140067810 80981->80982 81039 140061f10 38 API calls 80982->81039 80984 14006781d 80985 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80984->80985 80986 14006782d 80985->80986 81040 140061f10 38 API calls 80986->81040 80988 14006783a 80989 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80988->80989 80990 14006784a 80989->80990 81041 140061f10 38 API calls 80990->81041 80992 140067857 80993 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80992->80993 80994 140067867 80993->80994 81042 140061f10 38 API calls 80994->81042 80996 140067874 80997 1400ac0c8 Concurrency::cancel_current_task 2 API calls 80996->80997 80998 140067884 80997->80998 81043 140061f10 38 API calls 80998->81043 81000 140067891 81001 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81000->81001 81002 1400678a1 81001->81002 81044 140061f10 38 API calls 81002->81044 81004 1400678ae 81005 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81004->81005 81006 1400678be 81005->81006 81045 140061f10 38 API calls 81006->81045 81008 1400678cb 81009 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81008->81009 81010 1400678db 81009->81010 81012 140063532 81011->81012 81015 140063486 81011->81015 81013 1400a9aa0 _Strcoll 3 API calls 81012->81013 81014 140063542 81013->81014 81014->80854 81014->80875 81015->81012 81017 140045670 40 API calls 81015->81017 81046 140059570 38 API calls 81015->81046 81017->81015 81018->80863 81019->80867 81021 1400aba10 __std_exception_destroy 8 API calls 81020->81021 81022 14002eafe 81021->81022 81023 1400aba10 __std_exception_destroy 8 API calls 81022->81023 81024 14002eb0b 81023->81024 81024->80905 81025->80894 81026->80899 81027->80903 81028->80910 81029->80914 81030->80918 81031->80922 81032->80926 81033->80931 81034->80946 81035->80964 81036->80969 81037->80973 81038->80979 81039->80984 81040->80988 81041->80992 81042->80996 81043->81000 81044->81004 81045->81008 81046->81015 81047 140088700 81048 140088721 81047->81048 81050 14008870a 81047->81050 81055 140051010 40 API calls 81048->81055 81049 14008875a 81050->81049 81056 14002c9d0 40 API calls 81050->81056 81052 1400887e6 81053 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81052->81053 81054 1400887f7 81053->81054 81055->81050 81056->81052 81057 1400740c0 81068 1400773a0 GetCurrentProcess OpenProcessToken 81057->81068 81069 14005f140 81070 14005f19f 81069->81070 81071 14002d0f0 40 API calls 81070->81071 81079 14005fe36 ISource 81070->81079 81073 14005fa4a 81071->81073 81072 1400a9aa0 _Strcoll 3 API calls 81074 14005fe61 81072->81074 81075 14002cf80 41 API calls 81073->81075 81076 14005fa58 81075->81076 81107 140061f50 81076->81107 81078 14005fa6b 81078->81079 81080 14005fe7d 81078->81080 81079->81072 81081 140044520 40 API calls 81080->81081 81082 14005feba 81081->81082 81083 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81082->81083 81084 14005fecd 81083->81084 81085 14002cb80 2 API calls 81084->81085 81086 14005ff39 81085->81086 81087 14002cb80 2 API calls 81086->81087 81088 14005ff61 81087->81088 81089 14002d0f0 40 API calls 81088->81089 81090 14005ffb7 81089->81090 81091 14002cf80 41 API calls 81090->81091 81092 14005ffc8 81091->81092 81111 14003ffa0 60 API calls 4 library calls 81092->81111 81094 140060a3e 81112 1400441b0 40 API calls 3 library calls 81094->81112 81096 140060a7e 81103 140061423 81096->81103 81113 14002e660 40 API calls _Strcoll 81096->81113 81098 140060a9a 81099 140061537 81098->81099 81098->81103 81100 14002cb80 2 API calls 81099->81100 81101 14006153c 81100->81101 81102 14002de50 40 API calls 81101->81102 81106 140061559 81102->81106 81104 1400a9aa0 _Strcoll 3 API calls 81103->81104 81105 140061508 81104->81105 81108 140061f76 81107->81108 81109 140063560 41 API calls 81108->81109 81110 140061f84 81109->81110 81110->81078 81111->81094 81112->81096 81113->81098 81114 140094b74 81115 140094b8a 81114->81115 81116 140094ba5 81114->81116 81145 140091b6c 7 API calls _get_daylight 81115->81145 81116->81115 81117 140094bbe 81116->81117 81119 140094bc4 81117->81119 81122 140094be1 81117->81122 81147 140091b6c 7 API calls _get_daylight 81119->81147 81120 140094b8f 81146 14008d6a8 37 API calls _invalid_parameter_noinfo 81120->81146 81138 14009e534 81122->81138 81128 140094e59 81133 140094c9e 81137 140094b9b 81133->81137 81167 14009e574 37 API calls _isindst 81133->81167 81134 140094c3e 81134->81137 81166 14009e574 37 API calls _isindst 81134->81166 81139 140094be6 81138->81139 81140 14009e542 81138->81140 81148 14009d650 81139->81148 81168 140097d98 EnterCriticalSection 81140->81168 81145->81120 81146->81137 81147->81137 81149 14009d659 81148->81149 81150 140094bfb 81148->81150 81169 140091b6c 7 API calls _get_daylight 81149->81169 81150->81128 81154 14009d680 81150->81154 81152 14009d65e 81170 14008d6a8 37 API calls _invalid_parameter_noinfo 81152->81170 81155 14009d689 81154->81155 81159 140094c0c 81154->81159 81171 140091b6c 7 API calls _get_daylight 81155->81171 81157 14009d68e 81172 14008d6a8 37 API calls _invalid_parameter_noinfo 81157->81172 81159->81128 81160 14009d6b0 81159->81160 81161 14009d6b9 81160->81161 81162 140094c1d 81160->81162 81173 140091b6c 7 API calls _get_daylight 81161->81173 81162->81128 81162->81133 81162->81134 81164 14009d6be 81174 14008d6a8 37 API calls _invalid_parameter_noinfo 81164->81174 81166->81137 81167->81137 81169->81152 81170->81150 81171->81157 81172->81159 81173->81164 81174->81162 81175 14003b740 LoadLibraryA 81176 14003b845 6 API calls 81175->81176 81177 14003c6f9 __crtLCMapStringW 81175->81177 81176->81177 81182 14003bc06 81176->81182 81178 1400a9aa0 _Strcoll 3 API calls 81177->81178 81179 14003c736 81178->81179 81180 14006f8d0 40 API calls 81180->81182 81181 1400421c0 40 API calls 81181->81182 81182->81177 81182->81180 81182->81181 81183 140042490 40 API calls 81182->81183 81184 14003ec60 40 API calls 81182->81184 81185 140043770 40 API calls 81182->81185 81186 1400a9be8 40 API calls std::_Facet_Register 81182->81186 81188 140040730 40 API calls 81182->81188 81189 14003c75d 81182->81189 81195 140058da0 40 API calls std::_Facet_Register 81182->81195 81196 1400499d0 40 API calls 2 library calls 81182->81196 81183->81182 81184->81182 81185->81182 81186->81182 81188->81182 81191 140044520 40 API calls 81189->81191 81192 14003c797 81191->81192 81193 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81192->81193 81194 14003c7aa 81193->81194 81195->81182 81196->81182 81197 1400847f7 81198 140084801 81197->81198 81199 140084cf0 41 API calls 81198->81199 81200 140084810 81199->81200 81201 1400a9aa0 _Strcoll 3 API calls 81200->81201 81202 140084b53 81201->81202 81203 14003d43e 81214 14003d44f ISource 81203->81214 81218 14003d5c5 ISource 81203->81218 81204 14003d775 81206 14003e020 40 API calls 81204->81206 81205 140048eb0 40 API calls 81205->81214 81207 14003d78e 81206->81207 81209 1400421c0 40 API calls 81207->81209 81219 14003d926 ISource 81207->81219 81208 140048eb0 40 API calls 81208->81218 81210 14003d7be 81209->81210 81232 140042490 81210->81232 81212 140043490 40 API calls 81212->81214 81214->81205 81214->81212 81214->81218 81220 14003db71 81214->81220 81228 140041be0 59 API calls 81214->81228 81229 140046ce0 40 API calls 2 library calls 81214->81229 81217 14003d7d5 81238 14003ec60 81217->81238 81218->81204 81218->81208 81218->81220 81221 140043490 40 API calls 81218->81221 81230 140041be0 59 API calls 81218->81230 81231 140046ce0 40 API calls 2 library calls 81218->81231 81219->81220 81224 1400a9aa0 _Strcoll 3 API calls 81219->81224 81221->81218 81225 14003db50 81224->81225 81226 14003d88e 81227 14003ec60 40 API calls 81226->81227 81227->81219 81228->81214 81229->81214 81230->81218 81231->81218 81233 1400424d4 81232->81233 81234 1400a9be8 std::_Facet_Register 40 API calls 81233->81234 81235 1400424e9 81234->81235 81236 1400a9aa0 _Strcoll 3 API calls 81235->81236 81237 14004253d 81236->81237 81237->81217 81239 14003ec9f 81238->81239 81240 14003ec97 81238->81240 81243 14003ed34 81239->81243 81252 1400447a0 81239->81252 81262 1400448e0 40 API calls 2 library calls 81240->81262 81248 140044520 40 API calls 81243->81248 81244 1400a9aa0 _Strcoll 3 API calls 81247 14003ed1f 81244->81247 81245 14003ecf0 ISource 81245->81244 81246 14003ecbd 81246->81243 81246->81245 81247->81226 81249 14003ed69 81248->81249 81250 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81249->81250 81251 14003ed7a 81250->81251 81255 1400447c6 81252->81255 81253 1400448d3 81263 14002b5f0 40 API calls 81253->81263 81254 14004480c 81256 1400a9be8 std::_Facet_Register 40 API calls 81254->81256 81255->81253 81255->81254 81261 14004487f 81255->81261 81258 14004482a 81256->81258 81260 140040730 40 API calls 81258->81260 81260->81261 81261->81246 81262->81239 81264 14009548c 81275 1400952f0 81264->81275 81266 1400954e9 81268 140095529 81266->81268 81269 1400954b2 81266->81269 81293 140099fe0 37 API calls 2 library calls 81266->81293 81281 140095318 81268->81281 81273 14009551d 81273->81268 81294 14009a6bc 7 API calls 2 library calls 81273->81294 81276 1400952f9 81275->81276 81277 140095309 81275->81277 81295 140091b6c 7 API calls _get_daylight 81276->81295 81277->81266 81277->81269 81292 140095410 37 API calls ProcessCodePage 81277->81292 81279 1400952fe 81296 14008d6a8 37 API calls _invalid_parameter_noinfo 81279->81296 81282 1400952f0 _fread_nolock 37 API calls 81281->81282 81283 14009533d 81282->81283 81284 14009534c 81283->81284 81285 1400953dd 81283->81285 81287 14009536a 81284->81287 81290 140095388 81284->81290 81306 140098808 37 API calls 3 library calls 81285->81306 81305 140098808 37 API calls 3 library calls 81287->81305 81289 140095378 81289->81269 81290->81289 81297 14009b310 81290->81297 81292->81266 81293->81273 81294->81268 81295->81279 81296->81277 81298 14009b340 81297->81298 81307 14009b13c 81298->81307 81300 14009b37f 81303 14009b394 81300->81303 81319 14008b668 37 API calls 4 library calls 81300->81319 81303->81289 81305->81289 81306->81289 81308 14009b185 81307->81308 81317 14009b169 81307->81317 81309 14009b213 81308->81309 81311 14009b1bd 81308->81311 81322 14008d5d8 37 API calls 2 library calls 81309->81322 81320 1400a065c EnterCriticalSection 81311->81320 81317->81300 81318 14008b668 37 API calls 4 library calls 81317->81318 81318->81300 81319->81303 81321 1400d0200 81320->81321 81322->81317 81323 140077101 81324 140077117 81323->81324 81345 140054a40 81324->81345 81326 14007712a 81329 140077356 81326->81329 81360 140051d20 81326->81360 81368 14002c9d0 40 API calls 81329->81368 81330 1400771ed 81366 140051660 38 API calls 81330->81366 81332 140077380 81334 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81332->81334 81336 140077391 81334->81336 81335 1400772ec 81367 14002c9d0 40 API calls 81335->81367 81337 140077271 81339 1400a9aa0 _Strcoll 3 API calls 81337->81339 81341 1400772d1 81339->81341 81340 14007732e 81342 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81340->81342 81343 14007733f 81342->81343 81344 14002de50 40 API calls 81343->81344 81344->81329 81346 140054a9d 81345->81346 81348 140054b83 81345->81348 81369 140055360 81346->81369 81417 14002c9d0 40 API calls 81348->81417 81349 140054ac2 81354 140054af9 81349->81354 81407 140050c10 81349->81407 81351 140054b50 81351->81326 81352 140054bc5 81353 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81352->81353 81353->81354 81354->81351 81418 14002c9d0 40 API calls 81354->81418 81356 140054c1e 81357 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81356->81357 81358 140054c32 81357->81358 81361 140051d8a 81360->81361 81362 140051d3a 81360->81362 81361->81330 81361->81335 81363 140051b30 37 API calls 81362->81363 81364 140051d74 81363->81364 81531 14008c020 81364->81531 81366->81337 81367->81340 81368->81332 81370 1400553a0 81369->81370 81374 14005537d 81369->81374 81372 1400553ae 81370->81372 81419 140046ce0 40 API calls 2 library calls 81370->81419 81371 14005539a 81371->81349 81372->81349 81374->81371 81420 14002c9d0 40 API calls 81374->81420 81376 140055403 81377 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81376->81377 81379 140055414 ISource 81377->81379 81378 140055575 81378->81349 81379->81378 81421 140054120 40 API calls memcpy_s 81379->81421 81381 14005575c 81423 140054120 40 API calls memcpy_s 81381->81423 81382 140055729 81382->81381 81387 1400558e2 81382->81387 81422 14004b1d0 40 API calls _Strcoll 81382->81422 81385 14005577f 81424 14004b1d0 40 API calls _Strcoll 81385->81424 81388 14005590d 81387->81388 81428 140053fb0 40 API calls 2 library calls 81387->81428 81399 140055936 ISource 81388->81399 81429 140053b30 40 API calls 2 library calls 81388->81429 81391 140055943 81394 14005597b 81391->81394 81430 140053fb0 40 API calls 2 library calls 81391->81430 81392 140055796 81393 1400557cd 81392->81393 81392->81399 81405 1400557f9 81392->81405 81425 140053fb0 40 API calls 2 library calls 81392->81425 81393->81405 81426 140053b30 40 API calls 2 library calls 81393->81426 81394->81399 81431 140053b30 40 API calls 2 library calls 81394->81431 81395 14004b1d0 40 API calls 81395->81405 81401 1400a9aa0 _Strcoll 3 API calls 81399->81401 81402 140055a7a 81399->81402 81403 140055a5f 81401->81403 81403->81349 81404 140053fb0 40 API calls 81404->81405 81405->81391 81405->81395 81405->81399 81405->81404 81427 140053b30 40 API calls 2 library calls 81405->81427 81408 140050c43 81407->81408 81416 140050c9b 81408->81416 81432 140051b30 81408->81432 81410 1400a9aa0 _Strcoll 3 API calls 81412 140050d09 81410->81412 81411 140050c66 81413 140050c86 81411->81413 81411->81416 81442 14008d1ec 81411->81442 81412->81354 81413->81416 81450 14008c804 81413->81450 81416->81410 81417->81352 81418->81356 81419->81372 81420->81376 81421->81382 81422->81382 81423->81385 81424->81392 81425->81393 81426->81405 81427->81405 81428->81388 81429->81399 81430->81394 81431->81399 81433 140051c02 81432->81433 81434 140051b53 81432->81434 81435 1400a9aa0 _Strcoll 3 API calls 81433->81435 81434->81433 81439 140051b5d 81434->81439 81436 140051c11 81435->81436 81436->81411 81437 1400a9aa0 _Strcoll 3 API calls 81438 140051bbe 81437->81438 81438->81411 81440 140051ba1 81439->81440 81459 14008c760 37 API calls ProcessCodePage 81439->81459 81440->81437 81443 14008d21c 81442->81443 81460 14008cf9c 81443->81460 81446 14008d25a 81448 14008d26f 81446->81448 81472 14008b668 37 API calls 4 library calls 81446->81472 81448->81413 81451 14008c82d 81450->81451 81452 14008c818 81450->81452 81451->81452 81454 14008c832 81451->81454 81501 140091b6c 7 API calls _get_daylight 81452->81501 81493 14009a618 81454->81493 81456 14008c81d 81502 14008d6a8 37 API calls _invalid_parameter_noinfo 81456->81502 81457 14008c828 81457->81416 81459->81440 81461 14008d006 81460->81461 81462 14008cfc6 81460->81462 81461->81462 81464 14008d00b 81461->81464 81479 14008d5d8 37 API calls 2 library calls 81462->81479 81465 14008c3ec _fread_nolock EnterCriticalSection 81464->81465 81466 14008d010 81465->81466 81473 14008d114 81466->81473 81468 14008d022 81480 14008c3f8 LeaveCriticalSection 81468->81480 81470 14008cfed 81470->81446 81471 14008b668 37 API calls 4 library calls 81470->81471 81471->81446 81472->81448 81474 14008d153 81473->81474 81476 14008d13e 81473->81476 81481 14008d030 81474->81481 81476->81468 81477 14008d15d 81477->81476 81485 14008bd30 81477->81485 81479->81470 81482 14008d04a 81481->81482 81484 14008d0b0 81481->81484 81482->81484 81491 14009b3b4 37 API calls 2 library calls 81482->81491 81484->81477 81486 14008bd55 81485->81486 81490 14008bd86 81485->81490 81487 1400952f0 _fread_nolock 37 API calls 81486->81487 81486->81490 81488 14008bd76 81487->81488 81492 140098808 37 API calls 3 library calls 81488->81492 81490->81476 81491->81484 81492->81490 81494 14009a648 81493->81494 81503 14009a12c 81494->81503 81497 14009a687 81499 14009a69c 81497->81499 81514 14008b668 37 API calls 4 library calls 81497->81514 81499->81457 81501->81456 81502->81457 81504 14009a176 81503->81504 81505 14009a147 81503->81505 81507 14008c3ec _fread_nolock EnterCriticalSection 81504->81507 81526 14008d5d8 37 API calls 2 library calls 81505->81526 81508 14009a17b 81507->81508 81515 14009a198 81508->81515 81512 14009a167 81512->81497 81513 14008b668 37 API calls 4 library calls 81512->81513 81513->81497 81514->81499 81516 14009a1dc 81515->81516 81517 14009a1b3 81515->81517 81519 1400952f0 _fread_nolock 37 API calls 81516->81519 81528 14008d5d8 37 API calls 2 library calls 81517->81528 81520 14009a1e1 81519->81520 81521 14009a25c 81520->81521 81522 14009a26c 81520->81522 81523 14009a187 81520->81523 81529 14009a43c 37 API calls 2 library calls 81521->81529 81522->81523 81530 14009a2e4 37 API calls _fread_nolock 81522->81530 81527 14008c3f8 LeaveCriticalSection 81523->81527 81526->81512 81528->81523 81529->81523 81530->81523 81532 14008c050 81531->81532 81539 14008bf00 81532->81539 81534 14008c069 81536 14008c08e 81534->81536 81549 14008b668 37 API calls 4 library calls 81534->81549 81538 14008c0a3 81536->81538 81550 14008b668 37 API calls 4 library calls 81536->81550 81538->81361 81540 14008bf49 81539->81540 81541 14008bf1b 81539->81541 81543 14008c3ec _fread_nolock EnterCriticalSection 81540->81543 81548 14008bf3b 81540->81548 81565 14008d5d8 37 API calls 2 library calls 81541->81565 81544 14008bf5f 81543->81544 81551 14008bf7c 81544->81551 81546 14008bf6b 81566 14008c3f8 LeaveCriticalSection 81546->81566 81548->81534 81549->81536 81550->81538 81552 14008bfbc 81551->81552 81553 14008bf97 81551->81553 81555 14008bd30 37 API calls 81552->81555 81563 14008bfb7 81552->81563 81571 14008d5d8 37 API calls 2 library calls 81553->81571 81556 14008bfce 81555->81556 81567 140099080 81556->81567 81559 1400952f0 _fread_nolock 37 API calls 81560 14008bfe0 81559->81560 81572 140098cf4 38 API calls _invalid_parameter_noinfo 81560->81572 81562 14008bfea 81562->81563 81564 140098c40 __free_lconv_num 7 API calls 81562->81564 81563->81546 81564->81563 81565->81548 81568 14008bfd8 81567->81568 81569 140099093 81567->81569 81568->81559 81569->81568 81570 140098c40 __free_lconv_num 7 API calls 81569->81570 81570->81568 81571->81563 81572->81562 81573 140040fc4 81574 140040fd7 81573->81574 81575 14004132d 81573->81575 81587 140045c20 81574->81587 81599 14003e810 40 API calls ISource 81575->81599 81578 140041338 81579 140040fe4 81582 14004104f ISource 81579->81582 81598 1400499d0 40 API calls 2 library calls 81579->81598 81581 1400411f7 81581->81575 81583 140041272 ISource 81581->81583 81582->81581 81584 1400499d0 40 API calls 81582->81584 81585 1400a9aa0 _Strcoll 3 API calls 81583->81585 81584->81582 81586 14004130f 81585->81586 81588 140045c57 81587->81588 81595 140045cb1 81587->81595 81590 140045c92 81588->81590 81591 140045c6e 81588->81591 81596 140045c60 81588->81596 81592 1400a9be8 std::_Facet_Register 40 API calls 81590->81592 81594 1400a9be8 std::_Facet_Register 40 API calls 81591->81594 81591->81595 81592->81596 81594->81596 81601 14002b510 40 API calls 2 library calls 81595->81601 81597 140045cd7 ISource 81596->81597 81600 140049e50 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry _Strcoll 81596->81600 81597->81579 81598->81579 81599->81578 81600->81595 81601->81597 81602 140076590 81605 1400765d0 81602->81605 81604 1400765a4 ISource 81606 1400765f4 DeleteObject 81605->81606 81607 140076619 81605->81607 81606->81607 81608 1400764f0 12 API calls 81607->81608 81609 14007661e EnterCriticalSection 81608->81609 81610 140076656 LeaveCriticalSection 81609->81610 81611 140076631 EnterCriticalSection 81609->81611 81610->81604 81612 140076643 GdiplusShutdown 81611->81612 81613 140076649 LeaveCriticalSection 81611->81613 81612->81613 81613->81610 81614 140077bd0 81616 140077c63 ISource memcpy_s 81614->81616 81615 1400781d7 81617 14002de50 40 API calls 81615->81617 81616->81615 81618 140077d36 81616->81618 81666 140086ce0 81616->81666 81623 1400781ff 81617->81623 81618->81615 81658 140077d97 ISource 81618->81658 81619 1400a9aa0 _Strcoll 3 API calls 81621 140077dc9 81619->81621 81622 140077e19 81665 1400780a0 81622->81665 81683 1400854d0 81622->81683 81687 14002c9d0 40 API calls 81623->81687 81627 140078226 81629 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81627->81629 81630 140078237 81629->81630 81688 14002c9d0 40 API calls 81630->81688 81639 140078260 81640 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81639->81640 81649 140078274 81640->81649 81689 14002c9d0 40 API calls 81649->81689 81653 14007829e 81657 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81653->81657 81659 1400782b2 81657->81659 81658->81619 81665->81658 81686 140051660 38 API calls 81665->81686 81667 140041960 60 API calls 81666->81667 81668 140086d97 81667->81668 81690 140052100 81668->81690 81673 140086def 81701 140051c20 37 API calls _Strcoll 81673->81701 81675 140086e78 81682 140086e28 81675->81682 81703 14002c9d0 40 API calls 81675->81703 81676 140086e01 81702 140053690 56 API calls 4 library calls 81676->81702 81678 140086ee2 81679 1400ac0c8 Concurrency::cancel_current_task 2 API calls 81678->81679 81681 140086ef3 81679->81681 81682->81622 81684 140040730 40 API calls 81683->81684 81685 140085506 81684->81685 81686->81618 81687->81627 81688->81639 81689->81653 81691 1400413b0 43 API calls 81690->81691 81692 140052113 81691->81692 81692->81675 81693 1400b7d68 81692->81693 81694 1400b7dae 81693->81694 81700 140086de6 81694->81700 81704 1400b9758 81694->81704 81698 1400b7dfc 81699 14008c020 38 API calls 81698->81699 81698->81700 81699->81700 81700->81673 81700->81675 81701->81676 81702->81682 81703->81678 81705 1400b9684 81704->81705 81706 1400b96aa 81705->81706 81709 1400b96dd 81705->81709 81736 140091b6c 7 API calls _get_daylight 81706->81736 81708 1400b96af 81737 14008d6a8 37 API calls _invalid_parameter_noinfo 81708->81737 81710 1400b96f0 81709->81710 81711 1400b96e3 81709->81711 81724 140098f20 81710->81724 81738 140091b6c 7 API calls _get_daylight 81711->81738 81722 1400b7de1 81722->81700 81723 14008d284 37 API calls ProcessCodePage 81722->81723 81723->81698 81741 140097d98 EnterCriticalSection 81724->81741 81736->81708 81737->81722 81738->81722 81867 14009ff81 81879 1400a6e60 81867->81879 81880 1400958c8 _Getcoll 37 API calls 81879->81880 81881 1400a6e69 __crtLCMapStringW 81880->81881 81884 140095298 37 API calls std::locale::_Setgloballocale 81881->81884 81885 140087143 81887 140087148 81885->81887 81886 14008716d 81888 1400a9aa0 _Strcoll 3 API calls 81886->81888 81887->81886 81892 140087190 81887->81892 81889 14008718a 81888->81889 81890 1400a9aa0 _Strcoll 3 API calls 81891 14008743b 81890->81891 81892->81890 81893 14007428c 81894 140074291 81893->81894 81928 14003c7e0 CreateToolhelp32Snapshot 81894->81928 81896 140074296 81963 14003dbb0 81896->81963 81906 1400742b4 82040 140038fb0 81906->82040 81908 1400742ba 82072 140074d20 81908->82072 81929 14003c847 memcpy_s 81928->81929 81930 14003e0f0 60 API calls 81929->81930 81931 14003c853 81930->81931 81932 14003ca71 81931->81932 81933 14003c85e Process32FirstW 81931->81933 81934 14003e020 40 API calls 81932->81934 81933->81932 81935 14003c87a 81933->81935 81936 14003ca84 81934->81936 81937 14006f8d0 40 API calls 81935->81937 81939 1400421c0 40 API calls 81936->81939 81944 14003cc61 ISource ProcessCodePage 81936->81944 81938 14003c890 81937->81938 82095 140048eb0 81938->82095 81940 14003cac3 81939->81940 81942 140042490 40 API calls 81940->81942 81947 14003cad8 81942->81947 81946 1400a9aa0 _Strcoll 3 API calls 81944->81946 81956 14003cd73 81944->81956 81948 14003cd52 81946->81948 81949 14003ec60 40 API calls 81947->81949 81948->81896 81952 14003cbab 81949->81952 81950 14003c8bd 81951 140048eb0 40 API calls 81950->81951 81953 14003c975 81951->81953 81957 14003ec60 40 API calls 81952->81957 81954 140043490 40 API calls 81953->81954 81955 14003c984 81954->81955 82121 140041be0 59 API calls 81955->82121 81957->81944 81959 14003c998 82122 140046ce0 40 API calls 2 library calls 81959->82122 81961 14003c9ab Process32NextW 81961->81932 82129 140081e60 81963->82129 81965 14003dc06 memcpy_s 81966 14003e0f0 60 API calls 81965->81966 81978 14003dc21 ISource memcpy_s 81966->81978 81967 14003dd2a 81968 14003e020 40 API calls 81967->81968 81969 14003dd37 81968->81969 81971 1400421c0 40 API calls 81969->81971 81985 14003df01 ISource 81969->81985 81972 14003dd67 81971->81972 81974 140042490 40 API calls 81972->81974 81973 140048eb0 40 API calls 81973->81978 81979 14003dd7e 81974->81979 81976 1400a9aa0 _Strcoll 3 API calls 81977 14003dfe2 81976->81977 81986 14003abe0 CredEnumerateA 81977->81986 81978->81967 81978->81973 81981 14003e003 81978->81981 82137 14006f9e0 40 API calls 2 library calls 81978->82137 82138 140041be0 59 API calls 81978->82138 82139 140046ce0 40 API calls 2 library calls 81978->82139 81980 14003ec60 40 API calls 81979->81980 81983 14003de4b 81980->81983 81984 14003ec60 40 API calls 81983->81984 81984->81985 81985->81976 81985->81981 81987 14003b66c 81986->81987 81997 14003ac50 ISource 81986->81997 81988 1400a9aa0 _Strcoll 3 API calls 81987->81988 81990 14003b67b 81988->81990 81989 14003b65f CredFree 81989->81987 82005 14005eb70 81990->82005 81991 1400a9be8 40 API calls std::_Facet_Register 81991->81997 81992 1400421c0 40 API calls 81992->81997 81993 140042490 40 API calls 81993->81997 81994 140043770 40 API calls 81994->81997 81995 14003ec60 40 API calls 81995->81997 81997->81989 81997->81991 81997->81992 81997->81993 81997->81994 81997->81995 81998 140040730 40 API calls 81997->81998 81999 14003b6ef ISource 81997->81999 82001 14003b69c 81997->82001 82142 140058da0 40 API calls std::_Facet_Register 81997->82142 82143 1400499d0 40 API calls 2 library calls 81997->82143 81998->81997 82002 140044520 40 API calls 82001->82002 82003 14003b6dc 82002->82003 82004 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82003->82004 82004->81999 82006 14005ee82 82005->82006 82011 14005ebc5 ISource 82005->82011 82007 1400a9aa0 _Strcoll 3 API calls 82006->82007 82008 14005ee8e 82007->82008 82015 140061860 82008->82015 82009 14005eec3 82010 14002de50 40 API calls 82009->82010 82013 14005eed8 82010->82013 82011->82006 82011->82009 82012 14005eeaf 82011->82012 82011->82013 82014 14002de50 40 API calls 82012->82014 82014->82009 82016 140061b72 82015->82016 82019 1400618b5 ISource 82015->82019 82017 1400a9aa0 _Strcoll 3 API calls 82016->82017 82018 140061b7e 82017->82018 82025 140030fc0 82018->82025 82019->82016 82021 140061bc8 82019->82021 82022 140061b9f 82019->82022 82024 140061bb3 82019->82024 82020 14002de50 40 API calls 82020->82021 82023 14002de50 40 API calls 82022->82023 82023->82024 82024->82020 82144 14002ef60 82025->82144 82027 140030ff3 82149 14002f650 82027->82149 82029 1400a9aa0 _Strcoll 3 API calls 82030 140031285 82029->82030 82030->81906 82031 140031105 82032 1400312a9 82031->82032 82036 140031254 ISource 82031->82036 82154 1400301a0 40 API calls 2 library calls 82031->82154 82034 14002cb80 2 API calls 82032->82034 82039 1400312af ISource 82034->82039 82035 140031221 82035->82036 82037 14003129e 82035->82037 82036->82029 82038 14002cb80 2 API calls 82037->82038 82038->82032 82039->81906 82041 14003a03e 82040->82041 82070 14003900c ISource 82040->82070 82042 1400a9aa0 _Strcoll 3 API calls 82041->82042 82043 14003a04d 82042->82043 82043->81908 82044 140039fcd 82044->82041 82045 14003a093 82044->82045 82046 14002de50 40 API calls 82045->82046 82053 14003a0ae 82046->82053 82049 14003a073 82050 14002de50 40 API calls 82049->82050 82050->82045 82052 140041ff0 40 API calls 82052->82070 82055 14002cb80 2 API calls 82053->82055 82054 1400421c0 40 API calls 82054->82070 82061 14003a0ea 82055->82061 82056 140040730 40 API calls 82056->82070 82057 140042490 40 API calls 82057->82070 82059 14003ec60 40 API calls 82059->82070 82060 14003fcd0 40 API calls 82060->82070 82064 14002de50 40 API calls 82061->82064 82062 14002d0f0 40 API calls 82062->82070 82067 14003ab93 82064->82067 82065 14002cf80 41 API calls 82065->82070 82066 140052190 40 API calls 82066->82070 82068 14002cb80 2 API calls 82067->82068 82069 14003abd9 82068->82069 82070->82041 82070->82044 82070->82049 82070->82052 82070->82053 82070->82054 82070->82056 82070->82057 82070->82059 82070->82060 82070->82061 82070->82062 82070->82065 82070->82066 82155 1400782c0 82070->82155 82209 1400432b0 82070->82209 82214 14006fb80 CryptUnprotectData 82070->82214 82222 140040980 40 API calls 3 library calls 82070->82222 82223 14003eb80 40 API calls 2 library calls 82070->82223 82224 14002e3c0 82070->82224 82073 140074d67 memcpy_s 82072->82073 82074 14003e0f0 60 API calls 82073->82074 82075 140074d70 82074->82075 82077 140074d95 82075->82077 82277 140074fd0 82075->82277 82078 14003e020 40 API calls 82077->82078 82079 140074da2 82078->82079 82080 1400421c0 40 API calls 82079->82080 82088 140074ec4 ISource 82079->82088 82081 140074dd4 82080->82081 82082 140042490 40 API calls 82081->82082 82086 140074dec 82082->82086 82083 1400a9aa0 _Strcoll 3 API calls 82084 1400742cc 82083->82084 82089 14003a110 82084->82089 82085 140074fb8 82087 14003ec60 40 API calls 82086->82087 82087->82088 82088->82083 82088->82085 82090 14003a260 82089->82090 82091 14002de50 40 API calls 82090->82091 82092 14003ab93 82091->82092 82093 14002cb80 2 API calls 82092->82093 82094 14003abd9 82093->82094 82096 140048ef4 82095->82096 82098 140048f29 82096->82098 82123 140046ce0 40 API calls 2 library calls 82096->82123 82103 140048f5d 82098->82103 82108 14003f550 40 API calls 82098->82108 82099 140049125 82125 14002c9d0 40 API calls 82099->82125 82100 1400490dc 82101 14003c8ae 82100->82101 82124 1400477c0 40 API calls 2 library calls 82100->82124 82109 140043490 82101->82109 82103->82099 82103->82100 82105 140049169 82106 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82105->82106 82107 14004917a 82106->82107 82108->82103 82111 1400434c7 82109->82111 82110 140043515 82113 140043717 82110->82113 82114 1400436cd 82110->82114 82111->82110 82126 140046ce0 40 API calls 2 library calls 82111->82126 82128 14002c9d0 40 API calls 82113->82128 82116 1400436de 82114->82116 82127 1400477c0 40 API calls 2 library calls 82114->82127 82116->81950 82118 140043759 82119 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82118->82119 82120 14004376a 82119->82120 82121->81959 82122->81961 82123->82098 82124->82101 82125->82105 82126->82110 82127->82116 82128->82118 82130 140081e86 ISource wcsftime 82129->82130 82133 140081f78 wcsftime 82130->82133 82134 140081fa5 82130->82134 82140 140085730 40 API calls 3 library calls 82130->82140 82141 140088ba0 40 API calls 3 library calls 82130->82141 82133->81965 82135 140081fe3 RtlInitUnicodeString RtlInitUnicodeString 82134->82135 82136 140082014 82134->82136 82135->81965 82136->81965 82137->81978 82138->81978 82139->81978 82140->82130 82141->82130 82142->81997 82143->81997 82145 14002f260 ISource 82144->82145 82146 1400a9aa0 _Strcoll 3 API calls 82145->82146 82147 14002f572 82145->82147 82148 14002f434 82146->82148 82147->82027 82148->82027 82152 14002f950 ISource 82149->82152 82150 1400a9aa0 _Strcoll 3 API calls 82153 14002fb24 82150->82153 82151 14002fc62 82152->82150 82152->82151 82153->82031 82154->82035 82158 140078353 ISource memcpy_s 82155->82158 82156 140078426 82157 1400788c7 82156->82157 82160 140078487 ISource 82156->82160 82159 14002de50 40 API calls 82157->82159 82158->82156 82158->82157 82162 140086ce0 72 API calls 82158->82162 82167 1400788ef 82159->82167 82161 1400a9aa0 _Strcoll 3 API calls 82160->82161 82163 1400784b9 82161->82163 82164 140078509 82162->82164 82163->82070 82165 14007854d 82164->82165 82166 1400787b9 82164->82166 82168 1400854d0 40 API calls 82165->82168 82267 140051660 38 API calls 82166->82267 82268 14002c9d0 40 API calls 82167->82268 82171 140078582 82168->82171 82175 140078622 82171->82175 82176 14007859f 82171->82176 82172 140078916 82173 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82172->82173 82174 140078927 82173->82174 82269 14002c9d0 40 API calls 82174->82269 82232 140083d50 82175->82232 82176->82167 82178 1400785d1 82176->82178 82181 140083b90 41 API calls 82178->82181 82180 140078636 82185 1400786d0 82180->82185 82186 14007864d 82180->82186 82183 1400785de 82181->82183 82182 140078950 82184 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82182->82184 82264 140050970 38 API calls 82183->82264 82192 140078964 82184->82192 82188 140083d50 40 API calls 82185->82188 82186->82174 82189 14007867f 82186->82189 82190 1400786e4 82188->82190 82191 140083b90 41 API calls 82189->82191 82193 140083d50 40 API calls 82190->82193 82194 14007868c 82191->82194 82270 14002c9d0 40 API calls 82192->82270 82196 1400786f3 82193->82196 82265 140050970 38 API calls 82194->82265 82243 140062300 82196->82243 82197 14007898e 82200 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82197->82200 82202 1400789a2 82200->82202 82201 140078703 82201->82192 82203 140078736 82201->82203 82210 14003fb40 40 API calls 82209->82210 82213 140043308 memcpy_s 82210->82213 82211 14003fb40 40 API calls 82212 140043441 82211->82212 82212->82070 82213->82211 82215 14006fbe6 82214->82215 82216 14006fcac 82214->82216 82218 14006fc0d memcpy_s 82215->82218 82219 1400457e0 40 API calls 82215->82219 82217 1400a9aa0 _Strcoll 3 API calls 82216->82217 82220 14006fcc6 82217->82220 82221 14006fc66 LocalFree 82218->82221 82219->82218 82220->82070 82221->82216 82222->82070 82223->82070 82227 14002e3f0 82224->82227 82225 14002e4be 82276 14002dcd0 40 API calls 2 library calls 82225->82276 82226 1400a9aa0 _Strcoll 3 API calls 82229 14002e4a9 82226->82229 82227->82225 82231 14002e42b 82227->82231 82229->82070 82230 14002e4cc 82231->82226 82237 140083d6f 82232->82237 82242 140083dee 82232->82242 82233 140044520 40 API calls 82235 140083e1b 82233->82235 82234 140083daa 82234->82180 82236 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82235->82236 82238 140083e2c 82236->82238 82237->82234 82271 140085d50 40 API calls 3 library calls 82237->82271 82240 140083ddd 82241 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82240->82241 82241->82242 82242->82233 82245 14006233d 82243->82245 82246 14006237e 82243->82246 82244 14006235c 82244->82201 82245->82244 82272 1400414b0 40 API calls Concurrency::cancel_current_task 82245->82272 82248 140044520 40 API calls 82246->82248 82249 1400623b1 82248->82249 82250 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82249->82250 82264->82160 82265->82160 82267->82156 82268->82172 82269->82182 82270->82197 82271->82240 82276->82230 82278 140075007 RegOpenKeyExA 82277->82278 82279 140075004 82277->82279 82280 140075033 RegCloseKey 82278->82280 82281 140075039 82278->82281 82279->82278 82280->82281 82285 1400750b4 82281->82285 82286 140075067 82281->82286 82288 1400750e0 82281->82288 82282 1400a9aa0 _Strcoll 3 API calls 82283 1400750cb 82282->82283 82283->82075 82285->82282 82286->82285 82287 140074fd0 69 API calls 82286->82287 82287->82286 82289 140075180 82288->82289 82290 1400754f7 82289->82290 82291 1400751ea 82289->82291 82294 140048eb0 40 API calls 82290->82294 82337 1400754a2 82290->82337 82338 14007eab0 82291->82338 82292 1400a9aa0 _Strcoll 3 API calls 82295 140075612 82292->82295 82296 140075533 82294->82296 82295->82281 82297 140043490 40 API calls 82296->82297 82298 140075542 82297->82298 82300 140048eb0 40 API calls 82298->82300 82299 1400751f9 82303 14006fb80 42 API calls 82299->82303 82306 140075624 82299->82306 82299->82337 82302 14007555c 82300->82302 82301 1400754f2 ISource 82301->82292 82304 140043490 40 API calls 82302->82304 82305 14007526c ISource 82303->82305 82307 14007556b 82304->82307 82305->82306 82320 14007533d memcpy_s 82305->82320 82310 14002cb80 2 API calls 82306->82310 82309 140048eb0 40 API calls 82307->82309 82312 140075641 SysFreeString 82310->82312 82312->82281 82337->82301 82337->82306 82339 14007eb1e RegOpenKeyExA 82338->82339 82340 14007eb1b 82338->82340 82341 14007eb49 RegQueryValueExA 82339->82341 82347 14007ebf3 ISource 82339->82347 82340->82339 82341->82347 82348 14007eb88 82341->82348 82342 14007ec15 RegCloseKey 82343 14007ec1b 82342->82343 82345 1400a9aa0 _Strcoll 3 API calls 82343->82345 82346 14007ec2e 82345->82346 82346->82299 82347->82342 82347->82343 82348->82347 82349 14007ec3f 82348->82349 82350 14007ecc4 RegOpenKeyExA 82349->82350 82351 14007ece7 ISource 82350->82351 82352 14007ef0b 82350->82352 82351->82352 82353 14007ecf4 RegEnumKeyExA 82351->82353 82362 14007ef52 memcpy_s 82351->82362 82364 14007ef47 82351->82364 82402 140046ff0 40 API calls 5 library calls 82351->82402 82403 140086f00 82351->82403 82415 14004fd50 40 API calls 82351->82415 82354 14007ef14 RegCloseKey 82352->82354 82355 14007ef1a 82352->82355 82353->82351 82354->82355 82356 1400a9aa0 _Strcoll 3 API calls 82355->82356 82358 14002b5d0 40 API calls 82358->82362 82363 14007efc8 GetLogicalDriveStringsW 82362->82363 82364->82358 82402->82351 82406 140086f4d 82403->82406 82419 140059f8a 82420 14006fb80 42 API calls 82419->82420 82422 140059f98 ISource 82420->82422 82421 14005a093 82422->82421 82423 1400a9aa0 _Strcoll 3 API calls 82422->82423 82424 14005a084 82423->82424 82425 14007dd0b 82426 14007dd0f 82425->82426 82427 14007dd1c 82425->82427 82428 14006f8d0 40 API calls 82426->82428 82429 1400a9aa0 _Strcoll 3 API calls 82427->82429 82428->82427 82430 14007dd4e 82429->82430 82431 14007e98b RegOpenKeyExA 82432 14007e9b5 RegQueryValueExA 82431->82432 82438 14007e9f4 ISource 82431->82438 82432->82438 82433 14007ea84 RegCloseKey 82434 14007ea8a 82433->82434 82436 1400a9aa0 _Strcoll 3 API calls 82434->82436 82437 14007ea9d 82436->82437 82438->82433 82438->82434 82439 14007eaa7 82438->82439 82440 14008a31b 82538 1400693f0 82440->82538 82442 14008aa51 82443 140062eb0 41 API calls 82442->82443 82444 14008aa95 82443->82444 82445 140066750 41 API calls 82444->82445 82446 14008aabb 82445->82446 82447 140063430 41 API calls 82446->82447 82449 14008aacb 82447->82449 82448 14008a558 82455 14008a99c 82448->82455 82456 14008a56c 82448->82456 82453 14008aada 82449->82453 82513 14008adf4 82449->82513 82451 14008a17e 82451->82442 82451->82448 82452 14008a77d 82451->82452 82454 14008a832 82451->82454 82466 1400687b0 40 API calls 82451->82466 82457 140062eb0 41 API calls 82452->82457 82458 14002ead0 8 API calls 82453->82458 82459 140062eb0 41 API calls 82454->82459 82465 140062eb0 41 API calls 82455->82465 82543 140068610 82456->82543 82462 14008a7bd 82457->82462 82525 14008a645 82458->82525 82463 14008a872 82459->82463 82461 14008a584 82474 14008a8e7 82461->82474 82491 14008a59c 82461->82491 82467 140066750 41 API calls 82462->82467 82468 140066750 41 API calls 82463->82468 82464 1400ac0c8 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 82488 14008ae01 82464->82488 82469 14008a9dc 82465->82469 82466->82451 82470 14008a7e3 82467->82470 82471 14008a898 82468->82471 82473 140066750 41 API calls 82469->82473 82475 140063430 41 API calls 82470->82475 82472 140063430 41 API calls 82471->82472 82476 14008a8a8 82472->82476 82477 14008aa02 82473->82477 82487 140062eb0 41 API calls 82474->82487 82478 14008a7f3 82475->82478 82481 14008ad9d 82476->82481 82482 14008a8b7 82476->82482 82483 140063430 41 API calls 82477->82483 82479 14008ad80 82478->82479 82480 14008a802 82478->82480 82558 140061f10 38 API calls 82479->82558 82496 14002ead0 8 API calls 82480->82496 82559 140061f10 38 API calls 82481->82559 82497 14002ead0 8 API calls 82482->82497 82484 14008aa12 82483->82484 82489 14008aa21 82484->82489 82490 14008add7 82484->82490 82494 14008a927 82487->82494 82488->82464 82498 140061f10 38 API calls 82488->82498 82507 14002ead0 8 API calls 82489->82507 82561 140061f10 38 API calls 82490->82561 82509 140062eb0 41 API calls 82491->82509 82492 14008ad8d 82500 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82492->82500 82493 14008adaa 82501 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82493->82501 82495 140066750 41 API calls 82494->82495 82503 14008a94d 82495->82503 82496->82525 82497->82525 82498->82488 82500->82481 82502 14008adba 82501->82502 82560 140061f10 38 API calls 82502->82560 82505 140063430 41 API calls 82503->82505 82504 14008ade4 82508 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82504->82508 82511 14008a95d 82505->82511 82506 1400a9aa0 _Strcoll 3 API calls 82512 14008acf6 82506->82512 82507->82525 82508->82513 82514 14008a5ec 82509->82514 82511->82502 82516 14008a96c 82511->82516 82562 140061f10 38 API calls 82513->82562 82517 140066750 41 API calls 82514->82517 82515 14008adc7 82518 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82515->82518 82521 14002ead0 8 API calls 82516->82521 82519 14008a612 82517->82519 82518->82490 82520 140063430 41 API calls 82519->82520 82522 14008a622 82520->82522 82521->82525 82523 14008ad2a 82522->82523 82524 14008a631 82522->82524 82555 140061f10 38 API calls 82523->82555 82528 14002ead0 8 API calls 82524->82528 82525->82506 82527 14008ad36 82529 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82527->82529 82528->82525 82530 14008ad46 82529->82530 82556 140061f10 38 API calls 82530->82556 82532 14008ad53 82533 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82532->82533 82534 14008ad63 82533->82534 82557 140068510 38 API calls 82534->82557 82536 14008ad70 82537 1400ac0c8 Concurrency::cancel_current_task 2 API calls 82536->82537 82537->82479 82539 140069410 82538->82539 82540 140069485 82538->82540 82539->82451 82542 14006949d 82540->82542 82563 14006c2b0 40 API calls 82540->82563 82542->82451 82544 140068635 82543->82544 82545 140068668 82544->82545 82546 140068711 82544->82546 82554 1400686c0 82544->82554 82547 1400a9be8 std::_Facet_Register 40 API calls 82545->82547 82564 14002b5f0 40 API calls 82546->82564 82549 14006868c 82547->82549 82551 14003fcd0 40 API calls 82549->82551 82552 1400686a8 82551->82552 82553 140040730 40 API calls 82552->82553 82553->82554 82554->82461 82555->82527 82556->82532 82557->82536 82558->82492 82559->82493 82560->82515 82561->82504 82562->82488 82565 14004205f 82566 14004206b 82565->82566 82568 1400a9be8 std::_Facet_Register 40 API calls 82566->82568 82570 1400420b4 82566->82570 82568->82570 82569 140042183 82571 1400a9aa0 _Strcoll 3 API calls 82569->82571 82573 1400b6720 38 API calls std::locale::_Setgloballocale 82570->82573 82572 14004219f 82571->82572 82573->82569 82574 140050e60 82575 140050e78 82574->82575 82579 140050e84 memcpy_s 82574->82579 82576 140050e95 memcpy_s 82577 140050fce 82577->82576 82580 14008ced4 _fread_nolock 39 API calls 82577->82580 82579->82576 82579->82577 82581 14008ced4 82579->82581 82580->82576 82584 14008cef4 82581->82584 82585 14008ceec 82584->82585 82586 14008cf1e 82584->82586 82585->82579 82586->82585 82587 14008cf6a 82586->82587 82588 14008cf2d memcpy_s 82586->82588 82589 14008c3ec _fread_nolock EnterCriticalSection 82587->82589 82612 140091b6c 7 API calls _get_daylight 82588->82612 82590 14008cf72 82589->82590 82597 14008cc74 82590->82597 82593 14008cf42 82613 14008d6a8 37 API calls _invalid_parameter_noinfo 82593->82613 82598 14008ccb5 82597->82598 82601 14008cc9b memcpy_s 82597->82601 82614 14008c3f8 LeaveCriticalSection 82598->82614 82599 14008cca5 82635 140091b6c 7 API calls _get_daylight 82599->82635 82601->82598 82601->82599 82604 14008cd12 memcpy_s 82601->82604 82604->82598 82605 14008ce93 memcpy_s 82604->82605 82606 1400952f0 _fread_nolock 37 API calls 82604->82606 82615 14009913c 82604->82615 82637 140091b6c 7 API calls _get_daylight 82604->82637 82638 14008d6a8 37 API calls _invalid_parameter_noinfo 82604->82638 82639 14009acf0 82604->82639 82699 140091b6c 7 API calls _get_daylight 82605->82699 82606->82604 82609 14008ccaa 82636 14008d6a8 37 API calls _invalid_parameter_noinfo 82609->82636 82612->82593 82613->82585 82616 140099159 82615->82616 82619 14009916e 82615->82619 82729 140091b6c 7 API calls _get_daylight 82616->82729 82618 14009915e 82730 14008d6a8 37 API calls _invalid_parameter_noinfo 82618->82730 82621 1400991b1 82619->82621 82628 140099169 82619->82628 82731 14009a6bc 7 API calls 2 library calls 82619->82731 82623 1400952f0 _fread_nolock 37 API calls 82621->82623 82624 1400991c3 82623->82624 82700 14009abd4 82624->82700 82627 1400952f0 _fread_nolock 37 API calls 82629 1400991f1 82627->82629 82628->82604 82629->82628 82630 1400952f0 _fread_nolock 37 API calls 82629->82630 82631 1400991fd 82630->82631 82631->82628 82632 1400952f0 _fread_nolock 37 API calls 82631->82632 82633 14009920a 82632->82633 82634 1400952f0 _fread_nolock 37 API calls 82633->82634 82634->82628 82635->82609 82636->82598 82637->82604 82638->82604 82640 14009ad2b 82639->82640 82641 14009ad13 82639->82641 82643 14009b10f 82640->82643 82652 14009ad7a 82640->82652 82750 140091b4c 7 API calls _get_daylight 82641->82750 82771 140091b4c 7 API calls _get_daylight 82643->82771 82644 14009ad18 82751 140091b6c 7 API calls _get_daylight 82644->82751 82647 14009b114 82772 140091b6c 7 API calls _get_daylight 82647->82772 82648 14009ad83 82752 140091b4c 7 API calls _get_daylight 82648->82752 82650 14009ad20 82650->82604 82652->82648 82652->82650 82655 14009adb1 82652->82655 82653 14009ad90 82773 14008d6a8 37 API calls _invalid_parameter_noinfo 82653->82773 82654 14009ad88 82753 140091b6c 7 API calls _get_daylight 82654->82753 82658 14009add7 82655->82658 82659 14009ae14 82655->82659 82660 14009ade6 82655->82660 82658->82660 82668 14009ae02 82658->82668 82757 14009b5e0 82659->82757 82754 140091b4c 7 API calls _get_daylight 82660->82754 82663 14009adeb 82755 140091b6c 7 API calls _get_daylight 82663->82755 82665 140098c40 __free_lconv_num 7 API calls 82669 14009ae31 82665->82669 82742 1400a4aa4 82668->82742 82672 140098c40 __free_lconv_num 7 API calls 82669->82672 82670 14009adf2 82756 14008d6a8 37 API calls _invalid_parameter_noinfo 82670->82756 82674 14009ae38 82672->82674 82676 14009ae5b 82674->82676 82677 14009ae40 82674->82677 82675 14009af49 GetConsoleMode 82678 14009af5d 82675->82678 82680 14009afb7 _fread_nolock 82675->82680 82765 14009b3b4 37 API calls 2 library calls 82676->82765 82763 140091b6c 7 API calls _get_daylight 82677->82763 82678->82680 82682 14009af67 ReadConsoleW 82678->82682 82685 14009b0d5 __std_fs_get_current_path 82680->82685 82686 14009afab 82680->82686 82682->82686 82689 14009af8c __std_fs_get_current_path 82682->82689 82683 140098c40 __free_lconv_num 7 API calls 82683->82650 82684 14009ae45 82764 140091b4c 7 API calls _get_daylight 82684->82764 82685->82689 82690 14009b0e0 82685->82690 82691 14009b01e 82686->82691 82692 14009b043 82686->82692 82698 14009adfd 82686->82698 82689->82698 82766 140091ae0 7 API calls 2 library calls 82689->82766 82769 140091b6c 7 API calls _get_daylight 82690->82769 82767 14009a900 37 API calls 4 library calls 82691->82767 82692->82698 82768 14009a728 37 API calls _fread_nolock 82692->82768 82695 14009b0e5 82770 140091b4c 7 API calls _get_daylight 82695->82770 82698->82683 82699->82609 82701 14009abfe 82700->82701 82702 14009ac16 82700->82702 82732 140091b4c 7 API calls _get_daylight 82701->82732 82704 14009acb8 82702->82704 82709 14009ac4e 82702->82709 82739 140091b4c 7 API calls _get_daylight 82704->82739 82706 14009ac03 82733 140091b6c 7 API calls _get_daylight 82706->82733 82707 14009acbd 82740 140091b6c 7 API calls _get_daylight 82707->82740 82711 14009ac6c 82709->82711 82712 14009ac57 82709->82712 82713 1400a065c _fread_nolock EnterCriticalSection 82711->82713 82734 140091b4c 7 API calls _get_daylight 82712->82734 82716 14009ac73 82713->82716 82714 14009ac64 82741 14008d6a8 37 API calls _invalid_parameter_noinfo 82714->82741 82719 14009ac89 82716->82719 82720 14009ac9e 82716->82720 82717 14009ac5c 82735 140091b6c 7 API calls _get_daylight 82717->82735 82736 140091b6c 7 API calls _get_daylight 82719->82736 82723 14009acf0 _fread_nolock 39 API calls 82720->82723 82725 14009ac99 82723->82725 82724 14009ac8e 82737 140091b4c 7 API calls _get_daylight 82724->82737 82738 1400a0744 LeaveCriticalSection 82725->82738 82728 1400991d0 82728->82627 82728->82628 82729->82618 82730->82628 82731->82621 82732->82706 82733->82728 82734->82717 82735->82714 82736->82724 82737->82725 82739->82707 82740->82714 82741->82728 82743 1400a4aad 82742->82743 82745 1400a4aba 82742->82745 82774 140091b6c 7 API calls _get_daylight 82743->82774 82747 14009af29 82745->82747 82775 140091b6c 7 API calls _get_daylight 82745->82775 82747->82675 82747->82680 82748 1400a4af1 82776 14008d6a8 37 API calls _invalid_parameter_noinfo 82748->82776 82750->82644 82751->82650 82752->82654 82753->82653 82754->82663 82755->82670 82756->82698 82758 14009b62b 82757->82758 82761 14009b5ef wcsftime 82757->82761 82777 140091b6c 7 API calls _get_daylight 82758->82777 82760 14009ae27 82760->82665 82761->82758 82761->82760 82762 1400a4d58 std::_Facet_Register 2 API calls 82761->82762 82762->82761 82763->82684 82764->82698 82765->82668 82766->82698 82767->82698 82768->82698 82769->82695 82770->82698 82771->82647 82772->82653 82773->82650 82774->82747 82775->82748 82776->82747 82777->82760 82778 140088a14 82779 140088a19 82778->82779 82786 140091a64 82779->82786 82782 140088afa 82791 140075b50 40 API calls Concurrency::cancel_current_task 82782->82791 82783 140088b54 82784 1400a9aa0 _Strcoll 3 API calls 82783->82784 82785 140088b82 82784->82785 82787 1400958c8 _Getcoll 37 API calls 82786->82787 82788 140091a6d 82787->82788 82789 140097b50 _Getcoll 37 API calls 82788->82789 82790 140091a86 82789->82790 82790->82782 82791->82783 82792 140088114 82793 140087e65 82792->82793 82795 140087df0 82792->82795 82794 140045670 40 API calls 82793->82794 82794->82795 82796 14002dfa0 82797 14002e0eb 82796->82797 82798 14002dfb9 ISource 82796->82798 82803 1400b6740 82798->82803 82800 14002dfe8 ISource 82801 1400a9aa0 _Strcoll 3 API calls 82800->82801 82802 14002e0ce 82801->82802 82804 1400b676b FindFirstFileExW 82803->82804 82805 1400b675e FindClose 82803->82805 82806 1400b6792 __std_fs_get_current_path 82804->82806 82805->82804 82806->82800
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: cannot use push_back() with $config$content$directory_iterator::directory_iterator$exists$filename$files$key$status$users
                                • API String ID: 0-1424636042
                                • Opcode ID: dc2138c00743425744b120cede5de00988e557f4458b21d1f45413fef7e810c7
                                • Instruction ID: 18e9537abf8c399adecc8ee300f97c09961d25cacb313f0cface33e0c59278d9
                                • Opcode Fuzzy Hash: dc2138c00743425744b120cede5de00988e557f4458b21d1f45413fef7e810c7
                                • Instruction Fuzzy Hash: 5F737E72611BC489DB328F26D8803DE73A1F799798F405216EB9D4BBA9EF74C684C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Name$DevicesDisplayEnum$ComputerFileGlobalMemoryModuleStatusUserValuewcsftime
                                • String ID: %d-%m-%Y, %H:%M:%S$computer_name$cpu$gpu$ram$system$time$timezone$user_name
                                • API String ID: 2481273502-1182675529
                                • Opcode ID: 9d375af3352c166cece0dd38c404bbfdf69b8dc900355972cfed305075cccbb4
                                • Instruction ID: 5fa35f0932b4f7a06d77f64b28838163074d6387588a43a5e313af0f4ac1ac9d
                                • Opcode Fuzzy Hash: 9d375af3352c166cece0dd38c404bbfdf69b8dc900355972cfed305075cccbb4
                                • Instruction Fuzzy Hash: DAF26E73614BC485DB22CB65E8903DE77A1F799798F409616FB8D17BA9EB38C290C700

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1216 14003b740-14003b83f LoadLibraryA 1217 14003b845-14003bc00 GetProcAddress * 6 1216->1217 1218 14003c700-14003c70a 1216->1218 1217->1218 1219 14003bc06-14003bc09 1217->1219 1220 14003c70c-14003c70e 1218->1220 1221 14003c719-14003c71c 1218->1221 1219->1218 1222 14003bc0f-14003bc12 1219->1222 1220->1221 1223 14003c727-14003c756 call 1400a9aa0 1221->1223 1224 14003c71e-14003c721 call 1400d0158 1221->1224 1222->1218 1226 14003bc18-14003bc1b 1222->1226 1224->1223 1226->1218 1229 14003bc21-14003bc24 1226->1229 1229->1218 1231 14003bc2a-14003bc2d 1229->1231 1231->1218 1232 14003bc33-14003bc41 1231->1232 1233 14003bc45-14003bc47 1232->1233 1233->1218 1234 14003bc4d-14003bc59 1233->1234 1234->1218 1235 14003bc5f-14003bc68 1234->1235 1236 14003bc70-14003bc8b 1235->1236 1238 14003bc91-14003bcaf 1236->1238 1239 14003c6e7-14003c6f3 1236->1239 1238->1239 1242 14003bcb5-14003bcc7 1238->1242 1239->1236 1240 14003c6f9 1239->1240 1240->1218 1243 14003c6d3-14003c6e2 1242->1243 1244 14003bccd 1242->1244 1243->1239 1245 14003bcd2-14003bd23 call 1400a9be8 1244->1245 1249 14003bfa2 1245->1249 1250 14003bd29-14003bd30 1245->1250 1253 14003bfa4-14003bfab 1249->1253 1250->1249 1252 14003bd36-14003be2f call 14006f8d0 call 1400421c0 call 140042490 1250->1252 1279 14003be30-14003be38 1252->1279 1255 14003c221-14003c25d 1253->1255 1256 14003bfb1-14003bfb8 1253->1256 1262 14003c263-14003c4f3 1255->1262 1263 14003c4f7-14003c4f9 1255->1263 1256->1255 1258 14003bfbe-14003c0ab call 14006f8d0 call 1400421c0 call 140042490 1256->1258 1286 14003c0b2-14003c0ba 1258->1286 1262->1263 1273 14003c4f5 1262->1273 1268 14003c6a5-14003c6bb call 14003e2c0 1263->1268 1269 14003c4ff-14003c628 call 1400300a0 call 14003ec60 call 1400300a0 call 14003ec60 call 140040ea0 call 1400a9be8 call 140058da0 1263->1269 1282 14003c6c1-14003c6cc 1268->1282 1283 14003bcd0 1268->1283 1316 14003c634-14003c657 call 140040730 1269->1316 1317 14003c62a-14003c62c 1269->1317 1273->1263 1279->1279 1280 14003be3a-14003bfa0 call 1400300a0 call 140043770 call 140040ea0 1279->1280 1280->1253 1282->1243 1283->1245 1286->1286 1289 14003c0bc-14003c21a call 1400300a0 call 140043770 call 140040ea0 1286->1289 1289->1255 1325 14003c659-14003c67c 1316->1325 1326 14003c67e-14003c688 call 1400499d0 1316->1326 1317->1316 1318 14003c75d-14003c7da call 1400408f0 call 140044450 call 140044520 call 1400ac0c8 call 14008d6c8 * 8 1317->1318 1328 14003c68d-14003c69e call 140040ea0 1325->1328 1326->1328 1328->1268
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: AddressProc$Library$FreeLoad
                                • String ID: cannot use push_back() with $system$vault
                                • API String ID: 2449869053-1741236777
                                • Opcode ID: c17289ebbdb77ccaa0c0a3119b37ef02d03229ed1cf887cad3a8d2ace1939303
                                • Instruction ID: 83fd89eefa33efb33c82b2055fe19ba1a31d5f048fce8dc0dcd73234cb012c13
                                • Opcode Fuzzy Hash: c17289ebbdb77ccaa0c0a3119b37ef02d03229ed1cf887cad3a8d2ace1939303
                                • Instruction Fuzzy Hash: 72721736215BC48AD7628F26E8803DE77B4F789788F504216EB8C5BB69EF75C694C700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Close
                                • String ID: content$directory_iterator::directory_iterator$exists$filename$status$h
                                • API String ID: 3535843008-678820482
                                • Opcode ID: cc0dd20fa7b6627eb239f033f68a82b47d6822d85e55bc6bf3641088630b89da
                                • Instruction ID: 77a7a5cfae23bf6c3af20a62c5909d9feaa762cba23750775791ffaa08a2e511
                                • Opcode Fuzzy Hash: cc0dd20fa7b6627eb239f033f68a82b47d6822d85e55bc6bf3641088630b89da
                                • Instruction Fuzzy Hash: 87F26D72611BC48AEB229F76D8803DE3361F799798F505216FB9D1BAA9DF74C684C300

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1890 14007eab0-14007eb19 1891 14007eb1e-14007eb43 RegOpenKeyExA 1890->1891 1892 14007eb1b 1890->1892 1893 14007ec0b-14007ec13 1891->1893 1894 14007eb49-14007eb4e 1891->1894 1892->1891 1895 14007ec15 RegCloseKey 1893->1895 1896 14007ec1b-14007ec3e call 1400a9aa0 1893->1896 1897 14007eb53-14007eb82 RegQueryValueExA 1894->1897 1898 14007eb50 1894->1898 1895->1896 1897->1893 1900 14007eb88-14007ebc8 call 1400300a0 call 14003fc40 1897->1900 1898->1897 1906 14007ebf8-14007ec06 1900->1906 1907 14007ebca-14007ebdc 1900->1907 1906->1893 1908 14007ebf3 call 1400a9ac0 1907->1908 1909 14007ebde-14007ebf1 1907->1909 1908->1906 1909->1908 1910 14007ec3f-14007ecbf call 14008d6c8 1909->1910 1915 14007ecc4-14007ece1 RegOpenKeyExA 1910->1915 1916 14007ecc1 1910->1916 1917 14007ece7-14007ecea 1915->1917 1918 14007ef0b-14007ef12 1915->1918 1916->1915 1919 14007ecf4-14007ed29 RegEnumKeyExA 1917->1919 1920 14007ef14 RegCloseKey 1918->1920 1921 14007ef1a-14007ef46 call 1400a9aa0 1918->1921 1922 14007ed2f-14007ed61 call 1400300a0 1919->1922 1923 14007eefb-14007ef05 1919->1923 1920->1921 1928 14007ed67-14007ed6f 1922->1928 1929 14007ef4d-14007ef52 call 14002b5d0 1922->1929 1923->1918 1923->1919 1930 14007ed74-14007edc0 call 140046ff0 call 140086f00 1928->1930 1931 14007ed71 1928->1931 1936 14007ef53-14007ef58 call 14008d6c8 1929->1936 1941 14007edc2-14007edf9 1930->1941 1942 14007edfb-14007ee03 call 14004fd50 1930->1942 1931->1930 1943 14007ef59-14007efde call 14008d6c8 call 1400bd2b0 GetLogicalDriveStringsW 1936->1943 1944 14007ee08-14007ee18 1941->1944 1942->1944 1967 14007efe4-14007efed 1943->1967 1968 14007f1cd-14007f1f6 call 1400a9aa0 1943->1968 1947 14007ee4c-14007ee6e 1944->1947 1948 14007ee1a-14007ee2c 1944->1948 1950 14007eea1-14007eeb9 1947->1950 1951 14007ee70-14007ee81 1947->1951 1952 14007ee47 call 1400a9ac0 1948->1952 1953 14007ee2e-14007ee41 1948->1953 1957 14007eebb-14007eecd 1950->1957 1958 14007eee9-14007eef6 1950->1958 1955 14007ee83-14007ee96 1951->1955 1956 14007ee9c call 1400a9ac0 1951->1956 1952->1947 1953->1936 1953->1952 1955->1943 1955->1956 1956->1950 1962 14007eee4 call 1400a9ac0 1957->1962 1963 14007eecf-14007eee2 1957->1963 1958->1923 1962->1958 1963->1962 1965 14007ef47-14007ef4c call 14008d6c8 1963->1965 1965->1929 1967->1968 1969 14007eff3-14007f0e8 call 140034b20 call 14003f930 1967->1969 1980 14007f121-14007f158 1969->1980 1981 14007f0ea-14007f101 1969->1981 1984 14007f18d-14007f1a7 1980->1984 1985 14007f15a-14007f171 1980->1985 1982 14007f103-14007f116 1981->1982 1983 14007f11c call 1400a9ac0 1981->1983 1982->1983 1987 14007f1f7-14007f1fc call 14008d6c8 1982->1987 1983->1980 1986 14007f1b0-14007f1b9 1984->1986 1989 14007f188 call 1400a9ac0 1985->1989 1990 14007f173-14007f186 1985->1990 1986->1986 1991 14007f1bb-14007f1c7 1986->1991 1993 14007f1fd-14007f44e call 14008d6c8 1987->1993 1989->1984 1990->1989 1990->1993 1991->1968 1991->1969 1999 14007f451-14007f458 1993->1999 1999->1999 2000 14007f45a-14007f4df call 1400300a0 1999->2000 2003 14007f4e4-14007f4eb 2000->2003 2003->2003 2004 14007f4ed-14007f9e2 call 1400300a0 * 2 call 1400bd2b0 call 1400d0258 call 140075670 call 140040cb0 call 14003fad0 call 140075670 call 140071ce0 call 140045670 call 140040cb0 * 3 call 14007e920 2003->2004 2040 14007f9e7-14007fae5 call 140040cb0 2004->2040 2046 14007fae7-14007faf8 2040->2046 2047 14007fb14-14007fb4f call 1400a9aa0 2040->2047 2048 14007fb0f call 1400a9ac0 2046->2048 2049 14007fafa-14007fb0d 2046->2049 2048->2047 2049->2048 2051 14007fb50-14007fb91 call 14008d6c8 * 11 2049->2051
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseOpen$DriveEnumLogicalQueryStringsValue
                                • String ID: ?$[UTC
                                • API String ID: 3686543267-936800669
                                • Opcode ID: 098affa45c8a04880d033aab24644659da2216aae8af766174cad4408c213bfd
                                • Instruction ID: 6ae9542b8b5485f3e29d61cbae42e1af68e643ed015ddeb41ac003b7496031bc
                                • Opcode Fuzzy Hash: 098affa45c8a04880d033aab24644659da2216aae8af766174cad4408c213bfd
                                • Instruction Fuzzy Hash: CDA29E72A14B8485EB218B6AE8403DE77A1F79D7E8F105315FBAC17BA9DB78C190C740
                                APIs
                                  • Part of subcall function 000000014003FCD0: Concurrency::cancel_current_task.LIBCPMT ref: 000000014003FDD8
                                • Concurrency::cancel_current_task.LIBCPMT ref: 000000014005D530
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID: cannot use push_back() with $content$directory_iterator::directory_iterator$exists$filename$recursive_directory_iterator::operator++$recursive_directory_iterator::recursive_directory_iterator$status
                                • API String ID: 118556049-4250644884
                                • Opcode ID: a0ab57ce91fc34b01f04605b245bb6d5d3d8e74c40c52116daffb1c39d35bc40
                                • Instruction ID: d16ee5ffaeb2dbe894ce73aae2b3034a494ea4411d70db2ab878c56782b9ea76
                                • Opcode Fuzzy Hash: a0ab57ce91fc34b01f04605b245bb6d5d3d8e74c40c52116daffb1c39d35bc40
                                • Instruction Fuzzy Hash: 92434B72219BC581DA72DB16E4803EEB3A5F7C9790F505216EBDD43AA9EF78C584CB00

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2907 14007cdf0-14007ce4c 2908 14007d004-14007d028 InternetOpenA 2907->2908 2909 14007ce52-14007ce65 call 1400a9b70 2907->2909 2910 14007d04d-14007d066 2908->2910 2911 14007d02a-14007d048 2908->2911 2909->2908 2919 14007ce6b-14007cfcd 2909->2919 2914 14007d068 2910->2914 2915 14007d06b-14007d098 InternetOpenUrlA 2910->2915 2913 14007d3ff-14007d428 call 1400a9aa0 2911->2913 2914->2915 2917 14007d0c0-14007d0eb HttpQueryInfoW 2915->2917 2918 14007d09a-14007d0bb 2915->2918 2922 14007d11d-14007d178 HttpQueryInfoW 2917->2922 2923 14007d0ed-14007d118 2917->2923 2921 14007d3f6 2918->2921 2924 14007cfd4-14007cfdc 2919->2924 2921->2913 2927 14007d1a6-14007d1bc InternetQueryDataAvailable 2922->2927 2928 14007d17a-14007d190 call 1400919b0 2922->2928 2923->2921 2924->2924 2926 14007cfde-14007cfff call 1400300a0 call 1400a9f1c call 1400a9b04 2924->2926 2926->2908 2929 14007d3a3-14007d3f1 InternetCloseHandle 2927->2929 2930 14007d1c2-14007d1c7 2927->2930 2928->2927 2937 14007d192-14007d1a1 call 140044fc0 2928->2937 2929->2921 2934 14007d1d0-14007d1d6 2930->2934 2934->2929 2938 14007d1dc-14007d1f6 2934->2938 2937->2927 2942 14007d1f8-14007d1fe 2938->2942 2943 14007d269-14007d281 InternetReadFile 2938->2943 2948 14007d200-14007d207 2942->2948 2949 14007d22c-14007d22f call 1400a9be8 2942->2949 2946 14007d287-14007d28c 2943->2946 2947 14007d35d-14007d364 2943->2947 2946->2947 2950 14007d292-14007d29d 2946->2950 2947->2929 2951 14007d366-14007d377 2947->2951 2952 14007d42f-14007d434 call 14002b510 2948->2952 2953 14007d20d-14007d218 call 1400a9be8 2948->2953 2961 14007d234-14007d264 call 1400bd2b0 2949->2961 2956 14007d2cf-14007d2e9 call 140045990 2950->2956 2957 14007d29f-14007d2cd call 1400bcc10 2950->2957 2958 14007d392-14007d39f call 1400a9ac0 2951->2958 2959 14007d379-14007d38c 2951->2959 2965 14007d429-14007d42e call 14008d6c8 2953->2965 2974 14007d21e-14007d22a 2953->2974 2976 14007d2ea-14007d2f1 2956->2976 2957->2976 2958->2929 2959->2958 2959->2965 2961->2943 2965->2952 2974->2961 2977 14007d334 2976->2977 2978 14007d2f3-14007d304 2976->2978 2979 14007d336-14007d34c InternetQueryDataAvailable 2977->2979 2980 14007d306-14007d319 2978->2980 2981 14007d31f-14007d332 call 1400a9ac0 2978->2981 2979->2929 2982 14007d34e-14007d358 2979->2982 2980->2965 2980->2981 2981->2979 2982->2934
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Internet$Query$AvailableDataHttpInfoOpen$AcquireCloseConcurrency::cancel_current_taskExclusiveFileHandleLockRead
                                • String ID: 0Q>%&&
                                • API String ID: 3609429561-3488671784
                                • Opcode ID: 57ca7581aa671b4f5e8d6bcb6210d21ab16385bc4098e479ac351e805d702d63
                                • Instruction ID: 545cd8f60b377f538693443bd994a67682f78e99984eccf18132968f8f5fa667
                                • Opcode Fuzzy Hash: 57ca7581aa671b4f5e8d6bcb6210d21ab16385bc4098e479ac351e805d702d63
                                • Instruction Fuzzy Hash: 56024B32A14B9486EB11CB6AE84039E77B5F799B94F104216FF8C57BA9DF78C191CB00
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: content$directory_iterator::directory_iterator$exists$filename$status$h
                                • API String ID: 0-678820482
                                • Opcode ID: 4dbf787f04ffdc9a553db59e873c5c0f7948b00ad0ab945dab612b0a7c66004b
                                • Instruction ID: 4124051653eff67417787a6a86236b4e01367722c0d587ccb465e62d052a51d1
                                • Opcode Fuzzy Hash: 4dbf787f04ffdc9a553db59e873c5c0f7948b00ad0ab945dab612b0a7c66004b
                                • Instruction Fuzzy Hash: 45E26D72614BC08AEB22CF66D8803DE7361F799798F505216FB9D1BAA9DF74C684C700

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3481 14003be96-14003bea7 3482 14003bec2 3481->3482 3483 14003bea9-14003bebc 3481->3483 3484 14003bec7-14003bfa0 3482->3484 3485 14003bec2 call 1400a9ac0 3482->3485 3483->3482 3486 14003c7b1-14003c7da call 14008d6c8 * 7 3483->3486 3492 14003bfa4-14003bfab 3484->3492 3485->3484 3494 14003c221-14003c25d 3492->3494 3495 14003bfb1-14003bfb8 3492->3495 3501 14003c263-14003c4f3 3494->3501 3502 14003c4f7-14003c4f9 3494->3502 3495->3494 3497 14003bfbe-14003c0ab call 14006f8d0 call 1400421c0 call 140042490 3495->3497 3524 14003c0b2-14003c0ba 3497->3524 3501->3502 3512 14003c4f5 3501->3512 3507 14003c6a5-14003c6bb call 14003e2c0 3502->3507 3508 14003c4ff-14003c628 call 1400300a0 call 14003ec60 call 1400300a0 call 14003ec60 call 140040ea0 call 1400a9be8 call 140058da0 3502->3508 3520 14003c6c1-14003c6cc 3507->3520 3521 14003bcd0 3507->3521 3585 14003c634-14003c657 call 140040730 3508->3585 3586 14003c62a-14003c62c 3508->3586 3512->3502 3526 14003c6d3-14003c6e2 3520->3526 3525 14003bcd2-14003bd23 call 1400a9be8 3521->3525 3524->3524 3530 14003c0bc-14003c21a call 1400300a0 call 140043770 call 140040ea0 3524->3530 3540 14003bfa2 3525->3540 3541 14003bd29-14003bd30 3525->3541 3552 14003c6e7-14003c6f3 3526->3552 3530->3494 3540->3492 3541->3540 3545 14003bd36-14003be2f call 14006f8d0 call 1400421c0 call 140042490 3541->3545 3587 14003be30-14003be38 3545->3587 3557 14003c6f9-14003c70a 3552->3557 3558 14003bc70-14003bc8b 3552->3558 3569 14003c70c-14003c70e 3557->3569 3570 14003c719-14003c71c 3557->3570 3558->3552 3576 14003bc91-14003bcaf 3558->3576 3569->3570 3571 14003c727-14003c756 call 1400a9aa0 3570->3571 3572 14003c71e-14003c721 call 1400d0158 3570->3572 3572->3571 3576->3552 3589 14003bcb5-14003bcc7 3576->3589 3601 14003c659-14003c67c 3585->3601 3602 14003c67e-14003c688 call 1400499d0 3585->3602 3586->3585 3590 14003c75d-14003c7b0 call 1400408f0 call 140044450 call 140044520 call 1400ac0c8 call 14008d6c8 3586->3590 3587->3587 3588 14003be3a-14003be94 call 1400300a0 call 140043770 call 140040ea0 3587->3588 3588->3484 3589->3526 3593 14003bccd 3589->3593 3590->3486 3593->3525 3605 14003c68d-14003c69e call 140040ea0 3601->3605 3602->3605 3605->3507
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: [PID: $cannot use push_back() with $system$vault
                                • API String ID: 0-1782543976
                                • Opcode ID: f6fa2c79db0bcb8a7aa3bc5663c7aeffeea752612ceec85adbd48b77817f9d39
                                • Instruction ID: 8d21aa00e3122c2f7577f2a8e94939fef6a51ac2dc8c3e78b7ecc72b44e17cb0
                                • Opcode Fuzzy Hash: f6fa2c79db0bcb8a7aa3bc5663c7aeffeea752612ceec85adbd48b77817f9d39
                                • Instruction Fuzzy Hash: EF827D72214BC489EB228F66E8843DE77A1F7997D8F504216EB9D47BA9DF74C290C700

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3685 14009dfa0-14009dfdb call 14009d640 call 14009d648 call 14009d6b0 3692 14009dfe1-14009dfec call 14009d650 3685->3692 3693 14009e205-14009e251 call 14008d6f8 call 14009d640 call 14009d648 call 14009d6b0 3685->3693 3692->3693 3698 14009dff2-14009dffc 3692->3698 3718 14009e38f-14009e3fd call 14008d6f8 call 1400a69c0 3693->3718 3719 14009e257-14009e262 call 14009d650 3693->3719 3700 14009e01e-14009e022 3698->3700 3701 14009dffe-14009e001 3698->3701 3705 14009e025-14009e02d 3700->3705 3703 14009e004-14009e00f 3701->3703 3706 14009e01a-14009e01c 3703->3706 3707 14009e011-14009e018 3703->3707 3705->3705 3709 14009e02f-14009e042 call 14009b5e0 3705->3709 3706->3700 3711 14009e04b-14009e059 3706->3711 3707->3703 3707->3706 3715 14009e05a-14009e066 call 140098c40 3709->3715 3716 14009e044-14009e046 call 140098c40 3709->3716 3727 14009e06d-14009e075 3715->3727 3716->3711 3738 14009e40b-14009e40e 3718->3738 3739 14009e3ff-14009e406 3718->3739 3719->3718 3728 14009e268-14009e273 call 14009d680 3719->3728 3727->3727 3730 14009e077-14009e088 call 1400a30f8 3727->3730 3728->3718 3737 14009e279-14009e280 call 140098c40 3728->3737 3730->3693 3740 14009e08e-14009e0e4 call 1400bd2b0 * 4 call 14009debc 3730->3740 3749 14009e285-14009e293 call 1400d0258 3737->3749 3742 14009e410 3738->3742 3743 14009e445-14009e458 call 14009b5e0 3738->3743 3744 14009e49b-14009e49e 3739->3744 3798 14009e0e6-14009e0ea 3740->3798 3747 14009e413 3742->3747 3758 14009e45a 3743->3758 3759 14009e463-14009e47e call 1400a69c0 3743->3759 3746 14009e4a4-14009e4ac call 14009dfa0 3744->3746 3744->3747 3754 14009e418-14009e444 call 140098c40 call 1400a9aa0 3746->3754 3747->3754 3755 14009e413 call 14009e21c 3747->3755 3760 14009e299-14009e29c 3749->3760 3755->3754 3764 14009e45c-14009e461 call 140098c40 3758->3764 3780 14009e480-14009e483 3759->3780 3781 14009e485-14009e497 call 140098c40 3759->3781 3766 14009e2a2-14009e2c3 3760->3766 3767 14009e364-14009e38e call 14009d638 call 14009d628 call 14009d630 3760->3767 3764->3742 3772 14009e2ce-14009e2d5 3766->3772 3773 14009e2c5-14009e2cb 3766->3773 3782 14009e2e9 3772->3782 3783 14009e2d7-14009e2df 3772->3783 3773->3772 3780->3764 3781->3744 3786 14009e2eb-14009e35f call 1400bd2b0 * 4 call 1400a1aa4 call 14009e4b4 * 2 3782->3786 3783->3782 3788 14009e2e1-14009e2e7 3783->3788 3786->3767 3788->3786 3800 14009e0ec 3798->3800 3801 14009e0f0-14009e0f4 3798->3801 3800->3801 3801->3798 3803 14009e0f6-14009e11b call 1400919b0 3801->3803 3809 14009e11e-14009e122 3803->3809 3811 14009e131-14009e135 3809->3811 3812 14009e124-14009e12f 3809->3812 3811->3809 3812->3811 3814 14009e137-14009e13b 3812->3814 3815 14009e1bc-14009e1c0 3814->3815 3816 14009e13d-14009e165 call 1400919b0 3814->3816 3820 14009e1c2-14009e1c4 3815->3820 3821 14009e1c7-14009e1d4 3815->3821 3827 14009e183-14009e187 3816->3827 3828 14009e167 3816->3828 3820->3821 3822 14009e1ef-14009e1fe call 14009d638 call 14009d628 3821->3822 3823 14009e1d6-14009e1ec call 14009debc 3821->3823 3822->3693 3823->3822 3827->3815 3833 14009e189-14009e1a7 call 1400919b0 3827->3833 3831 14009e16a-14009e171 3828->3831 3831->3827 3834 14009e173-14009e181 3831->3834 3839 14009e1b3-14009e1ba 3833->3839 3834->3827 3834->3831 3839->3815 3840 14009e1a9-14009e1ad 3839->3840 3840->3815 3841 14009e1af 3840->3841 3841->3839
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _get_daylight$_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                • String ID: Eastern Standard Time$Eastern Summer Time
                                • API String ID: 355007559-239921721
                                • Opcode ID: aa014edeb69cc707dbe1fdedf59e9d84c93df63f4c645f415b7a1372462a1764
                                • Instruction ID: 57a15796427d9fcb09a0dbe4420b896af4f059e924f9dcb49e1fee42cb9384cd
                                • Opcode Fuzzy Hash: aa014edeb69cc707dbe1fdedf59e9d84c93df63f4c645f415b7a1372462a1764
                                • Instruction Fuzzy Hash: 6AD1A13660069086EB26EF27D9913EA77A1F79CBD4F448126FF49477A5EB38C881C740

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3932 14009acf0-14009ad11 3933 14009ad2b-14009ad2d 3932->3933 3934 14009ad13-14009ad26 call 140091b4c call 140091b6c 3932->3934 3936 14009b10f-14009b11c call 140091b4c call 140091b6c 3933->3936 3937 14009ad33-14009ad3a 3933->3937 3949 14009b127 3934->3949 3954 14009b122 call 14008d6a8 3936->3954 3937->3936 3939 14009ad40-14009ad74 3937->3939 3939->3936 3942 14009ad7a-14009ad81 3939->3942 3945 14009ad9b-14009ad9e 3942->3945 3946 14009ad83-14009ad96 call 140091b4c call 140091b6c 3942->3946 3951 14009b10b-14009b10d 3945->3951 3952 14009ada4-14009ada6 3945->3952 3946->3954 3955 14009b12a-14009b139 3949->3955 3951->3955 3952->3951 3953 14009adac-14009adaf 3952->3953 3953->3946 3957 14009adb1-14009add5 3953->3957 3954->3949 3960 14009ae0a-14009ae12 3957->3960 3961 14009add7-14009adda 3957->3961 3965 14009ae14-14009ae3e call 14009b5e0 call 140098c40 * 2 3960->3965 3966 14009ade6-14009adfd call 140091b4c call 140091b6c call 14008d6a8 3960->3966 3963 14009addc-14009ade4 3961->3963 3964 14009ae02-14009ae08 3961->3964 3963->3964 3963->3966 3968 14009ae89-14009ae9a 3964->3968 3993 14009ae5b-14009ae85 call 14009b3b4 3965->3993 3994 14009ae40-14009ae56 call 140091b6c call 140091b4c 3965->3994 3996 14009af99 3966->3996 3971 14009aea0-14009aea8 3968->3971 3972 14009af21-14009af2b call 1400a4aa4 3968->3972 3971->3972 3977 14009aeaa-14009aeac 3971->3977 3985 14009af31-14009af47 3972->3985 3986 14009afb7 3972->3986 3977->3972 3981 14009aeae-14009aecc 3977->3981 3981->3972 3982 14009aece-14009aeda 3981->3982 3982->3972 3987 14009aedc-14009aede 3982->3987 3985->3986 3991 14009af49-14009af5b GetConsoleMode 3985->3991 3989 14009afbc-14009afd5 call 1400d0188 3986->3989 3987->3972 3992 14009aee0-14009aef8 3987->3992 4001 14009afdb-14009afdd 3989->4001 3991->3986 3997 14009af5d-14009af65 3991->3997 3992->3972 3999 14009aefa-14009af06 3992->3999 3993->3968 3994->3996 3998 14009af9c-14009afa6 call 140098c40 3996->3998 3997->3989 4003 14009af67-14009af8a ReadConsoleW 3997->4003 3998->3955 3999->3972 4005 14009af08-14009af0a 3999->4005 4007 14009afe3-14009afeb 4001->4007 4008 14009b0d5-14009b0de call 1400d0160 4001->4008 4010 14009af8c call 1400d0160 4003->4010 4011 14009afab-14009afb5 4003->4011 4005->3972 4014 14009af0c-14009af1c 4005->4014 4007->4008 4017 14009aff1 4007->4017 4024 14009b0fb-14009b0fe 4008->4024 4025 14009b0e0-14009b0f6 call 140091b6c call 140091b4c 4008->4025 4022 14009af92-14009af94 call 140091ae0 4010->4022 4015 14009aff8-14009b00f 4011->4015 4014->3972 4015->3998 4021 14009b011-14009b01c 4015->4021 4017->4015 4026 14009b01e-14009b037 call 14009a900 4021->4026 4027 14009b043-14009b04b 4021->4027 4022->3996 4024->4022 4031 14009b104-14009b106 4024->4031 4025->3996 4033 14009b03c-14009b03e 4026->4033 4028 14009b04d-14009b05f 4027->4028 4029 14009b0c3-14009b0d0 call 14009a728 4027->4029 4034 14009b061 4028->4034 4035 14009b0b6-14009b0be 4028->4035 4029->4033 4031->3998 4033->3998 4039 14009b067-14009b06e 4034->4039 4035->3998 4041 14009b0ab-14009b0b0 4039->4041 4042 14009b070-14009b074 4039->4042 4041->4035 4044 14009b091 4042->4044 4045 14009b076-14009b07d 4042->4045 4047 14009b097-14009b0a7 4044->4047 4045->4044 4046 14009b07f-14009b083 4045->4046 4046->4044 4048 14009b085-14009b08f 4046->4048 4047->4039 4049 14009b0a9 4047->4049 4048->4047 4049->4035
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 2c34ed3d1f05fca27aeb33c1d0d269749b59793b54f55bbed04439bbd25c7d75
                                • Instruction ID: a61a03662d1ceb98f773c1fd4dd386c3faedb153c1a554d0ed1fc3a7b0e16e44
                                • Opcode Fuzzy Hash: 2c34ed3d1f05fca27aeb33c1d0d269749b59793b54f55bbed04439bbd25c7d75
                                • Instruction Fuzzy Hash: 0AC1ED722046889AEB639B63D4503EE77A0F78ABD4F454115FB5A073F2DB78C894C740

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                • String ID: Eastern Standard Time$Eastern Summer Time
                                • API String ID: 3458911817-239921721
                                • Opcode ID: 52ebdda6a61ace6c58af2ee2a504a68ffcffbc9243b59fbb2e40316781066d43
                                • Instruction ID: 54eaaf3237c51ac38e9593f75949bc1a28ba80c68989b2b5926f1269b82db785
                                • Opcode Fuzzy Hash: 52ebdda6a61ace6c58af2ee2a504a68ffcffbc9243b59fbb2e40316781066d43
                                • Instruction Fuzzy Hash: B5514D3261068086E762EF23E9917DA77A0F79CBC4F445126BB4D87BB6DB38C941C740

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 4129 140094b74-140094b88 4130 140094b8a-140094b96 call 140091b6c call 14008d6a8 4129->4130 4131 140094ba5-140094bbc 4129->4131 4142 140094b9b 4130->4142 4131->4130 4132 140094bbe-140094bc2 4131->4132 4134 140094bd2-140094bdf 4132->4134 4135 140094bc4-140094bd0 call 140091b6c 4132->4135 4134->4135 4138 140094be1 call 14009e534 4134->4138 4135->4142 4144 140094be6-140094bfd call 14009d650 4138->4144 4143 140094b9d-140094ba4 4142->4143 4147 140094e59-140094e6f call 14008d6f8 4144->4147 4148 140094c03-140094c0e call 14009d680 4144->4148 4148->4147 4153 140094c14-140094c1f call 14009d6b0 4148->4153 4153->4147 4156 140094c25-140094c3c 4153->4156 4157 140094c9e-140094cab call 14009d9c8 4156->4157 4158 140094c3e-140094c57 call 14009d9c8 4156->4158 4157->4143 4163 140094cb1-140094cb7 4157->4163 4158->4143 4164 140094c5d-140094c60 4158->4164 4165 140094cb9-140094cc3 call 14009e574 4163->4165 4166 140094cd6 4163->4166 4167 140094e52-140094e54 4164->4167 4168 140094c66-140094c70 call 14009e574 4164->4168 4165->4166 4176 140094cc5-140094cd4 4165->4176 4170 140094cda-140094d07 4166->4170 4167->4143 4168->4167 4179 140094c76-140094c8c call 14009d9c8 4168->4179 4173 140094d09-140094d10 4170->4173 4174 140094d12-140094d53 4170->4174 4173->4174 4177 140094d5f-140094daa 4174->4177 4178 140094d55-140094d5c 4174->4178 4176->4170 4181 140094dac-140094db3 4177->4181 4182 140094db6-140094dd0 4177->4182 4178->4177 4179->4143 4187 140094c92-140094c99 4179->4187 4181->4182 4184 140094dfd 4182->4184 4185 140094dd2-140094dfb 4182->4185 4184->4167 4186 140094dff-140094e32 4184->4186 4185->4167 4188 140094e4f 4186->4188 4189 140094e34-140094e4d 4186->4189 4187->4167 4188->4167 4189->4167
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _get_daylight$_isindst$_invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 1405656091-0
                                • Opcode ID: d8834ba0fadb21926f441da85af72fbef74f0a0767195e07e6a9005270cfca22
                                • Instruction ID: 2d313a3bef1ff223710c477627217efc1d0ec0aaf43e53581fef1b9ed64fdd2b
                                • Opcode Fuzzy Hash: d8834ba0fadb21926f441da85af72fbef74f0a0767195e07e6a9005270cfca22
                                • Instruction Fuzzy Hash: 1681B2B2B012458BEB598F36C9417E837A5F758BCCF04912AFB098B7A9FB38D5518740

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 4190 140086680-1400866c5 4191 1400866cb-1400866f5 call 1400bd2b0 4190->4191 4192 140086991-1400869cb call 140089fe0 call 140087120 4190->4192 4197 140086704-14008673d call 140062d50 call 140089110 call 140087120 4191->4197 4198 1400866f7-140086700 4191->4198 4201 1400869d0-1400869d6 4192->4201 4232 140086743-1400867c8 call 1400300a0 call 140062eb0 call 140066750 call 140063430 4197->4232 4233 1400868d4-1400868db 4197->4233 4198->4197 4204 1400869dc-140086a5b call 1400300a0 call 140062eb0 call 140066750 call 140063430 4201->4204 4205 140086b67-140086b6b 4201->4205 4257 140086cab-140086cc7 call 140061f10 call 1400ac0c8 4204->4257 4258 140086a61-140086a69 4204->4258 4208 140086c39-140086c40 4205->4208 4209 140086b71-140086bce call 140040730 call 140040ea0 4205->4209 4211 140086c0d-140086c38 call 1400a9aa0 4208->4211 4212 140086c42-140086c57 4208->4212 4209->4211 4235 140086bd0-140086be5 4209->4235 4217 140086c59-140086c6c 4212->4217 4218 140086bfc-140086c08 call 1400a9ac0 4212->4218 4225 140086c6e 4217->4225 4226 140086c76-140086c7b call 14008d6c8 4217->4226 4218->4211 4225->4218 4244 140086c7c-140086c98 call 140061f10 call 1400ac0c8 4226->4244 4232->4244 4285 1400867ce-1400867d6 4232->4285 4238 1400868dd-140086923 call 140040730 4233->4238 4239 140086925-140086928 4233->4239 4235->4218 4243 140086be7-140086bfa 4235->4243 4253 140086970-14008697f call 140040ea0 4238->4253 4241 14008692a-14008696b call 140040730 4239->4241 4242 140086980-14008698c call 140062b70 4239->4242 4241->4253 4242->4211 4243->4218 4243->4226 4275 140086c99-140086c9e call 14008d6c8 4244->4275 4253->4242 4276 140086cc8-140086ccd call 14008d6c8 4257->4276 4264 140086a6b-140086a7c 4258->4264 4265 140086a9c-140086ae1 call 1400aba10 * 2 4258->4265 4270 140086a7e-140086a91 4264->4270 4271 140086a97 call 1400a9ac0 4264->4271 4288 140086ae3-140086af5 4265->4288 4289 140086b15-140086b28 4265->4289 4270->4271 4270->4276 4271->4265 4293 140086c9f-140086ca4 call 14008d6c8 4275->4293 4292 140086cce-140086cd3 call 14008d6c8 4276->4292 4290 14008680a-140086850 call 1400aba10 * 2 4285->4290 4291 1400867d8-1400867ea 4285->4291 4294 140086b10 call 1400a9ac0 4288->4294 4295 140086af7-140086b0a 4288->4295 4296 140086b2a-140086b3c 4289->4296 4297 140086b5c-140086b62 4289->4297 4319 140086852-140086863 4290->4319 4320 140086883-140086895 4290->4320 4298 1400867ec-1400867ff 4291->4298 4299 140086805 call 1400a9ac0 4291->4299 4313 140086ca5-140086caa call 14008d6c8 4293->4313 4294->4289 4295->4292 4295->4294 4304 140086b3e-140086b51 4296->4304 4305 140086b57 call 1400a9ac0 4296->4305 4297->4205 4298->4275 4298->4299 4299->4290 4304->4305 4311 140086c70-140086c75 call 14008d6c8 4304->4311 4305->4297 4311->4226 4313->4257 4321 14008687e call 1400a9ac0 4319->4321 4322 140086865-140086878 4319->4322 4323 1400868c9-1400868cf 4320->4323 4324 140086897-1400868a9 4320->4324 4321->4320 4322->4293 4322->4321 4323->4233 4326 1400868ab-1400868be 4324->4326 4327 1400868c4 call 1400a9ac0 4324->4327 4326->4313 4326->4327 4327->4323
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: __std_exception_destroy
                                • String ID: value
                                • API String ID: 2453523683-494360628
                                • Opcode ID: c68d4a6b828674ebd30e640b10a4e041e06dd3b62625e36ac4d0aca646820baf
                                • Instruction ID: b99257adfc3fe72b1b6041d942e319ffdfc58320064849e92109cd12b73f12f2
                                • Opcode Fuzzy Hash: c68d4a6b828674ebd30e640b10a4e041e06dd3b62625e36ac4d0aca646820baf
                                • Instruction Fuzzy Hash: 39027973624B8085EB128B76D4803ED6B61F7997E4F505712FBAE47AEADB38C185C700

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 4329 1400741c2-1400741d4 4330 1400741d6-1400741e9 4329->4330 4331 1400741ef 4329->4331 4330->4331 4332 140074386-140074391 call 14008d6c8 * 2 4330->4332 4333 1400741f4-140074270 OpenMutexA CreateMutexA call 14006e7f0 call 140077820 4331->4333 4334 1400741ef call 1400a9ac0 4331->4334 4345 14007427e call 14007fea0 4333->4345 4334->4333
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Mutex$ExitProcess$CloseCreateHandleOpenRelease
                                • String ID:
                                • API String ID: 3764530316-0
                                • Opcode ID: ed203bbe7a3b5f6ba2814e7f41985e9ae73f5d3da5b4dcf2851137f9266e8f8f
                                • Instruction ID: 22f11d1c354d1f7b174d31a50776cdd913a8e9e41f50437a5bf1d421a946a578
                                • Opcode Fuzzy Hash: ed203bbe7a3b5f6ba2814e7f41985e9ae73f5d3da5b4dcf2851137f9266e8f8f
                                • Instruction Fuzzy Hash: 6F41587261468082FB23BBB7A4163EE6351AB8D7D0F504616FB9D476F7DF3C80818621

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseCreateFirstHandleProcess32SnapshotToolhelp32
                                • String ID: [PID:
                                • API String ID: 1083639309-2210602247
                                • Opcode ID: 8e2cc78d821f52278c3d3f1ca5f64536b894f3c531228aa5bba621e5ccd6e007
                                • Instruction ID: 5d3bc7e6dfecebdfb81ce67ed5f6956fd0d8b397b6bf51178baf79f45416ccdd
                                • Opcode Fuzzy Hash: 8e2cc78d821f52278c3d3f1ca5f64536b894f3c531228aa5bba621e5ccd6e007
                                • Instruction Fuzzy Hash: 55D19E72614BC485E722DB26E8803DE77A5F7897A8F405215FB9D07BA9DF38C295C700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: FileFindFirst
                                • String ID: exists$filename
                                • API String ID: 1974802433-1885285383
                                • Opcode ID: b8a0beca4176b1ee219cd2fb5d5a895bd2e7e79a50a2ccbee70c93dad6e26dbf
                                • Instruction ID: 44838852c42065e5f39bae23742f8b27a66f9a59eab9cab727125e9ab6ef78b1
                                • Opcode Fuzzy Hash: b8a0beca4176b1ee219cd2fb5d5a895bd2e7e79a50a2ccbee70c93dad6e26dbf
                                • Instruction Fuzzy Hash: 98126B72608BC091EB22DB26E4843DEB3A1F788784F405216EBCD57AB9DF78C585CB40
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: recv$Cleanupclosesocket
                                • String ID:
                                • API String ID: 146070474-0
                                • Opcode ID: 1cb9a2f55eb7a1731417e4445776eee7ddd9fd51caeb430b5848111ad9bfac1a
                                • Instruction ID: eafd79885a64c3900f7ebaffd470ce8fdc6633dcc422e553d72d048b7a611f0d
                                • Opcode Fuzzy Hash: 1cb9a2f55eb7a1731417e4445776eee7ddd9fd51caeb430b5848111ad9bfac1a
                                • Instruction Fuzzy Hash: 79125D73628BC481EA229B16E4557DE6761F79D7E0F504216EBAD07AEADF7CC480CB00
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: DevicesDisplayEnum
                                • String ID: Unknown
                                • API String ID: 2211661463-1654365787
                                • Opcode ID: fca632369ee69681a2b32a3e4548dee5403355752fe9dcd08d04aaff99b74c49
                                • Instruction ID: bbb997068cb540256a656c2fc009d0acae0144981094f0501ccaeb435a96cdff
                                • Opcode Fuzzy Hash: fca632369ee69681a2b32a3e4548dee5403355752fe9dcd08d04aaff99b74c49
                                • Instruction Fuzzy Hash: A981BD32614B8086E721CB26E84479EB7A4F38D798F505216FF9C17BA9DF38C681CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Find$CloseFileFirst
                                • String ID:
                                • API String ID: 2295610775-0
                                • Opcode ID: 9a0e95ab69f8159a906354e2783f7c5830f257cc63b6185482a565a61eb130ed
                                • Instruction ID: ce36eaeac4e670e3d58041e5e880f5e8d22444fe50a2deaf3fc620de6baa86f2
                                • Opcode Fuzzy Hash: 9a0e95ab69f8159a906354e2783f7c5830f257cc63b6185482a565a61eb130ed
                                • Instruction Fuzzy Hash: 88F03136608E4081E7618F62F54435E67A0EB49BF4F144720EBB907AF4CF3CC4958600
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: InformationTimeZone
                                • String ID: [UTC
                                • API String ID: 565725191-1715286942
                                • Opcode ID: 98e11476b0c777ae562bd46a586073a33b1208f1135127aa081ad98916ef7e09
                                • Instruction ID: 01def31b258f83afca55b74f31771e95d4d90b360f52a8c7f21c37d1040f0d04
                                • Opcode Fuzzy Hash: 98e11476b0c777ae562bd46a586073a33b1208f1135127aa081ad98916ef7e09
                                • Instruction Fuzzy Hash: 3A124C73A14BC489E7218B29E8413EAB7A1F79D798F505305EBDC17B6ADB78C290C740
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ExecuteFileModuleNameShell
                                • String ID:
                                • API String ID: 1703432166-0
                                • Opcode ID: 4bc819742f627918a76852a3de37d21f1e432943ccd738e95eaca3daa3bad49d
                                • Instruction ID: 2bd182f3932b21625a389bd3f9c8cb9026c7739f8b6ceac0e40a61b3b544c7b5
                                • Opcode Fuzzy Hash: 4bc819742f627918a76852a3de37d21f1e432943ccd738e95eaca3daa3bad49d
                                • Instruction Fuzzy Hash: E1122872625F848AEB418F6AE88179EB3A4F788798F505215FFDD57B68EB38C150C700
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2c3f375bfc3c15aaca6738b9ead632c23e42df0f19b1571c788b47da0df93ac6
                                • Instruction ID: 7e0b79708e65e831526dc6f468222ee565e1f18d83f40497b8b4492f92bd91ad
                                • Opcode Fuzzy Hash: 2c3f375bfc3c15aaca6738b9ead632c23e42df0f19b1571c788b47da0df93ac6
                                • Instruction Fuzzy Hash: 41917072B14B808AEB129F76E4403DD73A1E7997E8F044225FB9D17AE9DB78C190C740
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: FileFind$FirstNext
                                • String ID:
                                • API String ID: 1690352074-0
                                • Opcode ID: 34178aa8e584c8dd1f1bcb30cc2b0df6c354a42777d37007b9698f39ac034d8d
                                • Instruction ID: c14109958a45854f1f840c120e6bb5df09a5bf32fe794df2d22aa573b8094fa8
                                • Opcode Fuzzy Hash: 34178aa8e584c8dd1f1bcb30cc2b0df6c354a42777d37007b9698f39ac034d8d
                                • Instruction Fuzzy Hash: 43817172614BC481EA22AB16E4443EF7361F7997E4F405212EB9D17AFADF78C581C740
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CryptDataFreeLocalUnprotect
                                • String ID:
                                • API String ID: 1561624719-0
                                • Opcode ID: 7c7574550fc39d8b0a33bde6b28a20e688f0cf8f24e77118c322436bf9816072
                                • Instruction ID: 4eca3d6246eddbc7233f6218ad4025bd3c7ad5f366a7b9f67c01a1a686e41648
                                • Opcode Fuzzy Hash: 7c7574550fc39d8b0a33bde6b28a20e688f0cf8f24e77118c322436bf9816072
                                • Instruction Fuzzy Hash: 08414233614B80CAE3218F75E8403ED37A5F76978CF444629AB8C07E9ADB79C6A4D744
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: NameUser
                                • String ID:
                                • API String ID: 2645101109-0
                                • Opcode ID: 097d4afbc51c33a52bc174c303950bc4b260611d47ef42a1dd4c679be42102eb
                                • Instruction ID: ee9c7773de5d7cac2e4d2126503ca0947b2a3b4420a82c5690d358c501992b18
                                • Opcode Fuzzy Hash: 097d4afbc51c33a52bc174c303950bc4b260611d47ef42a1dd4c679be42102eb
                                • Instruction Fuzzy Hash: 89E0E572128A8487D6518B56F84039AF2B4FB9C784F404126B68C83A68DB7CC5558B00

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 723 140076770-1400767ab call 1400764f0 726 1400767ad-1400767bc EnterCriticalSection 723->726 727 1400767ec 723->727 728 140076810-14007682a LeaveCriticalSection GdipGetImageEncodersSize 726->728 729 1400767be-1400767e0 GdiplusStartup 726->729 730 1400767f1-14007680f call 1400a9aa0 727->730 728->727 733 14007682c-14007683f 728->733 729->728 731 1400767e2-1400767e6 LeaveCriticalSection 729->731 731->727 735 140076841-14007684a call 140076280 733->735 736 14007687b-140076889 call 1400940fc 733->736 743 140076878 735->743 744 14007684c-140076856 735->744 741 140076890-14007689a 736->741 742 14007688b-14007688e 736->742 745 14007689e 741->745 742->745 743->736 746 140076858 744->746 747 140076862-140076876 call 1400aa760 744->747 748 1400768a1-1400768a4 745->748 746->747 747->748 751 1400768a6-1400768ab 748->751 752 1400768b0-1400768be GdipGetImageEncoders 748->752 753 140076a1e-140076a21 751->753 754 1400768c4-1400768cd 752->754 755 140076a09-140076a0e 752->755 758 140076a44-140076a46 753->758 759 140076a23-140076a27 753->759 756 1400768ff 754->756 757 1400768cf-1400768dd 754->757 755->753 760 140076906-140076916 756->760 761 1400768e0-1400768eb 757->761 758->730 762 140076a30-140076a42 call 14008cab0 759->762 764 140076918-140076929 760->764 765 14007692f-14007694b 760->765 766 1400768f8-1400768fd 761->766 767 1400768ed-1400768f2 761->767 762->758 764->755 764->765 769 1400769b8-1400769f7 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 765->769 770 14007694d-1400769a6 GdipCreateBitmapFromScan0 GdipSaveImageToStream 765->770 766->756 766->761 767->766 771 1400769ad-1400769b1 767->771 774 140076a10-140076a1d GdipDisposeImage 769->774 775 1400769f9 769->775 772 1400769a8-1400769ab 770->772 773 1400769b6 770->773 771->760 776 1400769fc-140076a03 GdipDisposeImage 772->776 773->774 774->753 775->776 776->755
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Gdip$Image$CriticalSection$DisposeEncodersLeave$BitmapCreateEnterErrorFromGdiplusInitializeLastSaveScan0SizeStartupStream
                                • String ID: &
                                • API String ID: 1703174404-3042966939
                                • Opcode ID: 951e0ae561f49f8ac88204c669b87d90cef17986d283ce837e094d03a9b6b5bc
                                • Instruction ID: 4638b9f1ed191ead81af55374984443a6253b3e001763369ab5e9b0db0011ef1
                                • Opcode Fuzzy Hash: 951e0ae561f49f8ac88204c669b87d90cef17986d283ce837e094d03a9b6b5bc
                                • Instruction Fuzzy Hash: 84914932200B809AEB62DF32E8407D837A4F75DBD8F558215EB5A57BA4DF38C596C740

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3619 140077820-140077877 call 14007d440 3622 1400778bd-1400779a1 call 140052190 call 1400300a0 call 14003ec60 call 1400300a0 call 14003ec60 call 140040ea0 WSAStartup 3619->3622 3623 140077879-140077881 3619->3623 3637 140077a40 3622->3637 3656 1400779a7-1400779c7 socket 3622->3656 3624 140077885-14007788d 3623->3624 3626 140077892-1400778a2 3624->3626 3627 14007788f 3624->3627 3629 1400778b4-1400778bb 3626->3629 3630 1400778a4-1400778ae call 1400bd650 3626->3630 3627->3626 3629->3622 3629->3624 3630->3629 3630->3637 3639 140077a42-140077a4a 3637->3639 3641 140077a7d-140077ac1 call 1400a9aa0 3639->3641 3642 140077a4c-140077a5d 3639->3642 3643 140077a78 call 1400a9ac0 3642->3643 3644 140077a5f-140077a72 3642->3644 3643->3641 3644->3643 3647 140077bc4-140077bc9 call 14008d6c8 3644->3647 3655 140077bca-140077bcf call 14008d6c8 3647->3655 3658 140077a3a WSACleanup 3656->3658 3659 1400779c9-140077a27 htons inet_pton connect 3656->3659 3658->3637 3661 140077ac2-140077af3 call 140076a50 call 14003fa30 3659->3661 3662 140077a2d-140077a34 closesocket 3659->3662 3667 140077af5-140077b0b 3661->3667 3668 140077b2b-140077b48 call 140076a50 3661->3668 3662->3658 3670 140077b26 call 1400a9ac0 3667->3670 3671 140077b0d-140077b20 3667->3671 3672 140077b4d-140077b71 call 14003fa30 3668->3672 3670->3668 3671->3655 3671->3670 3676 140077b73-140077b89 3672->3676 3677 140077bad-140077bb9 3672->3677 3678 140077ba0-140077ba5 call 1400a9ac0 3676->3678 3679 140077b8b-140077b9e 3676->3679 3677->3639 3678->3677 3679->3678 3680 140077bbe-140077bc3 call 14008d6c8 3679->3680 3680->3647
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Info$CleanupStartupUserclosesocketconnecthtonsinet_ptonsocket
                                • String ID: geo$system
                                • API String ID: 213021568-2364779556
                                • Opcode ID: 8d373b034231c228b96861fcc9ebfa537825f0b970b577bdf6468f570e4dfbe5
                                • Instruction ID: 8e9467e575cce1f4fcad52bc0cce26140f8a2cb03e3f0a27ea38b4210fb68b06
                                • Opcode Fuzzy Hash: 8d373b034231c228b96861fcc9ebfa537825f0b970b577bdf6468f570e4dfbe5
                                • Instruction Fuzzy Hash: 44B16A72B11B4099FB02DBA6E4903DD3372A748BE8F415216EB5D2B6B9EB38C556C340

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3842 1400bc218-1400bc28b call 1400bbdf8 3845 1400bc28d-1400bc296 call 140091b4c 3842->3845 3846 1400bc2a5-1400bc2af call 1400a076c 3842->3846 3851 1400bc299-1400bc2a0 call 140091b6c 3845->3851 3852 1400bc2ca-1400bc333 CreateFileW 3846->3852 3853 1400bc2b1-1400bc2c8 call 140091b4c call 140091b6c 3846->3853 3868 1400bc5e7-1400bc607 3851->3868 3854 1400bc3b0-1400bc3bb GetFileType 3852->3854 3855 1400bc335-1400bc33b 3852->3855 3853->3851 3861 1400bc40e-1400bc415 3854->3861 3862 1400bc3bd-1400bc3f8 call 1400d0160 call 140091ae0 call 1400d0138 3854->3862 3858 1400bc37d-1400bc3ab call 1400d0160 call 140091ae0 3855->3858 3859 1400bc33d-1400bc341 3855->3859 3858->3851 3859->3858 3864 1400bc343-1400bc37b CreateFileW 3859->3864 3866 1400bc41d-1400bc420 3861->3866 3867 1400bc417-1400bc41b 3861->3867 3862->3851 3888 1400bc3fe-1400bc409 call 140091b6c 3862->3888 3864->3854 3864->3858 3872 1400bc426-1400bc47b call 1400a0684 3866->3872 3873 1400bc422 3866->3873 3867->3872 3882 1400bc49a-1400bc4cb call 1400bbb80 3872->3882 3883 1400bc47d-1400bc489 call 1400bc004 3872->3883 3873->3872 3892 1400bc4cd-1400bc4cf 3882->3892 3893 1400bc4d1-1400bc514 3882->3893 3883->3882 3894 1400bc48b 3883->3894 3888->3851 3896 1400bc48d-1400bc495 call 140098db8 3892->3896 3897 1400bc536-1400bc541 3893->3897 3898 1400bc516-1400bc51a 3893->3898 3894->3896 3896->3868 3901 1400bc547-1400bc54b 3897->3901 3902 1400bc5e5 3897->3902 3898->3897 3900 1400bc51c-1400bc531 3898->3900 3900->3897 3901->3902 3904 1400bc551-1400bc596 call 1400d0138 CreateFileW 3901->3904 3902->3868 3907 1400bc5cb-1400bc5e0 3904->3907 3908 1400bc598-1400bc5c6 call 1400d0160 call 140091ae0 call 1400a08ac 3904->3908 3907->3902 3908->3907
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                                • String ID:
                                • API String ID: 1330151763-0
                                • Opcode ID: 6834bf7e2c5a4e43a5153222154aa821744e12b776a4e5df19d1db0543b86cff
                                • Instruction ID: 2400ce5abb7f630c19717e6ed24876b630cbd6c53283576e13b355a578458c61
                                • Opcode Fuzzy Hash: 6834bf7e2c5a4e43a5153222154aa821744e12b776a4e5df19d1db0543b86cff
                                • Instruction Fuzzy Hash: 29C17B36720E4486EB11CFAAD4917ED3771E78DBE8F014219EB2A9B7A4DB34C556C340

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CriticalSectionStream_$CreateEnterLeaveResetSizeStream
                                • String ID:
                                • API String ID: 4049616757-0
                                • Opcode ID: 5dc24120e785eb29f64b142cd8c2596717f1cc5752594a7638550c55bf50ca70
                                • Instruction ID: 8f48f79f99b0ddf272cc4a0310095b26a985b38de2d5e8ea0f8d0273f223753d
                                • Opcode Fuzzy Hash: 5dc24120e785eb29f64b142cd8c2596717f1cc5752594a7638550c55bf50ca70
                                • Instruction Fuzzy Hash: 21411672618BC082E771DB22E8507EEB7A1F7D9BC0F409616DAC903A69DF38C185CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CriticalSection$EnterLeave$DeleteGdiplusObjectShutdown
                                • String ID:
                                • API String ID: 4268643673-0
                                • Opcode ID: c717c1590746bd134c452c2610cdd9752abb3b76a832bbf28ba4074ae47750e1
                                • Instruction ID: 8a8879636937726213d256da63e2acee3874314be20df8b71bbfc014c3c2afad
                                • Opcode Fuzzy Hash: c717c1590746bd134c452c2610cdd9752abb3b76a832bbf28ba4074ae47750e1
                                • Instruction Fuzzy Hash: 4911F532112B5081EB559F26F89439D73A4FB48FA8F684215EB6E076B4DF38C9A7C350
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: MetricsSystem$CapsDevice
                                • String ID:
                                • API String ID: 4163108049-0
                                • Opcode ID: e68d7784f5286227ca8d3d002e91ec8bd744f231bf3a64b9d78de067d8b2d0e9
                                • Instruction ID: 862d34932e08b8cdd9bd14d1c48b344ad35bdc1bb36e19364d3b3caeb063e474
                                • Opcode Fuzzy Hash: e68d7784f5286227ca8d3d002e91ec8bd744f231bf3a64b9d78de067d8b2d0e9
                                • Instruction Fuzzy Hash: 4201EC71104B8096F7559B62FC1575E76A0FB8CB81F005128EF4E83764EF7CD4158B50
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ExitFileInitializeModuleMutexNameOpenProcess
                                • String ID: SeDebugPrivilege$SeImpersonatePrivilege
                                • API String ID: 759366668-3768118664
                                • Opcode ID: d5ff05bd807f303e46bbce3e1e98e071d77aa07019e8c5c2d0fd7816cf6ef984
                                • Instruction ID: 0aa24146d124daaf3e6d47235ffe695d58ac11e237cac350d2ef1b7e6d15a562
                                • Opcode Fuzzy Hash: d5ff05bd807f303e46bbce3e1e98e071d77aa07019e8c5c2d0fd7816cf6ef984
                                • Instruction Fuzzy Hash: 2031E632118A8092EB61DB66E8513AAA3A1F7CD784F505115FBCD57A6AEF3CC645CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: DeleteObject$ReadReleaseSelectStream_
                                • String ID:
                                • API String ID: 488014220-0
                                • Opcode ID: 57ae21b67ee105af44748b82d6fdee545466df1a1b4b26dc14463a58ecaaeed1
                                • Instruction ID: a62969d775b6c4a6415178e0c1f1a75b196126bb9704c55781b261fc1e9b17e7
                                • Opcode Fuzzy Hash: 57ae21b67ee105af44748b82d6fdee545466df1a1b4b26dc14463a58ecaaeed1
                                • Instruction Fuzzy Hash: 9F313472314AC091EA66EB66F4553DEA320FB9DBC0F808412AB8D4376ADF7CC585C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CriticalSection$DeleteObject$EnterLeave$GdiplusReadReleaseSelectShutdownStream_
                                • String ID:
                                • API String ID: 1889838399-0
                                • Opcode ID: 8777f0beb4d05f33ff6a15e9213634fb09ae41cd1ad8cc7d761a6b82a5e62fda
                                • Instruction ID: 7ff2694a6e05a237bced5338d83f9a8bece83d988efe143993548f991b2c9041
                                • Opcode Fuzzy Hash: 8777f0beb4d05f33ff6a15e9213634fb09ae41cd1ad8cc7d761a6b82a5e62fda
                                • Instruction Fuzzy Hash: 0421F176314A8091EA66EB22F4553DEA320FB9DBD0F814412EB9E43769DF78C586C701
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: InformationValueVolume
                                • String ID: ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                • API String ID: 2783453754-1787575317
                                • Opcode ID: 61eb3a4e5de2ae1a25ed943f7144b4b3cfe9f40427e2b9bf0f3144c60447432d
                                • Instruction ID: 88dc9f771203b694cd3d13feb9ad3f139ceefda5c28e6ce7ba6092f95be77687
                                • Opcode Fuzzy Hash: 61eb3a4e5de2ae1a25ed943f7144b4b3cfe9f40427e2b9bf0f3144c60447432d
                                • Instruction Fuzzy Hash: C9718C32A14B8086E722CF65E8403DE73B4F799798F504216EB9C47BA9DF78C195CB40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: FileFindNext
                                • String ID: content$filename
                                • API String ID: 2029273394-474635906
                                • Opcode ID: e001275cd896e19506121bc5a2a6a67948ac1ca69cccdf659754d35a8bc369de
                                • Instruction ID: 2f2d50cd3728b85bf7dd22654c55f107d1b04f598cd325f08c31715323a8fb03
                                • Opcode Fuzzy Hash: e001275cd896e19506121bc5a2a6a67948ac1ca69cccdf659754d35a8bc369de
                                • Instruction Fuzzy Hash: 0261E832219AC490DA72DB12E4903DEB761F7D9780F849226E7CD53AAAEF38C555CB00
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ObjectSelect
                                • String ID:
                                • API String ID: 1517587568-3916222277
                                • Opcode ID: ae470c4c689f869b9ab573fe5ecf667d94663e1bc2e54309d240cb862a971590
                                • Instruction ID: b22fa59723fd1880f90d16039e653bbf5a6977db0982e8f6c44c24a0e5185140
                                • Opcode Fuzzy Hash: ae470c4c689f869b9ab573fe5ecf667d94663e1bc2e54309d240cb862a971590
                                • Instruction Fuzzy Hash: AFE04E72219B908AD7908F16B85470ABAA5F789BC0F205119AB8E93B28DB39C4558F00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Cleanupclosesocketrecv
                                • String ID:
                                • API String ID: 3447645871-0
                                • Opcode ID: c5f29a6f82e4cda5efd12a128531453d2ae7e63ca47262aae0ccc1e1a6d6ada8
                                • Instruction ID: eab709b2a91d71219dc338bdc8a0427637c2479730885535d0f181a11fd59591
                                • Opcode Fuzzy Hash: c5f29a6f82e4cda5efd12a128531453d2ae7e63ca47262aae0ccc1e1a6d6ada8
                                • Instruction Fuzzy Hash: 4D917CB3A14BC481EA228B66E4447DE6761E7997E0F504316EBAD17AEADF7CC480C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseOpenQueryValue
                                • String ID:
                                • API String ID: 3677997916-0
                                • Opcode ID: e58749c6b6c2708cbfda7cfb4cc2637eede89c8ea2e7d3504e5119be13154f8c
                                • Instruction ID: 79318ae5e1e9b6a209de70f72b35aa06e6b3a03820578b3efb8ee19dd5229adb
                                • Opcode Fuzzy Hash: e58749c6b6c2708cbfda7cfb4cc2637eede89c8ea2e7d3504e5119be13154f8c
                                • Instruction Fuzzy Hash: C831D172715B8491EA62CB26E4403AEA760FBDD7D4F505212FB8D47AB9EE3CD184CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Info$User
                                • String ID:
                                • API String ID: 2017065092-0
                                • Opcode ID: dabddd6c895e2f52a57a7818505f9d76ff45043fc459ccda3d8ac0e690d592da
                                • Instruction ID: 90fee48f990a536c98e20aba751c2c9c04ba674589e67a0b677829bb88304ab3
                                • Opcode Fuzzy Hash: dabddd6c895e2f52a57a7818505f9d76ff45043fc459ccda3d8ac0e690d592da
                                • Instruction Fuzzy Hash: A211C17261478183E7118F62F42475EB7A1FB84FC8F045225EB8903B69DF7CD4908B84
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Process$CurrentExitTerminate
                                • String ID:
                                • API String ID: 1703294689-0
                                • Opcode ID: c5e04496f828e61d634400119f310d7078e9af1bf9ca9274a76f0b4b113410d8
                                • Instruction ID: f9243dcb0947786e921359f981b604d51b7b47a816461f64490f77957be4224f
                                • Opcode Fuzzy Hash: c5e04496f828e61d634400119f310d7078e9af1bf9ca9274a76f0b4b113410d8
                                • Instruction Fuzzy Hash: 66D09E3430170846FA5A6B736C957ED22255F5C7C1F04192C6B47073B3CD3D888E8610
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID: f[
                                • API String ID: 118556049-724553921
                                • Opcode ID: e5f5bb6a157773786e9b19aa042917afd84d7026ba84b73920649958b0237af2
                                • Instruction ID: f43eb5f637751f4d7f3230c33235fa76f5fd370338e37ecf82f5159868a21eea
                                • Opcode Fuzzy Hash: e5f5bb6a157773786e9b19aa042917afd84d7026ba84b73920649958b0237af2
                                • Instruction Fuzzy Hash: CAA1D233B04B8486FB229F6AD5003ED73B1BB59BD9F144611EF9927AA5DB34C6918340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID:
                                • API String ID: 118556049-3916222277
                                • Opcode ID: d1a363919dd19d68adbaa1824478dd39cb0e0911c99aa75ce560a6b8aa69075f
                                • Instruction ID: a981a205836d7b9725245c82c35ce7c20dd13c8e2bec3eb01c485d5cb054b2d7
                                • Opcode Fuzzy Hash: d1a363919dd19d68adbaa1824478dd39cb0e0911c99aa75ce560a6b8aa69075f
                                • Instruction Fuzzy Hash: 52513472304B4496EB168F2AD5943AE37A0F748BD4F984622EF5E47BA0CF78D5A1D300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID: cannot use operator[] with a numeric argument with
                                • API String ID: 118556049-485864652
                                • Opcode ID: 79804f4a44a177bf13a4b8f88762019dc26778b0f8d53fd89d330793441b4ef7
                                • Instruction ID: 5ed39cd970f3da3471a7114cda8519d5d7bf48897c2ee1ddb565b91127a7abb1
                                • Opcode Fuzzy Hash: 79804f4a44a177bf13a4b8f88762019dc26778b0f8d53fd89d330793441b4ef7
                                • Instruction Fuzzy Hash: C731D272319B8085EE12AB27B5443DC6396E708BE5F590635FF6D0BBE6DA38C481C304
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 75dacb89e764ecf40af59fcee7c22e2fbf6e8ba84ae5c27b2747cb5a966399e9
                                • Instruction ID: 8be8243372e4bb7338c400875aec30a5fe64968161bb492a5739d17ce4fc8c58
                                • Opcode Fuzzy Hash: 75dacb89e764ecf40af59fcee7c22e2fbf6e8ba84ae5c27b2747cb5a966399e9
                                • Instruction Fuzzy Hash: 40217C3362064481EE56EB16E895BE93361F79ABD4F944216FB1A473F2EA39C259C300
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseOpen
                                • String ID:
                                • API String ID: 47109696-0
                                • Opcode ID: 7ec879cfecc611e1203277112fd56f06e17ca4e10c092f3590478b68c26c49ef
                                • Instruction ID: ec14ba0587e031e24ade476592ff76ecaadcb2d768a7e792e5b1a87d2e94dd26
                                • Opcode Fuzzy Hash: 7ec879cfecc611e1203277112fd56f06e17ca4e10c092f3590478b68c26c49ef
                                • Instruction Fuzzy Hash: 35219F72711A8046FA51AB23E8503DAA360EB9DBD4F585121FB4D43BA9DE7CC481C780
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseCreateCredEnumerateFirstHandleMutexProcess32ReleaseSnapshotToolhelp32recv
                                • String ID:
                                • API String ID: 420082584-0
                                • Opcode ID: 1e475a0fd37e72c571760871dcb9f9096f5c0b73a05df945e32f443ddcc6d7f4
                                • Instruction ID: 7b9fc5bf202d6c660958987423c1e07503b58d6b0919fc9b46d6a515e610c1ca
                                • Opcode Fuzzy Hash: 1e475a0fd37e72c571760871dcb9f9096f5c0b73a05df945e32f443ddcc6d7f4
                                • Instruction Fuzzy Hash: 96215871A5468081FB23BBB7A4163EE6351AF8E7D0F445612FB99476F7DF3C80818622
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseHandleMutexReleaserecv
                                • String ID:
                                • API String ID: 2659716615-0
                                • Opcode ID: 688f010fb93d99a7170d6fa059f594efe689c9c1b67f65fa2a329f1f928e5df2
                                • Instruction ID: 6f94cae61cdad2189cef370b3ba5221df8fa11a5c37ea0c6658456750868d446
                                • Opcode Fuzzy Hash: 688f010fb93d99a7170d6fa059f594efe689c9c1b67f65fa2a329f1f928e5df2
                                • Instruction Fuzzy Hash: 14111871A1468181FB637B77A4063EE5250AB8E7D0F445611FB99476F7DF3CC1818611
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ErrorFileLastPointer
                                • String ID:
                                • API String ID: 2976181284-0
                                • Opcode ID: 74fd80307102959cdb4bb45340283f0b27aee8fd65d2f6709d6669cbca38fe3f
                                • Instruction ID: e816577ed0fe5e9188ac3a7553593d5145fada9baf7cdf4296f147d26e6d8956
                                • Opcode Fuzzy Hash: 74fd80307102959cdb4bb45340283f0b27aee8fd65d2f6709d6669cbca38fe3f
                                • Instruction Fuzzy Hash: EE119E72314B8081EA518B26AA4439EA761E789FF4F544315FFB94B7F9CF78C0558740
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Cred$EnumerateFree
                                • String ID:
                                • API String ID: 3403564193-0
                                • Opcode ID: 68933ec41ec7f767c84b5bba2a9ee996cddad3a9583237b16e79ba386fb61ddd
                                • Instruction ID: d146230a8e0ec21177f2b18e980c1da24b7c74670fa70e30d45436cd69ac1e72
                                • Opcode Fuzzy Hash: 68933ec41ec7f767c84b5bba2a9ee996cddad3a9583237b16e79ba386fb61ddd
                                • Instruction Fuzzy Hash: 3A11FA32251A809AE736DF22EC45BDA7368F74C788F454016EF5D07A24CF39C696CB40
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseHandleMutexRelease
                                • String ID:
                                • API String ID: 4207627910-0
                                • Opcode ID: 96d4f6a17b3e9df86ae38d560ee459ed41c223e123a4abdd348c551b97df98bf
                                • Instruction ID: 4df68b0ff96a1f532fb189d16ae1a04ce7a62c23901e90ecebd86e927d313f56
                                • Opcode Fuzzy Hash: 96d4f6a17b3e9df86ae38d560ee459ed41c223e123a4abdd348c551b97df98bf
                                • Instruction Fuzzy Hash: 6F017172B0068182FB62AB76B4053DD5250AB9D7E0F485311FBAD476F6DF3CC181C610
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseHandleInformationToken
                                • String ID:
                                • API String ID: 3954737543-0
                                • Opcode ID: c3f0b768841955a9a3d9e25d8efd8a2e2e52dcd02db8f9ea780a401ca5bec332
                                • Instruction ID: 74872fa6a3f98f0711c3ec8ca7f9c4563ae7453ee37c46518121393bc82f552f
                                • Opcode Fuzzy Hash: c3f0b768841955a9a3d9e25d8efd8a2e2e52dcd02db8f9ea780a401ca5bec332
                                • Instruction Fuzzy Hash: 8CF0EC71715A4086EA519B16F84079AA760F78DBC0F885122BB9E97BB8DF3CC441CB40
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                • String ID:
                                • API String ID: 1173176844-0
                                • Opcode ID: 6ffe177f5157f79d277372c6ea1b39799971d2e5a1b5546f7eb344a9914ef09c
                                • Instruction ID: 04523a235a29f71bc6c7b1a626fb6df20e7af0258fe547a34f32961bfb1e0df3
                                • Opcode Fuzzy Hash: 6ffe177f5157f79d277372c6ea1b39799971d2e5a1b5546f7eb344a9914ef09c
                                • Instruction Fuzzy Hash: 14E0177072150945FE2B22F318163E400801F6D3F0E2C1B207B750B2F3BE3488D58A20
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ErrorFreeHeapLast
                                • String ID:
                                • API String ID: 485612231-0
                                • Opcode ID: 1eb1d4d919d340514f52b5ee7c14653ab2b68de4ee8aa6cf9f2209b3c6d7e0a2
                                • Instruction ID: b52fa26c04212aab859c5ae896bd543063644a9c8dd7e940ebd072c94055b3ed
                                • Opcode Fuzzy Hash: 1eb1d4d919d340514f52b5ee7c14653ab2b68de4ee8aa6cf9f2209b3c6d7e0a2
                                • Instruction Fuzzy Hash: D8E02BB4B0220142FF1B63F3A8983FD12815F9C7C0F040420BF0983372EE3888814714
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID:
                                • API String ID: 118556049-0
                                • Opcode ID: 87a6127ac30b23622a38d36947904b79f4457d1bf17aa16409fec1a630396561
                                • Instruction ID: da5433d3288cf5a0a526c1d61247c75615e0e3a88a26d8c87c4e36aa5818ab75
                                • Opcode Fuzzy Hash: 87a6127ac30b23622a38d36947904b79f4457d1bf17aa16409fec1a630396561
                                • Instruction Fuzzy Hash: 23619A73301A9084EA269F1BD1583AE27A1F749FD8F548611EF6D0B7E5DE39CA86D300
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: FileFindNext
                                • String ID:
                                • API String ID: 2029273394-0
                                • Opcode ID: 5b05c260e62101b68e43d7db914f54a747e8c0ec7b32a054b920aaf09dea4265
                                • Instruction ID: e649bfc8535035589324032d23b6a7e11e4b803acda3a1057fe361eba0c7eb52
                                • Opcode Fuzzy Hash: 5b05c260e62101b68e43d7db914f54a747e8c0ec7b32a054b920aaf09dea4265
                                • Instruction Fuzzy Hash: DB716F72714BC080EA26EB66E4883DE6361E799BE5F504216EB9D07AF9DF78C481C740
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task
                                • String ID:
                                • API String ID: 118556049-0
                                • Opcode ID: 816848171f501418f89c1fc00c7346ea8877edef7841e76b7dc2ad7f2b5f6794
                                • Instruction ID: 88a164151cc8353faf59e75a2abb20e029c8a58e390f0121c60b982c8f58206e
                                • Opcode Fuzzy Hash: 816848171f501418f89c1fc00c7346ea8877edef7841e76b7dc2ad7f2b5f6794
                                • Instruction Fuzzy Hash: 5041BE72315B8481EA12AF53A5443DD6366F70DBE5F580626EFAD0B7A6DF38C8518304
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: FileFindNext
                                • String ID:
                                • API String ID: 2029273394-0
                                • Opcode ID: 25dec867869f5d8b4563aea71eca131ee73c39c25ea8bd32bbf7eec9477723c7
                                • Instruction ID: ff858e403f5257532e0e445b19357b2154aaa18ba36673eb4bea4b4fa6f79fd6
                                • Opcode Fuzzy Hash: 25dec867869f5d8b4563aea71eca131ee73c39c25ea8bd32bbf7eec9477723c7
                                • Instruction Fuzzy Hash: 92416172314AC080EB66EB26E4583DE6361E798BD9F540216EB9D07AB9DF79C8C1C740
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 3bf68b98c4e4d5055eca90d70818410e9c6b64531da33e3d6cbcec56e46eb5a9
                                • Instruction ID: e8858ff0fec7026d46d52c93e3e982fb4afd14998ecd62c25ef9218b9df49fb2
                                • Opcode Fuzzy Hash: 3bf68b98c4e4d5055eca90d70818410e9c6b64531da33e3d6cbcec56e46eb5a9
                                • Instruction Fuzzy Hash: 5141B83220060497EA769F6FE5803EA77A0E79ABD0F140205FB9A877F1CB38D442C750
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 90cf54d8b55000f68581a76b622efabc5ffabb5784a99202e54d6246ecb7575a
                                • Instruction ID: b9f7c3d18e9fc718e9f68750a2dc55bbda92819f1f2dc940bfb1a0fb0abbe0fe
                                • Opcode Fuzzy Hash: 90cf54d8b55000f68581a76b622efabc5ffabb5784a99202e54d6246ecb7575a
                                • Instruction Fuzzy Hash: CF31BE72315B4095EE26AB53E5003EDA362E74CBD1F594632FB5D0BBE6EA38C091C348
                                APIs
                                • Concurrency::cancel_current_task.LIBCPMT ref: 000000014003FDD8
                                  • Part of subcall function 000000014002B510: __std_exception_copy.LIBVCRUNTIME ref: 000000014002B558
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task__std_exception_copy
                                • String ID:
                                • API String ID: 317858897-0
                                • Opcode ID: d94b9a2a69c268f486b851b87e23473635957be695ff32d0151c61d1f870f8fb
                                • Instruction ID: 97e6037b4797a068ef0178edcbe608246ecf14e62a64900bd4ebe1e7e1eb7f9f
                                • Opcode Fuzzy Hash: d94b9a2a69c268f486b851b87e23473635957be695ff32d0151c61d1f870f8fb
                                • Instruction Fuzzy Hash: 2321D232711B4441EE1BAB56A5043FA2391EB58BE4F244721EB7C07BE2EB78C9D29300
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: c89b410e1389cb82359957a1d11d0eb726d726846ac3ab4cc0b188c027a385d4
                                • Instruction ID: 8c05ef98f207ced81cdebc3070fd8dbcc834d1fcd774f14c22416a124c273843
                                • Opcode Fuzzy Hash: c89b410e1389cb82359957a1d11d0eb726d726846ac3ab4cc0b188c027a385d4
                                • Instruction Fuzzy Hash: E3318DB221060086E753AF57C8413ED7A61A79DFE5F924209FB290B3F2DB78C485C765
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: HandleModule$AddressFreeLibraryProc
                                • String ID:
                                • API String ID: 3947729631-0
                                • Opcode ID: 6f470f8dda504ea2c6696702d6c6df831c5a7e6bb14415fde04cade51a1e4a45
                                • Instruction ID: f99bd018723e0a5e74f5149f53b0b551624bc39cb2b7f44deffbf3c3ea7ec64b
                                • Opcode Fuzzy Hash: 6f470f8dda504ea2c6696702d6c6df831c5a7e6bb14415fde04cade51a1e4a45
                                • Instruction Fuzzy Hash: 97219A32A00B848AEB268F69C4503EC37B0F709798F24462AE72847AE5DB34C584CB40
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: f7592383a6c98d4fba61f7e3dde42e88bd2e4ab2cac1154d67cb9460cc1e3cec
                                • Instruction ID: fc355d5895d30ffd1540380ba59b71e238b03132919f1238a9496d9e0c5d9a9e
                                • Opcode Fuzzy Hash: f7592383a6c98d4fba61f7e3dde42e88bd2e4ab2cac1154d67cb9460cc1e3cec
                                • Instruction Fuzzy Hash: B1118132214A4081EA62AF9394113EEA3B1BB9DBC0F544021FF8897BA7EB7DC5414B44
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 0aa9ebfc6785f24b4eccfcde9967f66bba0269257cf9e3546546d224156ecbb2
                                • Instruction ID: 13e69ae66ec78af3e9e7ce95c97f7042131b8b179f5c5ad25fbf63c8b5fe202d
                                • Opcode Fuzzy Hash: 0aa9ebfc6785f24b4eccfcde9967f66bba0269257cf9e3546546d224156ecbb2
                                • Instruction Fuzzy Hash: 1E219332614A4087DB629F5AE4807A977B0F788BD4F644324FB5A876F9DB79C940CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: send
                                • String ID:
                                • API String ID: 2809346765-0
                                • Opcode ID: 6b025b54e0dcc84b3c2947f32e0b7f6b98a3280ab38bb9e29cf354069e188991
                                • Instruction ID: 72c448f64851b44ef0d47f291fbcb967c8de0864198b92fcea4cfbeab45c03dd
                                • Opcode Fuzzy Hash: 6b025b54e0dcc84b3c2947f32e0b7f6b98a3280ab38bb9e29cf354069e188991
                                • Instruction Fuzzy Hash: 97016D32715A8481EB618F1BB94075AA7A0F78CFD4F585135EF9D43B58EA38C8518740
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: FileFindNext
                                • String ID:
                                • API String ID: 2029273394-0
                                • Opcode ID: 48936a933d113bbb92917aa3fa45ad3eacbb0eca927ca955dd0d4c339e2a851b
                                • Instruction ID: 46c86765a48e0a4325b0ce012d2570db63820add8cc189426e9b10953f9b7d6b
                                • Opcode Fuzzy Hash: 48936a933d113bbb92917aa3fa45ad3eacbb0eca927ca955dd0d4c339e2a851b
                                • Instruction Fuzzy Hash: DB01FF36208A8085EA72DB56F85439B7364F78CBD5F904122DF8D53B69DE39C886CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 986c70b0d44c87641fd7a2bafc8596790e971a1da67f8b9ca5557413f7120d21
                                • Instruction ID: 850c00b336af4423b93af6fe604bf7543ad1d172a4ae1adb93c9bb4fdbaa00ec
                                • Opcode Fuzzy Hash: 986c70b0d44c87641fd7a2bafc8596790e971a1da67f8b9ca5557413f7120d21
                                • Instruction Fuzzy Hash: D2E0D83262564585EF266B7AE1817ED7260BB4C7F0F148322B734036E6DF3485644611
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: InfoNativeSystem
                                • String ID:
                                • API String ID: 1721193555-0
                                • Opcode ID: ebdd672c62679ada28959d0ce90671b441c0e42cbdf7fd0cd8041d2b6a409d03
                                • Instruction ID: c1f8abdfa3c11aa9de56e1ee108be8b74f057e80f86e55c58f9080c7b4b0d2de
                                • Opcode Fuzzy Hash: ebdd672c62679ada28959d0ce90671b441c0e42cbdf7fd0cd8041d2b6a409d03
                                • Instruction Fuzzy Hash: 4EB09276A148C0C3C652EB08F84274A7331FB98B08FD00014E38D43624CE2DCA2A8E10
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: AllocHeap
                                • String ID:
                                • API String ID: 4292702814-0
                                • Opcode ID: 2a123d78f4d769f4acf099b182ff40896aa8a4043ec30c81b9c6a49c6a9f5ef5
                                • Instruction ID: d17b2792fcd96ab1b0cd15c98c0f9a64d373f884e408e1771f1ce4653c2ec12c
                                • Opcode Fuzzy Hash: 2a123d78f4d769f4acf099b182ff40896aa8a4043ec30c81b9c6a49c6a9f5ef5
                                • Instruction Fuzzy Hash: 9AF01C3470160045FE5766B36A917F921809BDCBF1F494724BF3A872E1DA3CD4828610
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseHandle
                                • String ID:
                                • API String ID: 2962429428-0
                                • Opcode ID: 171124b5f2ab3818db07a67a82fa4cbd7873982a8377bdffdc18fb1eaf286f32
                                • Instruction ID: 25c2ae09cf3b6add8cf4f3f494b0dac0374b649d0839acd98eae18855a5efc49
                                • Opcode Fuzzy Hash: 171124b5f2ab3818db07a67a82fa4cbd7873982a8377bdffdc18fb1eaf286f32
                                • Instruction Fuzzy Hash: C4E08676700910C5E612D723E4157AD6394F78CFE0F8A9032BF4D43764DE38C9428B40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: AddressProc$wcslen$CurrentPathProcessTempstrlen$LibraryLoadProtectVirtualmemcpy
                                • String ID: &*$1-+!_xQR$:a.dll$?$Execute$LdrLoadDll$_xQR$a.dll$basic_string: construction from null is not valid$basic_string::append
                                • API String ID: 61348399-1617610566
                                • Opcode ID: 51c0a02d63bd9bdf2016c2d86cded10179b683d98fef58156d81671ca565a833
                                • Instruction ID: b9940081c9c20639c0dd62f0b5a129a4944a5830d780a28c626667d94e147d85
                                • Opcode Fuzzy Hash: 51c0a02d63bd9bdf2016c2d86cded10179b683d98fef58156d81671ca565a833
                                • Instruction Fuzzy Hash: CFF1B06260DB8685EB20EB15E4403AAF361FB88B90FC44136DAAE07BD8DF3CD545D794
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: String$Free$Byte$AllocInitialize$BlanketCreateInstanceProxySecurity
                                • String ID: @
                                • API String ID: 2330523681-2766056989
                                • Opcode ID: 1d478104f55c7b006d47e052fea2f947d3b522c4ed9422ebf2c87dd507e26293
                                • Instruction ID: 13c4367a43189977c099a5a69ece56d153c1723905f586f1ec0b8e4762b49491
                                • Opcode Fuzzy Hash: 1d478104f55c7b006d47e052fea2f947d3b522c4ed9422ebf2c87dd507e26293
                                • Instruction Fuzzy Hash: 5CE19C32B14B808AF7128B7AE8143ED7362F78DBD8F105616EF5D57AA9DB38C1858344
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: AcquireExclusiveExecuteLockShell
                                • String ID: .exe$.exe$abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789+=-&^%$#@!(){}[},.;'$ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$open$runas
                                • API String ID: 1402300192-2441601502
                                • Opcode ID: 1b99f628628dd67c428087690097429bc331ca29790503331c7bd98e4d147edb
                                • Instruction ID: 642fec826a1e3fd6779540e5d4449cad4a9ba132e9692004461db3030459b409
                                • Opcode Fuzzy Hash: 1b99f628628dd67c428087690097429bc331ca29790503331c7bd98e4d147edb
                                • Instruction Fuzzy Hash: 7B229C72610B8089EB01DF6AE8843DD77A1F7887A8F505226FB9D07AB9DF78C585C740
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: $P$P
                                • API String ID: 2221118986-3733749394
                                • Opcode ID: 6c4975efa101d25bce8fb2713dfa8b24bac3f22bc36ad2dce6f035114948cbbe
                                • Instruction ID: 1897b648ad8e4b90b7c95d77dff712cde9fdbaed3d0ab68b57e032197f0eaa6e
                                • Opcode Fuzzy Hash: 6c4975efa101d25bce8fb2713dfa8b24bac3f22bc36ad2dce6f035114948cbbe
                                • Instruction Fuzzy Hash: B912E332A0C2868AE760EF24E4407BEF394FB84345F914135DA59477CADF7CE444ABA5
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: HandleQuery$CloseInformationSystem$CurrentFinalNameObjectPathProcess
                                • String ID: File
                                • API String ID: 617584216-749574446
                                • Opcode ID: 42d9fc94595e79f5ac32f4e092be85b83e99424789b1bb33c4abce0304e0a1f6
                                • Instruction ID: b37cfe2615e03cacd60327910fb70d6e916f7ee7200f6fe390350feb51e704f5
                                • Opcode Fuzzy Hash: 42d9fc94595e79f5ac32f4e092be85b83e99424789b1bb33c4abce0304e0a1f6
                                • Instruction Fuzzy Hash: A7C19073711A809AFB01DBA6D4543EC2361FB89BD8F408621EF5D2BBA9DB34C685D344
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CloseFileHandle$CreateWritemallocmemcpywcslen
                                • String ID: basic_string::append
                                • API String ID: 3391094610-3811946249
                                • Opcode ID: 3bb7ded17062e4b397386a719e14fc132e9bd4a9d4ca7b8669ef49969fe5b065
                                • Instruction ID: 13fafe0c85fc577e2bcc353d531bdd77e51124a132622993ba8042f3659da477
                                • Opcode Fuzzy Hash: 3bb7ded17062e4b397386a719e14fc132e9bd4a9d4ca7b8669ef49969fe5b065
                                • Instruction Fuzzy Hash: FC028F6260DB8585EB20EB15E4047AAF361FB84BA1F808235DAAD47BD8DF3CD444E794
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ErrorLastNameTranslate$CodePageValidValue
                                • String ID: utf8
                                • API String ID: 1791977518-905460609
                                • Opcode ID: 5d2d2426c5a5194a24175210fd8136765016d2f1f96d66db4b316bbcbea0d38c
                                • Instruction ID: 5cfce204ad3e52d521be1c37c867fcafba9ba4ef485f8ee24296846217238e8d
                                • Opcode Fuzzy Hash: 5d2d2426c5a5194a24175210fd8136765016d2f1f96d66db4b316bbcbea0d38c
                                • Instruction Fuzzy Hash: 01918C3260078087EB669F23E4417ED63A5E7ACBC0F448221FB59477E6DB39C992CB01
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                                • String ID:
                                • API String ID: 2591520935-0
                                • Opcode ID: dc923a5d096c57da2041771729e7932b82461942625d63c848e344da9d183a2f
                                • Instruction ID: 16d93509c95003d09cb5a81faf5c145d79ac997122476c855c64cffa21997edd
                                • Opcode Fuzzy Hash: dc923a5d096c57da2041771729e7932b82461942625d63c848e344da9d183a2f
                                • Instruction Fuzzy Hash: 1B719D3A7007408AFB129F62E4517EE33A4BB9CBC4F444225EF5953AA5EB38C495CB50
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: __std_exception_destroy
                                • String ID: value
                                • API String ID: 2453523683-494360628
                                • Opcode ID: a7f46672d4bf2cac2b26be635648abda59a65d6f39e2258eca14e481c828b07c
                                • Instruction ID: a0ee57199ec3ce90a2ea8f43caeda29c8c906ea7494d2c7ab5bc718b9e9dd556
                                • Opcode Fuzzy Hash: a7f46672d4bf2cac2b26be635648abda59a65d6f39e2258eca14e481c828b07c
                                • Instruction Fuzzy Hash: DF028D32624BC085EB12CB76D8403ED6761E7997E4F605712FB9E17AEADB78C185C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: malloc$ExceptionFilterUnhandled_inittermmemcpystrlen
                                • String ID:
                                • API String ID: 1260285541-0
                                • Opcode ID: 4903dc9185d39246619b425608e0136eb5eeb636e7dc1dfbaabc0c8552b91fbc
                                • Instruction ID: db3dbe6c21bd728c5c2e8ee5ecdc034446aa02759ee45e70cfd6d27797d55ed9
                                • Opcode Fuzzy Hash: 4903dc9185d39246619b425608e0136eb5eeb636e7dc1dfbaabc0c8552b91fbc
                                • Instruction Fuzzy Hash: 72517D35A0DA4699FB61FF15E890379E3A4AF40B92FC45035DA2D473E1DF2CE401A7A8
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                • String ID:
                                • API String ID: 1239891234-0
                                • Opcode ID: 62484be6782a1868f2aab5373510e50ea99112a482b5237f41028b796158fad6
                                • Instruction ID: ec7dd7c93c2cafcbf5452b660a6186fd6c71989d302a7769adecfa476ec907f4
                                • Opcode Fuzzy Hash: 62484be6782a1868f2aab5373510e50ea99112a482b5237f41028b796158fad6
                                • Instruction Fuzzy Hash: 73313F36214F8086EB61DF66E8443EE73A4F789794F540226EB9D43BA9DF38C555CB00
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: $!$P
                                • API String ID: 0-2344582389
                                • Opcode ID: e65736c1dc54ff8f8e83bf8e017ecec5d9c8dafb1b82336238fa23b941b4cde6
                                • Instruction ID: c5179618e135e483231e3357bf462fa4a19026bb5eb10805db97cbaf2a42fe47
                                • Opcode Fuzzy Hash: e65736c1dc54ff8f8e83bf8e017ecec5d9c8dafb1b82336238fa23b941b4cde6
                                • Instruction Fuzzy Hash: DBF1D03290C78986E774EF10D0843BEF7A1EB84345F818139D66953AC9DF7CE444ABA4
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: memcpy_s
                                • String ID:
                                • API String ID: 1502251526-3916222277
                                • Opcode ID: 1b748593274e8ddd9ac1e908b2a22b3d8043b10f383cd2471e7c6bd1e5b959b4
                                • Instruction ID: 0c772acccd2561090ae59935be1b1d13ce4e89495d086943b039690d891e3a67
                                • Opcode Fuzzy Hash: 1b748593274e8ddd9ac1e908b2a22b3d8043b10f383cd2471e7c6bd1e5b959b4
                                • Instruction Fuzzy Hash: 84C11B727156C58BEB61CF1AE148B9EB7A1F7887C8F048225EB4A43B94DB3CD845CB40
                                APIs
                                Strings
                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00000001400B8AC7
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: DebugDebuggerErrorLastOutputPresentString
                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                • API String ID: 389471666-631824599
                                • Opcode ID: add000f596c63ba9086890ad2e143c759155224b8522789efc4995f79ab0692a
                                • Instruction ID: b3baff55db2af0ef0d3f7f0b280b4444a411bf90a176b58064316404aa57ab54
                                • Opcode Fuzzy Hash: add000f596c63ba9086890ad2e143c759155224b8522789efc4995f79ab0692a
                                • Instruction Fuzzy Hash: 98115A32210B4097F7569B27EA453EE33A4FB48784F44812ADB4983AB0EF78D0B4C750
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Virtual$AllocInfoProtectQuerySystem
                                • String ID:
                                • API String ID: 3562403962-0
                                • Opcode ID: 321b67bc3dce9091cca3af2a8210c2363b0b24afac24e17171b156b639bc856e
                                • Instruction ID: 4258e1afaa6455873025acfe4853d78e6786f50bee1bce51619682f1dd863745
                                • Opcode Fuzzy Hash: 321b67bc3dce9091cca3af2a8210c2363b0b24afac24e17171b156b639bc856e
                                • Instruction Fuzzy Hash: 81312A32310A809EEB21DF36D8517D933A5FB4CB88F444126AB1E8BB68DF78D645C740
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: __std_exception_copy
                                • String ID: parse_error$value
                                • API String ID: 592178966-1739288027
                                • Opcode ID: d6c618e645c2f69b473e8ef9e6e8577313f80a03dcdce8b86aa8a7906fe9e328
                                • Instruction ID: 421e330f328ad8b9b4ed95ecda8ee77e216b13cc7eff753dffc2ada38604a70e
                                • Opcode Fuzzy Hash: d6c618e645c2f69b473e8ef9e6e8577313f80a03dcdce8b86aa8a7906fe9e328
                                • Instruction Fuzzy Hash: 8CF1AD72B20A8095EB12DB76E8413ED6362F7997D8F505712FB4D57AAAEF74C284C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: FormatInfoLocaleMessage
                                • String ID: !x-sys-default-locale
                                • API String ID: 4235545615-2729719199
                                • Opcode ID: 673506cb31d12670dfbde8b650ceb219f5d226973d02233bc6ec21ba9828e093
                                • Instruction ID: 6e8259666aaa04c0050ce825aa23775dbb0e3623261df5dc7e3128c0f8f5c655
                                • Opcode Fuzzy Hash: 673506cb31d12670dfbde8b650ceb219f5d226973d02233bc6ec21ba9828e093
                                • Instruction Fuzzy Hash: 90018072B04B8082E7528F63F8507EEA7A1F7887C4F484025EB4947BA8DB3CC5058B10
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 1791019856-0
                                • Opcode ID: fde7b8e7db97b770b6d17fa1d78b977a143d5c9e84fe95fb781c5122d3544716
                                • Instruction ID: eec5268479cdda02b8c78da84042847b0e53e37d1fcb4ab9b2df148b0f025e75
                                • Opcode Fuzzy Hash: fde7b8e7db97b770b6d17fa1d78b977a143d5c9e84fe95fb781c5122d3544716
                                • Instruction Fuzzy Hash: D96190376006418AEB369F16E5413ED73A1F7AC7C0F448225EB9A97AA5DB38D691CB00
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: InfoLocale
                                • String ID: GetLocaleInfoEx
                                • API String ID: 2299586839-2904428671
                                • Opcode ID: 287f50d5c011b399992cb6bab078c34d72dd0b19453a01a46759c6e23c60aea6
                                • Instruction ID: b8b15d082959550375d872d2b4a574b6c35111f93f95d4160ec2587d11962505
                                • Opcode Fuzzy Hash: 287f50d5c011b399992cb6bab078c34d72dd0b19453a01a46759c6e23c60aea6
                                • Instruction Fuzzy Hash: 33016235704A8086EB459B5BB5447CEA760EB9DBC0F584436BF4917BB6CE38C5428740
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CryptDataFreeLocalProtect
                                • String ID:
                                • API String ID: 2714945720-0
                                • Opcode ID: 9f4b79a0373a1bb07a1f6d57d23aee76defce310f3f699e5fe1e45333d4ada4c
                                • Instruction ID: 67641ed3af448434e7319fa557c5d406fdc98635340749bb2cffd34bed4cf3a5
                                • Opcode Fuzzy Hash: 9f4b79a0373a1bb07a1f6d57d23aee76defce310f3f699e5fe1e45333d4ada4c
                                • Instruction Fuzzy Hash: 57413232614A80CAE3218F75E8403ED37A5F75978CF444629BB8C07E9ADB79C5A48744
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ErrorLastValue$InfoLocale
                                • String ID:
                                • API String ID: 673564084-0
                                • Opcode ID: aae51b2a9d21bf7e54f83e578898ef5b46cb428bc91c270732ecb8b3fec0fc21
                                • Instruction ID: 3f2f1034046393169654e7699368e5024081eb92b0caf98da66f0f6c9ea1bd9c
                                • Opcode Fuzzy Hash: aae51b2a9d21bf7e54f83e578898ef5b46cb428bc91c270732ecb8b3fec0fc21
                                • Instruction Fuzzy Hash: 4D318F32B0068187EB25DB27E4413EE73A0F79C7C1F449225FB9983BA6DB38D5918B00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystemValue
                                • String ID:
                                • API String ID: 3029459697-0
                                • Opcode ID: d452b71020bd1f022492bc6807cc192c2c9e031585c9895097b6e7427efa948c
                                • Instruction ID: 7ba68ebfd2e082917346c4e20934efbd0178457faff08846a1fb6ebd3dab0b21
                                • Opcode Fuzzy Hash: d452b71020bd1f022492bc6807cc192c2c9e031585c9895097b6e7427efa948c
                                • Instruction Fuzzy Hash: 8711B17BA046448AEB168F16D4807ED7BA1F7E8FE1F448225E765437E0DA74CAD1CB40
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ErrorLast$InfoLocaleValue
                                • String ID:
                                • API String ID: 3796814847-0
                                • Opcode ID: 45ec05eff0f2b05e6231976ea7c75e6e9d0457c6cb665565b202bab4e64c0672
                                • Instruction ID: b5a02edd516b77fe93742bd04e37730368f1846733e8bb4b774b053a44aa4555
                                • Opcode Fuzzy Hash: 45ec05eff0f2b05e6231976ea7c75e6e9d0457c6cb665565b202bab4e64c0672
                                • Instruction Fuzzy Hash: A1118C3671459083E7665B13E0407EE23A0E79ABE0F004325FB6507EE4CA35C8D18F01
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ErrorLast$EnumLocalesSystemValue
                                • String ID:
                                • API String ID: 3029459697-0
                                • Opcode ID: 8f5d73e62e28e10308f28ad075867fd029a0f79c06fa79334ee1fb58e0dcdad7
                                • Instruction ID: 650d51a00948b0b7b39d5f8c88aa00294e78a8c84a20bb39946b0cffb9075a66
                                • Opcode Fuzzy Hash: 8f5d73e62e28e10308f28ad075867fd029a0f79c06fa79334ee1fb58e0dcdad7
                                • Instruction Fuzzy Hash: 7801F776B0428086EB564F17E840BD976E2E7B8BE4F458322E77447AE4CB7888C5CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CryptDataUnprotect
                                • String ID:
                                • API String ID: 834300711-0
                                • Opcode ID: 3339dcabb2d0400c4960ad268c66596c86b70f7aa198ebff8756a23dc346941b
                                • Instruction ID: 064fec0349e200c8466840e716244caf27892db5d84088c5fc568a6fc748a439
                                • Opcode Fuzzy Hash: 3339dcabb2d0400c4960ad268c66596c86b70f7aa198ebff8756a23dc346941b
                                • Instruction Fuzzy Hash: E211CE73B14B049EE760CFA1E8407DD37B5F358B4CF44052AAE4D92A68DB38C929CB84
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: EnumLocalesSystem
                                • String ID:
                                • API String ID: 2099609381-0
                                • Opcode ID: 4f3cbd580663199aaccb01281376539d086b8c9a154dabf837bfd3fdbd7783f2
                                • Instruction ID: 1be20af52885482918bde62337cf613b9eed61835a97c3d623556c94da20431d
                                • Opcode Fuzzy Hash: 4f3cbd580663199aaccb01281376539d086b8c9a154dabf837bfd3fdbd7783f2
                                • Instruction Fuzzy Hash: 72F01472300B4483E606DB2AE8907D933A5FB9DBC0F548026EB4983375CF3CC6618300
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: HeapProcess
                                • String ID:
                                • API String ID: 54951025-0
                                • Opcode ID: b1a02dc7636490bc937ba8cdd60d563051e8e3f602837cd51ba1a2af37ab86b1
                                • Instruction ID: e369f7cc69527b3f87cf0ecfe746ebd2d4f4dd9a0230a8f2b092041844e38892
                                • Opcode Fuzzy Hash: b1a02dc7636490bc937ba8cdd60d563051e8e3f602837cd51ba1a2af37ab86b1
                                • Instruction Fuzzy Hash: 4EB09234A03A00C2EA8A6B126C8A34823A4BB4CB40F984118820C41330DB3C04E69710
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 72eb94979c1d3c4de16d58263bb101b23318c1a473ca492c726c35ff16a582af
                                • Instruction ID: 6d4d319ee6e27bdf4a48e05f0685f56c483b360b5ed913eeb7e58a3f650e6fd4
                                • Opcode Fuzzy Hash: 72eb94979c1d3c4de16d58263bb101b23318c1a473ca492c726c35ff16a582af
                                • Instruction Fuzzy Hash: A73180F750DAC44BF3930A7A5D6A39D3F90AB9AF40F4EC199E788031E3E47619078661
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: alnum$alpha$cntrl$digit$graph$lower$print$punct$space$upper$xdigit
                                • API String ID: 1004003707-2937198513
                                • Opcode ID: e67547db2ed2332a7f19e7dca95a45f00ddd27835b6d9e5c57363dc607d87d2e
                                • Instruction ID: d630e8b8a5ed068fe2466b919d463fa43f5b4a7ddd4eb17893e371e64c285323
                                • Opcode Fuzzy Hash: e67547db2ed2332a7f19e7dca95a45f00ddd27835b6d9e5c57363dc607d87d2e
                                • Instruction Fuzzy Hash: 4E310554B0C60755FB10FBA5E901375D289AF44386FC96032D92E862C5EEACF845F2BD
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CloseHandle$Process32Token$InformationNextOpenProcess$ConvertErrorFirstLastString
                                • String ID:
                                • API String ID: 1972576440-0
                                • Opcode ID: 4763660f4a0e69c6ae17adb260ebd9cda0448fc93eb805e0b3ffd62d0d56fe00
                                • Instruction ID: b19eaf01c865331f754e6351f70945f0302f799c241f37814b0bb61a8d112e69
                                • Opcode Fuzzy Hash: 4763660f4a0e69c6ae17adb260ebd9cda0448fc93eb805e0b3ffd62d0d56fe00
                                • Instruction Fuzzy Hash: 59715B36214B8082EB529B67F8407AEA7A5FB8DBD4F504125EF4E57B68DF78C445C700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: ExceptionRaiseUnwindabort
                                • String ID: CCG $CCG $CCG!$CCG!$CCG"
                                • API String ID: 4140830120-3297834124
                                • Opcode ID: e45fc8471f7cc306109c62edf8b254349e2b495fbaec3812b0675ed500c917f7
                                • Instruction ID: 540d6cdebc4d2227a5f3ee2b297ffca49dd232c8c55bc6e2d51e3c447f94270b
                                • Opcode Fuzzy Hash: e45fc8471f7cc306109c62edf8b254349e2b495fbaec3812b0675ed500c917f7
                                • Instruction Fuzzy Hash: 3D51C436A14B81C2E760DB15E4807A9B3B0F799B88F905236EE8D13798DF39D582D744
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID: UUUU
                                • API String ID: 1992160199-1798160573
                                • Opcode ID: f77c88ed8e2e0546aa95018f39101ab1acda64fb455bfe48ab528bf610eb644e
                                • Instruction ID: f4793f2c495f257da5b7864c2a464372090e1b6c3295c3811906efdd9695a86b
                                • Opcode Fuzzy Hash: f77c88ed8e2e0546aa95018f39101ab1acda64fb455bfe48ab528bf610eb644e
                                • Instruction Fuzzy Hash: 78128672A0910287EF65DF25C140379F7E5EB44B5AF948235CA1D072C8DA3CE840FBA8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID: 0$0$0$0
                                • API String ID: 3215553584-3558443385
                                • Opcode ID: 820a670e8a4c89272beb14fa381d703c25652b067f448a1dd3f9a95a31db95ef
                                • Instruction ID: d87fa4e986523d27df80953172b62b0dd486bbfc2844426163fd634f79108b30
                                • Opcode Fuzzy Hash: 820a670e8a4c89272beb14fa381d703c25652b067f448a1dd3f9a95a31db95ef
                                • Instruction Fuzzy Hash: 77F1E13320AA958AF7639F2BD4503ED3BA5B359BD0F988203E788477A6D739C655C301
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CriticalSection$DeleteEnterErrorInitializeLastLeaveValuefree
                                • String ID:
                                • API String ID: 100439675-0
                                • Opcode ID: 30aa02ae5bca33457ef710422f6a64a41ac8ead17b866e7ea412da05448c15c7
                                • Instruction ID: fb131571f47c51609b0076c1f2c0188fd9107da82e3c9eaf3d251bffde5da1f5
                                • Opcode Fuzzy Hash: 30aa02ae5bca33457ef710422f6a64a41ac8ead17b866e7ea412da05448c15c7
                                • Instruction Fuzzy Hash: 84414222A0960286FB55FB15E8412B9E3A0AF55B93FC94534CD2D477D4DE3CE842A3AC
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                • String ID: bad locale name$false$true
                                • API String ID: 164343898-1062449267
                                • Opcode ID: ae88cd937f36c9743e4cf492e26538404faf03bacae6fdef2e26eed03261b8a2
                                • Instruction ID: e066986b790d9d11d0d243cedda6a3cc5bafb9ebfb83a164bf58ddc58a77a579
                                • Opcode Fuzzy Hash: ae88cd937f36c9743e4cf492e26538404faf03bacae6fdef2e26eed03261b8a2
                                • Instruction Fuzzy Hash: 35711932711B408AFB16DFA2E4503EC33B5EB98788F044529AF4927BAADF38C555D385
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Session$ListProcess$AcquireCurrentExclusiveLockRegisterResourcesStart
                                • String ID:
                                • API String ID: 779856957-0
                                • Opcode ID: 8bb7912290508ce8e88e3aaa07301283af1f89745b5405751b14ca5c1f9e5710
                                • Instruction ID: 53b25bd5857afa0adccecd5323b097c20916bf7b3c0f165211610be25f83b61c
                                • Opcode Fuzzy Hash: 8bb7912290508ce8e88e3aaa07301283af1f89745b5405751b14ca5c1f9e5710
                                • Instruction Fuzzy Hash: 1251EA32B04A408AF715DFA6E4547ED73B5FB8C794F804529EB0A63BA8DE34C946CB50
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID: 0$f$p$p
                                • API String ID: 3215553584-1202675169
                                • Opcode ID: 424b79af020e58dd710012948c1de64fe2c08c3ce7a620c69024c20bdefc1009
                                • Instruction ID: 7a1535432eec6c5026fa7d0a87deccdfacc68b181622ded096d4695016ab780a
                                • Opcode Fuzzy Hash: 424b79af020e58dd710012948c1de64fe2c08c3ce7a620c69024c20bdefc1009
                                • Instruction Fuzzy Hash: 1212D13270824296FB266B17E0547FEB6A2F3C87D4F988116F79647AE4D738C980CB50
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: QueryVirtual
                                • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                • API String ID: 1804819252-1534286854
                                • Opcode ID: ba1ad689428b48396fa565d55f37374c51d177facfa230d2a8edbf84c3bf7fa1
                                • Instruction ID: e46cbbd9322aa9d6f74812edda85fb96b6e19e6feb3a714c1eff0ac98e86f97d
                                • Opcode Fuzzy Hash: ba1ad689428b48396fa565d55f37374c51d177facfa230d2a8edbf84c3bf7fa1
                                • Instruction Fuzzy Hash: C851A032A08A4681EB11EF15E841AAAF7A0FB84B95FC54135DE2D073D4DF3CE446E798
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: AddressFreeLibraryProc
                                • String ID: api-ms-$ext-ms-
                                • API String ID: 3013587201-537541572
                                • Opcode ID: ae679bdfceee675f1571733c1c63cbbbec3b6b3dc0e35fb4a25fe1e49f4f57a7
                                • Instruction ID: 76867b2f50e267d13f3c23fb1344ffb9304965bf71fdab833d42e5d4e69427de
                                • Opcode Fuzzy Hash: ae679bdfceee675f1571733c1c63cbbbec3b6b3dc0e35fb4a25fe1e49f4f57a7
                                • Instruction Fuzzy Hash: 01418172311A4082FB17DB1BA9147DA6395BB5DBE0F494229BF1D8B7A8EE3CC4468340
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID:
                                • API String ID: 1992160199-0
                                • Opcode ID: f294bb9004327c1bec0d0349a18b948e00fe3e45a64ad46b07d7e6d5aa7348cc
                                • Instruction ID: a2a1345993d659fbb331c870d8ec0ac575b024c775c63227f14225fedd439c59
                                • Opcode Fuzzy Hash: f294bb9004327c1bec0d0349a18b948e00fe3e45a64ad46b07d7e6d5aa7348cc
                                • Instruction Fuzzy Hash: 62E18372A142028AEB64DF25D050739F7F5EB84B5AF648235CB19477C8DA39EC40FBA4
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Internet$CloseFileHandleOpenRead
                                • String ID: File Downloader
                                • API String ID: 4038090926-3631955488
                                • Opcode ID: 210ff5028c4d6a4313cb91af622c9ef4241b8e7ae994910c4c878489564db72a
                                • Instruction ID: 5fa8a96f82adfbe2566a4b915101b8e54a631cf06f5522793a8622ffc361334d
                                • Opcode Fuzzy Hash: 210ff5028c4d6a4313cb91af622c9ef4241b8e7ae994910c4c878489564db72a
                                • Instruction Fuzzy Hash: 64312632214A8086EB228F26F95079EB7A0FB89BC4F545125FF8943B68DF7CC5958B00
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: AddressLibraryLoadProcwcslen
                                • String ID: 1-+!$G$TEMP$basic_string: construction from null is not valid
                                • API String ID: 1064947497-2238167505
                                • Opcode ID: b0833021c85c12311d7ea6ad174c81375b93a74c7c7ca75d79944687dd432d59
                                • Instruction ID: 8ebefb4a85f5714bfa4505cec3441d1a7c82a33e0d23a369fafe679fe31cc12d
                                • Opcode Fuzzy Hash: b0833021c85c12311d7ea6ad174c81375b93a74c7c7ca75d79944687dd432d59
                                • Instruction Fuzzy Hash: 2D31A121A1DB8682EB11AB54E4006A9F770EB85B94FC04032DA5E17B98DE3CE506D794
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: ExceptionRaise$abort
                                • String ID: CCG $CCG"$CCG"
                                • API String ID: 3325032505-1179968548
                                • Opcode ID: dc1771becb5f7d7a174ac4ee873c316158b39dbcf1eb3e3089c99a13fe7347f6
                                • Instruction ID: bb56ef22e4fd6caf1f1d2a4b5eef14ff8c85c73fd41edb9a7ede3a28d7ca8557
                                • Opcode Fuzzy Hash: dc1771becb5f7d7a174ac4ee873c316158b39dbcf1eb3e3089c99a13fe7347f6
                                • Instruction Fuzzy Hash: 7A218333A25F8483E750DF58E4403A97760F7D9788F60A226EA8D477A4DF7DD1928740
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CriticalLeaveSectionfree
                                • String ID:
                                • API String ID: 1679108487-0
                                • Opcode ID: 95fe868276fcc675441e8b6bcbd2e592402446384d147c482bf95a0a74b21bb4
                                • Instruction ID: 82d722cf9b07768a2024a7dd950549965ba249197585ab6aa2a2f0d9a975c3c6
                                • Opcode Fuzzy Hash: 95fe868276fcc675441e8b6bcbd2e592402446384d147c482bf95a0a74b21bb4
                                • Instruction Fuzzy Hash: C5918F31A09A0295EB25FB15ED402B9E2A9EF08786FC44435D93D0B7D4DF3CA551B3E8
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcpy_s$_strlwr$ByteCharMultiWidestrstr
                                • String ID:
                                • API String ID: 606828236-0
                                • Opcode ID: 740dde69bc923aa62291048bd7d2af24dee97c0faba599a4844422326155c18e
                                • Instruction ID: 802666c5d3b543065605e9a6a0f1080d61c5770bc6773cba74e61a401e49e6a5
                                • Opcode Fuzzy Hash: 740dde69bc923aa62291048bd7d2af24dee97c0faba599a4844422326155c18e
                                • Instruction Fuzzy Hash: 2A419D62608BC186EB21DF16E9407AAE765FB89BE4F804131EE9D03B98CF7CD142D744
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: ?$?$?$L]O[$m~RF
                                • API String ID: 1004003707-3421602070
                                • Opcode ID: 1d2fd37fcf9e9270826f93c39df50b07c1c31ca18e56336efe699e63f3ad2eb9
                                • Instruction ID: 3f8c47d2c97fa7c38e31633d3a2aea466cf79f74929fe7fa370ffdfa616a0bc7
                                • Opcode Fuzzy Hash: 1d2fd37fcf9e9270826f93c39df50b07c1c31ca18e56336efe699e63f3ad2eb9
                                • Instruction Fuzzy Hash: B631F77290C7858AEB11DF28E4402AAFBA4E799784FC44136EB9D07B85DB7CC541CF94
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Value$ErrorLast
                                • String ID:
                                • API String ID: 2506987500-0
                                • Opcode ID: 87d6f8d026e6a5ccece3540032cc9aa4090410d0cf0870e7c42c6d11e07430ce
                                • Instruction ID: 94191e183d8c7d64a8a2dbd3827d5593e31011003ecf1becfb5b7b44f012405e
                                • Opcode Fuzzy Hash: 87d6f8d026e6a5ccece3540032cc9aa4090410d0cf0870e7c42c6d11e07430ce
                                • Instruction Fuzzy Hash: 28216A3021964082FA5B7B77A6553ED66829B4DBF1F540729BB660BBF6EE38C4018301
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                • String ID: CONOUT$
                                • API String ID: 3230265001-3130406586
                                • Opcode ID: 6204a89cdd06f09cfc3486d0d96b2f463e47156f2c9ace21a11958914875a066
                                • Instruction ID: b2c7ae89afa13f93ab2f89b082ff298c5d837d5d0260bd35e7c271c2b071468c
                                • Opcode Fuzzy Hash: 6204a89cdd06f09cfc3486d0d96b2f463e47156f2c9ace21a11958914875a066
                                • Instruction Fuzzy Hash: E6116A32710A4086E7528B57F854B9DA2A1FB9CFE4F444224EB6D877A4DF3CC845CB50
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fputc
                                • String ID:
                                • API String ID: 1992160199-0
                                • Opcode ID: 3c91229a8620996d77b275314aee762391fa8306f714f08d228cfd6e98818314
                                • Instruction ID: 087396777fddf544d557c86b4105d6914bf3a38b15bccde1966b47f273d2587d
                                • Opcode Fuzzy Hash: 3c91229a8620996d77b275314aee762391fa8306f714f08d228cfd6e98818314
                                • Instruction Fuzzy Hash: 05F1FB72E1854246EB30EF25D104B39E691BB14B6AF968234CD3E577C4CA3CF941E798
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$CompareInfoString
                                • String ID:
                                • API String ID: 2984826149-0
                                • Opcode ID: 8e7ed421b9ab10fa64d8ac8429b202f25cf3c3f4c1382695c7f8b6ad37d36eca
                                • Instruction ID: 00de4b50e6229e7b19f2ebf843531fdc6470dc3cb5f6c1b8a30933229632cc52
                                • Opcode Fuzzy Hash: 8e7ed421b9ab10fa64d8ac8429b202f25cf3c3f4c1382695c7f8b6ad37d36eca
                                • Instruction Fuzzy Hash: D1A18E72214A808AEF338FA294543ED66A1F748BE8F584622FF59077F5EB38C945C341
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ByteCharMultiStringWide
                                • String ID:
                                • API String ID: 2829165498-0
                                • Opcode ID: aff1d1866dc12ffdbaee311dbe293056c30c40e0640524166ebc9974f98794e1
                                • Instruction ID: 8b8c5f4bf6079c73f73cf44f0fe3ced5764d8e641cf6acd2d34b214dda9e4180
                                • Opcode Fuzzy Hash: aff1d1866dc12ffdbaee311dbe293056c30c40e0640524166ebc9974f98794e1
                                • Instruction Fuzzy Hash: 6D817E72200B8086EB368FA6E84079972E5FB98BE8F544625FF5947BF8DB38C545C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: Byte$CharLeadMultiWide___lc_codepage_func___mb_cur_max_func
                                • String ID:
                                • API String ID: 2785433807-0
                                • Opcode ID: b8ade29cbcad1670599392aa2893148449ef957c3984b89b714999f8b731dc73
                                • Instruction ID: 750697808981ad839852152427f6272cd56d1dd58698dfcb1b5f66211db65dad
                                • Opcode Fuzzy Hash: b8ade29cbcad1670599392aa2893148449ef957c3984b89b714999f8b731dc73
                                • Instruction Fuzzy Hash: 5931292360920249F762AB25E8003B9E5986B417B9F844236EEB9477C0DE3DD181F394
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: rand
                                • String ID: and $+-*/$Performing arithmetic operations on:
                                • API String ID: 415692148-3864222635
                                • Opcode ID: f0d3409b9f0d6e33847339fe865cbda917983b98c22d437aab5b055a0af117dc
                                • Instruction ID: 415e6b116f241f5f88595c01908793563dc929e75aa7bfcb23537a692a14c8b7
                                • Opcode Fuzzy Hash: f0d3409b9f0d6e33847339fe865cbda917983b98c22d437aab5b055a0af117dc
                                • Instruction Fuzzy Hash: 45210512F0E91608EB14FB25984527DD7925F86B91FC89131DD2E073DADD3CE900A3E8
                                APIs
                                • GetLastError.KERNEL32 ref: 0000000140095A4F
                                • FlsSetValue.KERNEL32(?,?,-256325B0FF13704B,0000000140091B75,?,?,?,?,0000000140098C74), ref: 0000000140095A85
                                • FlsSetValue.KERNEL32(?,?,-256325B0FF13704B,0000000140091B75,?,?,?,?,0000000140098C74), ref: 0000000140095AB2
                                • FlsSetValue.KERNEL32(?,?,-256325B0FF13704B,0000000140091B75,?,?,?,?,0000000140098C74), ref: 0000000140095AC3
                                • FlsSetValue.KERNEL32(?,?,-256325B0FF13704B,0000000140091B75,?,?,?,?,0000000140098C74), ref: 0000000140095AD4
                                • SetLastError.KERNEL32 ref: 0000000140095AEF
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Value$ErrorLast
                                • String ID:
                                • API String ID: 2506987500-0
                                • Opcode ID: 46da3ed24448742f5e73d5ccb86e50a9ce35f99c3519794e4a68f5c6ccae4417
                                • Instruction ID: 4e56595a93ee8ec0115da1d98981107824e97e2991e46ab42691fcb503f31c77
                                • Opcode Fuzzy Hash: 46da3ed24448742f5e73d5ccb86e50a9ce35f99c3519794e4a68f5c6ccae4417
                                • Instruction Fuzzy Hash: 4E117F3030524042FA5B677756963ED65525F4C7F0F540729BB3647BF6EE38C4418302
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID: ;$=$=$HEN>
                                • API String ID: 4139908857-2188461147
                                • Opcode ID: de21482289b350c4a1ef8e9bc7a21981703884f7dfa1a2066d3a504667ed42bb
                                • Instruction ID: 301b1f9359e91ce8b3320cf02f05b108577195b672c7e25093d0aa523f467341
                                • Opcode Fuzzy Hash: de21482289b350c4a1ef8e9bc7a21981703884f7dfa1a2066d3a504667ed42bb
                                • Instruction Fuzzy Hash: 4F41A032A0CB8486EB11DB18F0403A9F7A0F789798FC10526DB9D03B98DB7CD245CB85
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: AddressFreeHandleLibraryModuleProc
                                • String ID: CorExitProcess$mscoree.dll
                                • API String ID: 4061214504-1276376045
                                • Opcode ID: 11d1bc54c7adcb39bb252d565eeaa109e042f256159d3b1e4446ddc4ea841d4a
                                • Instruction ID: 545204f8687e3a2734c2c0d104c94094f9ded36245a91659c09d7b5539e87f50
                                • Opcode Fuzzy Hash: 11d1bc54c7adcb39bb252d565eeaa109e042f256159d3b1e4446ddc4ea841d4a
                                • Instruction Fuzzy Hash: E9F0627131160882EB568B26E8453DD6360EF8D7E1F540319E769472F4CF3CC1868B10
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: basic_string::_M_create
                                • API String ID: 0-3122258987
                                • Opcode ID: 44b85481758d657289992c4c4b478202b050daf0a3589029b5cd0d7c519323b4
                                • Instruction ID: 12c9ae66d67149bfdd8051b79b6cb57a056c196892071224c59e8f68f479f1aa
                                • Opcode Fuzzy Hash: 44b85481758d657289992c4c4b478202b050daf0a3589029b5cd0d7c519323b4
                                • Instruction Fuzzy Hash: 5CA1E662B1B68584EF20AF35D8404B9E250EB45BE4FD88631DA3D873D5EF2CE491D3A4
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 64ea054b2a2157d068e8ab586f5ae1021de10276e6996cd183b54ca99c2502e6
                                • Instruction ID: cb9176e7b0d8cbbce7846a40d26a7c63dbdef526f5682213a1436689ec15cb4d
                                • Opcode Fuzzy Hash: 64ea054b2a2157d068e8ab586f5ae1021de10276e6996cd183b54ca99c2502e6
                                • Instruction Fuzzy Hash: EEC19E73E0965286E771EF24C414739E7A1EB44B59F9A8231CA2D573C4CB3CE841E7A8
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strlen$CurrentPathProcessTempmemchrmemcpy
                                • String ID:
                                • API String ID: 1237187527-0
                                • Opcode ID: f4e7bedf47afd40fecaf14e77b810dd7dad75451e5cfdd79f2a6c94f68c429c1
                                • Instruction ID: b8472579dce7dcd6562ff9dc5ff575dfd490795d76b082d3347bd39e262ecb3b
                                • Opcode Fuzzy Hash: f4e7bedf47afd40fecaf14e77b810dd7dad75451e5cfdd79f2a6c94f68c429c1
                                • Instruction Fuzzy Hash: 87A1732660CF8185EB50DB19E44036EE7A1FB85BA0F944235EAAD03BD8DF7CD005EB54
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _set_statfp
                                • String ID:
                                • API String ID: 1156100317-0
                                • Opcode ID: f9d29a29cdd2ffd341ecb2d23d59fd5f68f4680a083a3d8e41450f0123bb1665
                                • Instruction ID: 51537d9657ec2fdfa4f10ec80af9299248d2a692f50d6fc6d23c4d355d044b15
                                • Opcode Fuzzy Hash: f9d29a29cdd2ffd341ecb2d23d59fd5f68f4680a083a3d8e41450f0123bb1665
                                • Instruction Fuzzy Hash: C881F4B2A24A8449F7778F3AA450BEABA60FB5D7D8F044315FB5A275F4DB34C5818A00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: a03a752f2ac655c7a58730884bc2fcf5dd5ee0725649a45cd42aac9bb0d07a50
                                • Instruction ID: 522d1dfaad3cd7a1789f81a8b2f94e3c0e8e741ccacba2c26c74aefc8858f3ae
                                • Opcode Fuzzy Hash: a03a752f2ac655c7a58730884bc2fcf5dd5ee0725649a45cd42aac9bb0d07a50
                                • Instruction Fuzzy Hash: 8B51A233105B8486E7639F22E4603ED3BD5B759FC4F498412E7C8473A7DA3A8995D702
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: Result of $basic_string::_M_create
                                • API String ID: 3510742995-1160149181
                                • Opcode ID: ecf818389d4a64880c138437d3c7078a4c229c0a1f64958101a06294d39f3f93
                                • Instruction ID: ac791e1cf078792d60bb52dce7c19ff17a95d80b79e8f71366188c0cc80b8f8b
                                • Opcode Fuzzy Hash: ecf818389d4a64880c138437d3c7078a4c229c0a1f64958101a06294d39f3f93
                                • Instruction Fuzzy Hash: C341F726B0A68658EB19FB15C10027EE652EB80BD9FD44932CD3D0B7C5DE3CE441E3A4
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _set_statfp
                                • String ID:
                                • API String ID: 1156100317-0
                                • Opcode ID: ec8299edcefb6fa201b4cd1aeee9dcae6e47e61ba1c4a4a6e0c30bc807d4dc5c
                                • Instruction ID: 9eabe2c6862708b434ee5f188970f655e061dec2d8f65aedb1ea2276e73e5cc0
                                • Opcode Fuzzy Hash: ec8299edcefb6fa201b4cd1aeee9dcae6e47e61ba1c4a4a6e0c30bc807d4dc5c
                                • Instruction Fuzzy Hash: 6E11E5B2A60E0105F67A112BED463E925406B7C3F8F890725BF67072F68B38CCC18B24
                                APIs
                                • FlsGetValue.KERNEL32(?,?,?,000000014008D367,?,?,00000000,000000014008D602,?,?,?,?,-256325B0FF13704B,000000014008D58E), ref: 0000000140095B27
                                • FlsSetValue.KERNEL32(?,?,?,000000014008D367,?,?,00000000,000000014008D602,?,?,?,?,-256325B0FF13704B,000000014008D58E), ref: 0000000140095B46
                                • FlsSetValue.KERNEL32(?,?,?,000000014008D367,?,?,00000000,000000014008D602,?,?,?,?,-256325B0FF13704B,000000014008D58E), ref: 0000000140095B6E
                                • FlsSetValue.KERNEL32(?,?,?,000000014008D367,?,?,00000000,000000014008D602,?,?,?,?,-256325B0FF13704B,000000014008D58E), ref: 0000000140095B7F
                                • FlsSetValue.KERNEL32(?,?,?,000000014008D367,?,?,00000000,000000014008D602,?,?,?,?,-256325B0FF13704B,000000014008D58E), ref: 0000000140095B90
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Value
                                • String ID:
                                • API String ID: 3702945584-0
                                • Opcode ID: a4a4f9ea1fe8b9925d9f5229c3e2104e7f1131be9a45ee9af6dd5d66ba5dd7ca
                                • Instruction ID: 40ffcb6e7276c6b56e20ef340f0400dac99e19fffa2c2d3576c81a9cdb817faf
                                • Opcode Fuzzy Hash: a4a4f9ea1fe8b9925d9f5229c3e2104e7f1131be9a45ee9af6dd5d66ba5dd7ca
                                • Instruction Fuzzy Hash: 5C118F7070924042FA5AAB77A6523E966825F8C7F0F444369BB3957BF6DF7CC4418701
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Value
                                • String ID:
                                • API String ID: 3702945584-0
                                • Opcode ID: a4fd602ff4c21bae2ba80a261c589652b48751060fe2931f837fcaf8d560a57e
                                • Instruction ID: c9b1f79b9437871e710b23d89dbf29e12363c3e18903ae63e702a788495a69bc
                                • Opcode Fuzzy Hash: a4fd602ff4c21bae2ba80a261c589652b48751060fe2931f837fcaf8d560a57e
                                • Instruction Fuzzy Hash: 8211297021620142F96BB77B54A63E916824F4D7F1F9817297B365B3F2ED3CD8418312
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: RevertSelf$ImpersonateLoggedUser
                                • String ID: APPB
                                • API String ID: 3543747371-1278849820
                                • Opcode ID: 94b66b658ed09ae658190794c44e84a70b32414495d1fe4a4c6f3ab4362dba3d
                                • Instruction ID: 6328d90dfc417aae0a75f28204237d3efcb13e8a4d3ac0bfbb6f9391f15e8308
                                • Opcode Fuzzy Hash: 94b66b658ed09ae658190794c44e84a70b32414495d1fe4a4c6f3ab4362dba3d
                                • Instruction Fuzzy Hash: 58129D72B2069089FB029BBAD8543DD2762E7497E8F605716FB6D17AEADF74C480C340
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: directory_iterator::directory_iterator$exists$status
                                • API String ID: 0-3429586796
                                • Opcode ID: 18cfcb973e275f3359bb54c32ff1de0b45e9df6e8b787d3e5737cdb4d7b3e643
                                • Instruction ID: 55f11669b2c6715494dc4fb567f6486542e9ba5ac96f56ea717def1ce1269872
                                • Opcode Fuzzy Hash: 18cfcb973e275f3359bb54c32ff1de0b45e9df6e8b787d3e5737cdb4d7b3e643
                                • Instruction Fuzzy Hash: B9E16132611BC589EB729F26D8503EA3360F79D798F449626EB8D4BB69EF34C641C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: File$ListProcess$CurrentPointerReadRegisterResourcesSessionSizeStart
                                • String ID: ios_base::badbit set
                                • API String ID: 1164181714-3882152299
                                • Opcode ID: b21f64af440073c6051ecf62b95bac71750afb88095a937f8121b0b6e9b59d2d
                                • Instruction ID: e423b73e69e3eb3b89c535b40fbd5329fb55dfd1c877f314d4b2d92c6e73c0c6
                                • Opcode Fuzzy Hash: b21f64af440073c6051ecf62b95bac71750afb88095a937f8121b0b6e9b59d2d
                                • Instruction Fuzzy Hash: A4C1F232710BC489EB21DF25D8807DD37A5F789B88F508226EB4D4BBA9DB74C645C701
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: ", "$: "
                                • API String ID: 0-747220369
                                • Opcode ID: 502cb8dffc5d950ded9be3649ad98e12effc28c98abc924bf6a92b50259563f1
                                • Instruction ID: b48806bc5931859d9f60c080c4a103d486102d7c23a0804a85736c8dc29304ac
                                • Opcode Fuzzy Hash: 502cb8dffc5d950ded9be3649ad98e12effc28c98abc924bf6a92b50259563f1
                                • Instruction Fuzzy Hash: 99917B72700A4095EB02EF66E0953EC3361E759BC8F508626EF5D57BAADF38C995C380
                                APIs
                                • VirtualProtect.KERNEL32(00007FF7F8BAF060,00007FF7F8BAF068,00007FF7F8BAF0B0,?,?,?,?,00000001,00007FF7F8911244), ref: 00007FF7F892A8F3
                                Strings
                                • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF7F892AA8A
                                • Unknown pseudo relocation bit size %d., xrefs: 00007FF7F892AA74
                                • Unknown pseudo relocation protocol version %d., xrefs: 00007FF7F892AA96
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: ProtectVirtual
                                • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
                                • API String ID: 544645111-1286557213
                                • Opcode ID: e2176e22cacbc1e56bd42fc89a58474ee1bbcd1f4fcc8751c36bb341390877a3
                                • Instruction ID: a04e7cfcad7544b7128090bf6b5963ba262d89b299cfbf546f33024dd41a0a17
                                • Opcode Fuzzy Hash: e2176e22cacbc1e56bd42fc89a58474ee1bbcd1f4fcc8751c36bb341390877a3
                                • Instruction Fuzzy Hash: 3F91B437E1950246EB20EB159942679E3E1BF54766FD68231CE3D077D4DE3CE802A2E8
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                • API String ID: 3215553584-1196891531
                                • Opcode ID: 851a617801b4cfd31061c4c6c380f6ef5142011fd0a99ac6d62129d95d7a0a73
                                • Instruction ID: c25c3288be8e472c6befd42f9ca98e390cbf50fe56392b6ea39b80f7af3d53ba
                                • Opcode Fuzzy Hash: 851a617801b4cfd31061c4c6c380f6ef5142011fd0a99ac6d62129d95d7a0a73
                                • Instruction Fuzzy Hash: F8819DB2600A4086FB778FABC1507F93BB0A31ABC8F658005FB4667AB5D33DC9429711
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: std::_$GetcollLocinfo::_Locinfo_ctorLockitLockit::_
                                • String ID: bad locale name
                                • API String ID: 1287851536-1405518554
                                • Opcode ID: a74d05edcc680aa49797f08e4eedccf6035f239cca559bda27cab53509a1a993
                                • Instruction ID: 2dd48ec296852500dd2f0364dd46106788e004d0cc0eadaa75e91df770a0f7fb
                                • Opcode Fuzzy Hash: a74d05edcc680aa49797f08e4eedccf6035f239cca559bda27cab53509a1a993
                                • Instruction Fuzzy Hash: 5C714B32702B408AFB16DFB6D4903DC3376AB48B98F044125EF592BBAADE348555D389
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: __std_exception_destroy
                                • String ID: at line $, column
                                • API String ID: 2453523683-191570568
                                • Opcode ID: 24fe7f42ac002282dae115578377fdd728047d5eb7b3d8577a3df730c4bd1d07
                                • Instruction ID: f5178fb3b268f0b48bb0946d76aaafe813ca48c51b666f22c5d6955aa079505b
                                • Opcode Fuzzy Hash: 24fe7f42ac002282dae115578377fdd728047d5eb7b3d8577a3df730c4bd1d07
                                • Instruction Fuzzy Hash: E851A072B04B8081EA11DB1AF58039EB761F799BD4F104212FBA907BAADF79C591C740
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: std::_$GetctypeLocinfo::_Locinfo_ctorLockitLockit::_
                                • String ID: bad locale name
                                • API String ID: 1612978173-1405518554
                                • Opcode ID: b3b85aaa9564d3eb53080caaeaa34e3804193ba04b17ecad880dd215a6707056
                                • Instruction ID: 974744e1641dd82f39cde997d7380458ab7219ed9018711764406166cb430a43
                                • Opcode Fuzzy Hash: b3b85aaa9564d3eb53080caaeaa34e3804193ba04b17ecad880dd215a6707056
                                • Instruction Fuzzy Hash: A2512A36711B408AEB16DFB2E4907ED33B5FB48788F044429EB4A27AA5DF34C915D384
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: CCG
                                • API String ID: 0-1584390748
                                • Opcode ID: d3dbc5fc667eaa8116ddc9648ae4a223ff8f86823c9b38466b26c19195cb2a75
                                • Instruction ID: d1b809eaf88e669cd78256e06df646b3a8565bfade615204f53f7ef3c1bbcfdf
                                • Opcode Fuzzy Hash: d3dbc5fc667eaa8116ddc9648ae4a223ff8f86823c9b38466b26c19195cb2a75
                                • Instruction Fuzzy Hash: F3215E62E091024AFB68F3658552378E1C29FC9752F9A4936C93E863D1DD1CA8C1B2BD
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: AcquireAddressExclusiveHandleLockModuleProc
                                • String ID: NtDuplicateObject$ntdll.dll
                                • API String ID: 956071019-829176969
                                • Opcode ID: 0892d24e8280c9ca28f2a4ef2ebc3fefd12f45278bc96ee3cb6f4232baa62d7a
                                • Instruction ID: 29acd23d1b2af4f5491f75f2eb0f5caea469346f4c8e7b10281902b42738524f
                                • Opcode Fuzzy Hash: 0892d24e8280c9ca28f2a4ef2ebc3fefd12f45278bc96ee3cb6f4232baa62d7a
                                • Instruction Fuzzy Hash: 1901E73221190085FA53DBA7FC653E92390BBDDBE5F440626AB1E471B1EF38C5D6C610
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: AddressHandleModuleProc
                                • String ID: GetTempPath2W$kernel32.dll
                                • API String ID: 1646373207-1846531799
                                • Opcode ID: feccffff2a60b544ffbbbafe503937a9e42bf7f10482beb47b79b4c0f892a682
                                • Instruction ID: b479fef3ac197ef4dce19ec26a24247ec8550dec43ddafd548e24bb2c55acab6
                                • Opcode Fuzzy Hash: feccffff2a60b544ffbbbafe503937a9e42bf7f10482beb47b79b4c0f892a682
                                • Instruction Fuzzy Hash: 9EE01A75704B0582EE469B12F9987AD2361FF8CBC4F589029EB1E07334DE3CD4869B00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: freememcpystrlen
                                • String ID:
                                • API String ID: 2208669145-0
                                • Opcode ID: 616034b4082db6133acc050cdb7f1ef8251caf1ace96c15328d116e499333b8e
                                • Instruction ID: 98b0cfb007da36e9366edec59cca7487855aa3ff58e14f6ad55d50b287a57745
                                • Opcode Fuzzy Hash: 616034b4082db6133acc050cdb7f1ef8251caf1ace96c15328d116e499333b8e
                                • Instruction Fuzzy Hash: 03318723B4964245FB66FB11AA01379D2D16F40BF1F998230DD7D06AC6DE2C9441A394
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: FileWrite$ConsoleErrorLastOutput
                                • String ID:
                                • API String ID: 2718003287-0
                                • Opcode ID: 7f3eb5a86098c1c517e33af41decd246e6b98b795eba64b701eaa93da67d498f
                                • Instruction ID: a6b027b0e07357715d3c80cbbe1cd0166f8b724c902756b6abe27a254a4597ff
                                • Opcode Fuzzy Hash: 7f3eb5a86098c1c517e33af41decd246e6b98b795eba64b701eaa93da67d498f
                                • Instruction Fuzzy Hash: F1D1AB32714A808AEB22CF7AD4403EC37B5F358BD8F548216EF5997BA9DA34C556CB40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strlen
                                • String ID: t$ty$y
                                • API String ID: 39653677-1920740250
                                • Opcode ID: 87489741a1c735bb47c7c7fa151bb2518af881d747d5548b986082c319ae107a
                                • Instruction ID: 706f5a5b20ead613ab90d2efe95ae198d905162d13e4c0f52f158d7fe8cb1ab0
                                • Opcode Fuzzy Hash: 87489741a1c735bb47c7c7fa151bb2518af881d747d5548b986082c319ae107a
                                • Instruction Fuzzy Hash: E4E14D72508BC2C6E7568F34C0143E87AA1EB29F4CF4C8135CB990B799DBBE94959371
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ConsoleErrorLastMode
                                • String ID:
                                • API String ID: 953036326-0
                                • Opcode ID: 0064717757fb816ba36e302a15913e1cbdafe464b3098268c38cec24d04983ad
                                • Instruction ID: e0bad62a638c68990d328d5793b8bdc1d639ed9625066bc4d5269d2327d8b571
                                • Opcode Fuzzy Hash: 0064717757fb816ba36e302a15913e1cbdafe464b3098268c38cec24d04983ad
                                • Instruction Fuzzy Hash: D991B1B261065089FB62CF6698807ED2BA0F74CBD8F48511AFF4A67BA5DB34C485CB11
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: (
                                • API String ID: 1004003707-3887548279
                                • Opcode ID: 44ff3ea0eba828e30fde48cf3e6407d113ef1c86855c37323daa94a633f6d87f
                                • Instruction ID: 913cf6682a6164efc5c8d10d6afd3de962fe0d980127d17dbc539e7d4653c7ef
                                • Opcode Fuzzy Hash: 44ff3ea0eba828e30fde48cf3e6407d113ef1c86855c37323daa94a633f6d87f
                                • Instruction Fuzzy Hash: EEA19F72608B8685E755EF25C4043E9A761EB55F89F884032CE6E0B7D6CF7CD884A3A4
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strlen
                                • String ID: a$a$rm
                                • API String ID: 39653677-3573517395
                                • Opcode ID: c7bf3fc4039771aa151d5a77072f9711761caae911655a942766ef051505f1bc
                                • Instruction ID: 20d7fb173abb93bb8bfee91f78e59622210591e3ffc0689f699272df8fe97d56
                                • Opcode Fuzzy Hash: c7bf3fc4039771aa151d5a77072f9711761caae911655a942766ef051505f1bc
                                • Instruction Fuzzy Hash: 66B182729087C2C5E7569F28C0083E8BA91EB25F4CF5C8135CB980F799DBBE9446A375
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: basic_string::_M_create
                                • API String ID: 3510742995-3122258987
                                • Opcode ID: 72179817af7f84d4777a76ac889e536a436144b296a5be41eac1759ee4653c10
                                • Instruction ID: 6623dbd95aff52036982ce1ed6c39c966369831b808eeae116866afba11c2ce1
                                • Opcode Fuzzy Hash: 72179817af7f84d4777a76ac889e536a436144b296a5be41eac1759ee4653c10
                                • Instruction Fuzzy Hash: 9F61D162A1AA4591EB15EB25C8056B9E391EF01BD4FC48732DA3D237D4EF3CE442D394
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo$_get_daylight
                                • String ID:
                                • API String ID: 72036449-0
                                • Opcode ID: cbe6a422300ce47d191bfdaffd942f57c8d825da7a2edd8825320d75a71d5f2d
                                • Instruction ID: 4cef64af6a6c9a86ce83d0a7878914f71726a3e20492fbdc572d3d8bd7fdd1ae
                                • Opcode Fuzzy Hash: cbe6a422300ce47d191bfdaffd942f57c8d825da7a2edd8825320d75a71d5f2d
                                • Instruction Fuzzy Hash: D7510332604E0287F76B5EABD9013FD66A0E3487E4F198035BB16472F6D7B9CA40CB42
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: ___lc_codepage_funcfputclocaleconv
                                • String ID:
                                • API String ID: 1339002523-0
                                • Opcode ID: ce1dac330c6f27128e61fe827faa414519fca3154a38c89fa2bd38bea5801416
                                • Instruction ID: 2ba3fce3cb5276d3f6b4b8b3b5d6116cbae242c65a3949932d232f0f704e3df6
                                • Opcode Fuzzy Hash: ce1dac330c6f27128e61fe827faa414519fca3154a38c89fa2bd38bea5801416
                                • Instruction Fuzzy Hash: A1518F73A0551189E731EF24D1413A9F7E1EB04F5AF964231EB2C477C9CA38E841E7A8
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: EnvironmentInitStringStringsUnicode$Free
                                • String ID:
                                • API String ID: 2488768755-0
                                • Opcode ID: bcdf9e957b836fad2b9a144feaaed0332e88cebafea3e7606a3ee423db221a5a
                                • Instruction ID: 9735953dc97c4c7278c1d0ea2bf846f00a1df3506a1c5c193014c8045fd42382
                                • Opcode Fuzzy Hash: bcdf9e957b836fad2b9a144feaaed0332e88cebafea3e7606a3ee423db221a5a
                                • Instruction Fuzzy Hash: C3518932A18B80C2EB129F16E44039D7761FB98BD4F549215EB9D03BA6DF78D2E1C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_RegisterSetgloballocalestd::locale::_
                                • String ID:
                                • API String ID: 3698853521-0
                                • Opcode ID: 5df3add741de15268a4c1c893243a82b2349d0c978b64c86d7b80c97edf7e36a
                                • Instruction ID: bc1c7009bf646980d28510eba16aabbeef68747b7b6e5d2c383e6a03373d8cef
                                • Opcode Fuzzy Hash: 5df3add741de15268a4c1c893243a82b2349d0c978b64c86d7b80c97edf7e36a
                                • Instruction Fuzzy Hash: 12414232210B4082EA16DF62E84479A73A4F78CBD0F591622FB9D077B6DF38C852C704
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memcpymemmove
                                • String ID: basic_ios::clear$basic_string::_M_replace
                                • API String ID: 167125708-1781676995
                                • Opcode ID: 9e4550a019cffcd376447f221df9850e9f31bf033150585d54ede76ce84063a6
                                • Instruction ID: 4a78b22e6cf2517163ddace2dceee145f0d13750bd60b794e7974e4fdcea7ad2
                                • Opcode Fuzzy Hash: 9e4550a019cffcd376447f221df9850e9f31bf033150585d54ede76ce84063a6
                                • Instruction Fuzzy Hash: 7631FB21B0968541EB29EB25D9087B9E790AB51FE5FD40231FD3D07BD9CD2CE141E398
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 3215553584-0
                                • Opcode ID: 0c193d88b50845aa81bb229cfeef5bca62bd87736d0df081c0babc2b4f8602ff
                                • Instruction ID: 0fde3df684555fdb01bbb0567f65396fd5906680ff97a9fc4fbb11267d081220
                                • Opcode Fuzzy Hash: 0c193d88b50845aa81bb229cfeef5bca62bd87736d0df081c0babc2b4f8602ff
                                • Instruction Fuzzy Hash: 2C417F37105B84C9E763AF22E4603ED3FA5B759FD4F488152EB880B3A6DA3A8555C312
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: strcmp
                                • String ID: $ : $new
                                • API String ID: 1004003707-2075650739
                                • Opcode ID: 3fc4c2fb453cfd023dde4cb91d12fe7f9a63e258c5c55c3d849b597dfd20e7c1
                                • Instruction ID: 799eed4d2b69920052d52dafc62ff594feda3c6434eff3240e701b2fec77225d
                                • Opcode Fuzzy Hash: 3fc4c2fb453cfd023dde4cb91d12fe7f9a63e258c5c55c3d849b597dfd20e7c1
                                • Instruction Fuzzy Hash: C6418D72B4874685EB55EF12A8003F9E750AB91B95FC44035CF2A0B7C6DE7CD885A3A4
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                • String ID:
                                • API String ID: 1168246061-0
                                • Opcode ID: 62bd9740c1c2a61441fbb226ba8157bed7cf0d9f22f07cc03869d12c08925ec8
                                • Instruction ID: be9d38ffdc7b6e85c66b2e680f8457809c6085b235bb2fc594de332f3a9dc2cf
                                • Opcode Fuzzy Hash: 62bd9740c1c2a61441fbb226ba8157bed7cf0d9f22f07cc03869d12c08925ec8
                                • Instruction Fuzzy Hash: 76414736214A8085FA26DF57E8543D967A0F38CBE4F581626AB8E477B6DE3CC542C700
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                • String ID:
                                • API String ID: 1168246061-0
                                • Opcode ID: ee9c97aff65a88c868663459daf74bfe0eb66c434d2bd69df478b3ba643f2863
                                • Instruction ID: 96bec1322d2bd20d32e2a3d0ca8a3050f366ed013bd88369537771368691d56a
                                • Opcode Fuzzy Hash: ee9c97aff65a88c868663459daf74bfe0eb66c434d2bd69df478b3ba643f2863
                                • Instruction Fuzzy Hash: 5B4159B6618A4481FB26DB56E4543D963A0F78DBE4F981622EB8E477B5DA38C4418700
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                • String ID:
                                • API String ID: 1168246061-0
                                • Opcode ID: 430a7c7fba3e6cd772f167e092afeeab044c99694aa112083181d399e8b4a4ca
                                • Instruction ID: d98e3f844eaae0dbb3641ed48c0eccbc43257799aee9a4d2446aa5f2d7179b55
                                • Opcode Fuzzy Hash: 430a7c7fba3e6cd772f167e092afeeab044c99694aa112083181d399e8b4a4ca
                                • Instruction Fuzzy Hash: C2416576210A4081FA269F17E8503D967A4F78CBE4F581622EB8E07BB9DE38C442C704
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: std::_$LockitLockit::_$Concurrency::cancel_current_taskFacet_Register
                                • String ID:
                                • API String ID: 1168246061-0
                                • Opcode ID: f56fe5ed18232deb18e968c14c5c3fe04522fd7049ad61aa0ad3329ac39ecee9
                                • Instruction ID: 66d9cf291a1fa9e9b9738823fb45094ee63abfac6f40b496fa964a1de3cbb30d
                                • Opcode Fuzzy Hash: f56fe5ed18232deb18e968c14c5c3fe04522fd7049ad61aa0ad3329ac39ecee9
                                • Instruction Fuzzy Hash: F9414436214A4081FA269F6AE8547E963A4F79DBE4F481622FB8D477F5DE38C442C700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: memcpystrlen
                                • String ID: basic_string::_M_replace$basic_string::_S_construct null not valid
                                • API String ID: 3412268980-2381965344
                                • Opcode ID: 79e987ffc4bcb91b5321d71e7488087a07853e24a2e21d4a92b84586f2bdd09f
                                • Instruction ID: d02f394c1e59bdfeadb6d10c94ffddc1a1719d34c331bafbbbe120ed6c68bfe7
                                • Opcode Fuzzy Hash: 79e987ffc4bcb91b5321d71e7488087a07853e24a2e21d4a92b84586f2bdd09f
                                • Instruction Fuzzy Hash: 8521D261A0AA4684EB01EB1AE8801ACE7A4FF05BC5FC44435D96D073D1DE3CD452E3E4
                                APIs
                                • Sleep.KERNEL32(00000000,00000003,00007FF7F8BAF1A0,00007FF7F89357BF), ref: 00007FF7F89356B5
                                • InitializeCriticalSection.KERNEL32(00000000,00000003,00007FF7F8BAF1A0,00007FF7F89357BF), ref: 00007FF7F89356F8
                                • InitializeCriticalSection.KERNEL32 ref: 00007FF7F89356FE
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: CriticalInitializeSection$Sleep
                                • String ID: *
                                • API String ID: 1960909292-3311777216
                                • Opcode ID: 8cc8789fdc81fa29067ac66dfc528fbecfa4c76c3f5a56aee71b84c1566e406d
                                • Instruction ID: b0879dd9b71b66af820037d84f97d3523df0a0318c5f7587d72a7abbfc90aee3
                                • Opcode Fuzzy Hash: 8cc8789fdc81fa29067ac66dfc528fbecfa4c76c3f5a56aee71b84c1566e406d
                                • Instruction Fuzzy Hash: 5221B322A4C54295F722B715ED501B8E764AF49356FC80432CD2E863E0EE1CE985F3A8
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ByteCharErrorLastMultiWide
                                • String ID:
                                • API String ID: 203985260-0
                                • Opcode ID: 200b3f1345e44cfc852f10eac067f1733b4bc9db33fdb8001f79150db3be88e0
                                • Instruction ID: 6b88c86b770a9c586cb1af37b28efd7b706573da5102e3c4f3865fff8226cb73
                                • Opcode Fuzzy Hash: 200b3f1345e44cfc852f10eac067f1733b4bc9db33fdb8001f79150db3be88e0
                                • Instruction Fuzzy Hash: D0212E76614B94C7E3618F22E44435EB7B4F79DBD4F540129EB8957B64DB39C8418B00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Handle$AddressAttributesCloseErrorFeatureFileLastModulePresentProcProcessor__std_fs_open_handle
                                • String ID:
                                • API String ID: 156590933-0
                                • Opcode ID: a30d72a7a7c29de0c40d55f3abdf60503d6325bd51d8adae0c4a333c6577edac
                                • Instruction ID: 818140f3fab44495a555ab8a09c83194e8e23688ba8165b1c45cae0150ad504a
                                • Opcode Fuzzy Hash: a30d72a7a7c29de0c40d55f3abdf60503d6325bd51d8adae0c4a333c6577edac
                                • Instruction Fuzzy Hash: D6115132A14A4045EA565FB7A5847AA6671E7887F0F140614BB77C7AF5DF3CC4818B00
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                • String ID:
                                • API String ID: 2933794660-0
                                • Opcode ID: 6fe15b0c4e384d37091185729348d816b74690dfa4f443000fe0a912ec8efaa2
                                • Instruction ID: 7d6ebf1f97da6684202fd37eb3c70f695ff936aad7ae610a3630038643fe83ba
                                • Opcode Fuzzy Hash: 6fe15b0c4e384d37091185729348d816b74690dfa4f443000fe0a912ec8efaa2
                                • Instruction Fuzzy Hash: 38111532751B008AEB008B62E8543A833A4F71DBA8F441E25EB6D877A4DF78C1A58350
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: DeleteObject$ReleaseSelect
                                • String ID:
                                • API String ID: 668125219-0
                                • Opcode ID: 726effa6fa06c5665faf841155b480fdf2c248cd2f2267ddd895ebd61a60b775
                                • Instruction ID: 3fcc5ce217afc3662e5e244752c0bdbae6d9fdc28930436ae7c590a1549fdcf5
                                • Opcode Fuzzy Hash: 726effa6fa06c5665faf841155b480fdf2c248cd2f2267ddd895ebd61a60b775
                                • Instruction Fuzzy Hash: B6015A32204B8492E682DB22F45839F7768FB99BD0F818556AE4A03724CF78C5C6C750
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: _strlwrstrcpy_s
                                • String ID:
                                • API String ID: 3746470816-0
                                • Opcode ID: 39eff12b834902331b533afb545837a96e33ccd5846002bbcdcfc94689f971a5
                                • Instruction ID: 33b1064d7e07ca5b26be113e005714b8fb4827fcfa79fe878232263a0b2cb2b9
                                • Opcode Fuzzy Hash: 39eff12b834902331b533afb545837a96e33ccd5846002bbcdcfc94689f971a5
                                • Instruction Fuzzy Hash: 55F08C6175469695FE15AB23BD003B997199F86FD1F8C40329E4D03794CD2CE287D318
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_task__std_exception_copy
                                • String ID: out_of_range
                                • API String ID: 317858897-3053435996
                                • Opcode ID: 22ea550406a21c82a9fa3a2d919b739b44e2018d566bd5efc64a60cf35bc2c12
                                • Instruction ID: 206cb6943f1b9cbe300be6c636942754dcd29683bcaed745baca70fb605fe0ef
                                • Opcode Fuzzy Hash: 22ea550406a21c82a9fa3a2d919b739b44e2018d566bd5efc64a60cf35bc2c12
                                • Instruction Fuzzy Hash: 11D1A072711B8489EB11CB66E4403DD7362E759BD8F504B16EFAD17BA9DB38C195C300
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID:
                                • String ID: [json.exception.
                                • API String ID: 0-791563284
                                • Opcode ID: 9d10d5961e257bc83ab52ab9107e09406af5a259c6370344c7be281104fa34b5
                                • Instruction ID: 9bfa3acb795d48fbdc46d00a55fcaaa28ed1048c95eca48bab4ec83af28bcc05
                                • Opcode Fuzzy Hash: 9d10d5961e257bc83ab52ab9107e09406af5a259c6370344c7be281104fa34b5
                                • Instruction Fuzzy Hash: F771F172B10B9085FB01CB7AE4413DD37A1E799BD8F54421AEF9917BAADB78C482C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                • String ID: bad locale name
                                • API String ID: 3988782225-1405518554
                                • Opcode ID: 8e48b185d2ad377adad793cb0c2e61843d436bf41b4dc4ce2b229c4423d5b721
                                • Instruction ID: b919e2adb03058459a08787be6f33273e8fd86740414413052806a2770abb456
                                • Opcode Fuzzy Hash: 8e48b185d2ad377adad793cb0c2e61843d436bf41b4dc4ce2b229c4423d5b721
                                • Instruction Fuzzy Hash: A8514C33311A408AEB16DFB2E4907EC33B4FB58B88F044425FB4A67AA5DE38C955D344
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                • String ID: bad locale name
                                • API String ID: 3988782225-1405518554
                                • Opcode ID: 80a5ced4145d21076f0491c6eeec770f45411c69c219c7bb2cb606199f338d71
                                • Instruction ID: e6e463b9e1f652434f87afe0abaeb0bd7d36a5076df94eceddc511b98dd6a078
                                • Opcode Fuzzy Hash: 80a5ced4145d21076f0491c6eeec770f45411c69c219c7bb2cb606199f338d71
                                • Instruction Fuzzy Hash: 96513B32312A408AEB16DFB2E4903EC33B4FB58788F044425FB8A67AA6DF34C525D344
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _get_daylight$_invalid_parameter_noinfo
                                • String ID: ?
                                • API String ID: 1286766494-1684325040
                                • Opcode ID: 3743a34bccfcb64129643f9c7a69ec7d1308491d8e92fb9134a31149a0e48a7e
                                • Instruction ID: b0c4c4f40001a5467877201c390160bb1bb914dd2c4e957f28464d23d5666058
                                • Opcode Fuzzy Hash: 3743a34bccfcb64129643f9c7a69ec7d1308491d8e92fb9134a31149a0e48a7e
                                • Instruction Fuzzy Hash: 0E41F83221478046FB669B27E5563FA67A0E798BE4F144226FF5947BF5EB38C881C700
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ErrorFileLastWrite
                                • String ID: U
                                • API String ID: 442123175-4171548499
                                • Opcode ID: ff9670a3bdeea2dc0e04f94de2162aa67abd2fa7127bffc9359cf981a8e8ed7c
                                • Instruction ID: 8e4ab516b8a29dfabae5ee0ef9a54c4ba7fa48e80f278cd7ab75898e171abe9a
                                • Opcode Fuzzy Hash: ff9670a3bdeea2dc0e04f94de2162aa67abd2fa7127bffc9359cf981a8e8ed7c
                                • Instruction Fuzzy Hash: D841B332715A8086DB218F66E8443EAA7A0F79CBC4F904125EF4D877A8EB3CC441CB40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: _set_errno_from_matherr
                                • String ID: exp
                                • API String ID: 1187470696-113136155
                                • Opcode ID: f45fae9e3f71500e5b5a591dcf295bfd7ffd6db6b8f160502000cbe5d4a7ff26
                                • Instruction ID: f5d0c8a78a0e6a8a4dd1fb3f21a071c67b80d90b3824bfa811f874e6c851eba2
                                • Opcode Fuzzy Hash: f45fae9e3f71500e5b5a591dcf295bfd7ffd6db6b8f160502000cbe5d4a7ff26
                                • Instruction Fuzzy Hash: 24212236A10A148EE751CF7AD8813EC33B0FB5C388F401626FB0AA7B5ADA38D5418B40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1455567295.0000000140000000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_140000000_bot.jbxd
                                Similarity
                                • API ID: ExceptionFileHeaderRaise
                                • String ID: csm
                                • API String ID: 2573137834-1018135373
                                • Opcode ID: 2d42cdfcb1ff534642483aeaeae706dda7279a24a451ff2176392dab70bf652b
                                • Instruction ID: 7f42a9847f84888bb00b0fd94d9c5d46f3abea2284a8759a76045259342b16a3
                                • Opcode Fuzzy Hash: 2d42cdfcb1ff534642483aeaeae706dda7279a24a451ff2176392dab70bf652b
                                • Instruction Fuzzy Hash: E411FB32214B8482EB628B16F44079977E5FB99B98F594225EB8D07769DF3CC591CB00
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-3474627141
                                • Opcode ID: 194a6ffba7f098d6450882ceade0846a3a5d892eff98fad5ff52d12c8e674ac6
                                • Instruction ID: 1b0d3c9ed8438f9cabf8a368f88430db76e06ef369d1c253e872936d7b9aaa6b
                                • Opcode Fuzzy Hash: 194a6ffba7f098d6450882ceade0846a3a5d892eff98fad5ff52d12c8e674ac6
                                • Instruction Fuzzy Hash: 4F01E122908E8886D312DF1CD8011FAF374FF9A79AFA55325EB8C262A0DF29D543D704
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-2713391170
                                • Opcode ID: 11d2b9735bd3709252506aa5ba5fa1e351431b4c673cdd365ea37068437d7b3c
                                • Instruction ID: c4c35b01cb99ad71911799c7663614a48a4786fbc8e5b34674e77f7c24bc2828
                                • Opcode Fuzzy Hash: 11d2b9735bd3709252506aa5ba5fa1e351431b4c673cdd365ea37068437d7b3c
                                • Instruction Fuzzy Hash: 4BF04F12908E8486D302EF1CA8000ABF364FF9E78AF955326EB9D261A5DF28D543A754
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-4283191376
                                • Opcode ID: ae991bd237688d46af379bc9e2c88ae6c4cf7060aa663ad11618093b77570e75
                                • Instruction ID: 5d9b03a397299cc51c3839f630b31e28801551b2fe13df0c8be79eb4401dcfda
                                • Opcode Fuzzy Hash: ae991bd237688d46af379bc9e2c88ae6c4cf7060aa663ad11618093b77570e75
                                • Instruction Fuzzy Hash: 0EF04F12908E8886D312DF1CA8000ABF364FF9D789F955326EB9D261A5DF28E543A754
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-4273532761
                                • Opcode ID: 22cc9ee71a5ffac9a6ca83f9a2c6e26604571fd27d9318c0ebbd99beaa658a45
                                • Instruction ID: 3b4f65eca98dcf06b901c9519ebba4fa6b304d74491e43d36ecb74cd9bc08617
                                • Opcode Fuzzy Hash: 22cc9ee71a5ffac9a6ca83f9a2c6e26604571fd27d9318c0ebbd99beaa658a45
                                • Instruction Fuzzy Hash: 6CF0AF12808E8482D302DF1CA8000ABF364FF8D78AF955326EB9C261A0DF28D543A354
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-4064033741
                                • Opcode ID: 011e2c0bcc3796c487ded507d96121c6e9820a89f73ee2ebf114777c49236ea0
                                • Instruction ID: a416310d6fe37ccd1aed3898c7c7419be063d765bfb736f99f962a5b571fa658
                                • Opcode Fuzzy Hash: 011e2c0bcc3796c487ded507d96121c6e9820a89f73ee2ebf114777c49236ea0
                                • Instruction Fuzzy Hash: 8DF04F12908E8482D302EF1CA8000ABF364FF9E789F955326EB9D261A5DF28D543A754
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-2187435201
                                • Opcode ID: 62e2639ade3852005c6560a781b013c3a86ab195a2881249103c75c778e9902b
                                • Instruction ID: 38300aff0f0001391649d058bd61e1db1a66a00003435e4926e25b247e91e5f5
                                • Opcode Fuzzy Hash: 62e2639ade3852005c6560a781b013c3a86ab195a2881249103c75c778e9902b
                                • Instruction Fuzzy Hash: F9F04F12908E8486D312DF1CA8000ABF364FF9D789FA55326EB9D261A5DF28D543A754
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: fprintf
                                • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                                • API String ID: 383729395-2468659920
                                • Opcode ID: a7c664df915d4e69880d0547989fba806fe34be971c47809b57ea1152bda214e
                                • Instruction ID: df924d3e8a61780f3f1634cb62cdd8e480527d4ab598960b4c65f43e39012e61
                                • Opcode Fuzzy Hash: a7c664df915d4e69880d0547989fba806fe34be971c47809b57ea1152bda214e
                                • Instruction Fuzzy Hash: 0DF06D12908E8886D302DF1CE8000ABF364FF8E78AF955326EF8C2A165DF28D543A754
                                APIs
                                Memory Dump Source
                                • Source File: 00000002.00000002.1458343892.00007FF7F8911000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F8910000, based on PE: true
                                • Associated: 00000002.00000002.1458306749.00007FF7F8910000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458468340.00007FF7F8A1F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458534063.00007FF7F8A21000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458709319.00007FF7F8BB0000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000002.00000002.1458747199.00007FF7F8BB4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_7ff7f8910000_bot.jbxd
                                Similarity
                                • API ID: malloc$memcpystrlen
                                • String ID:
                                • API String ID: 3553820921-0
                                • Opcode ID: 4ee85fb58601ac7611963cd66a25d646a980d7074b0776cdd030191079d3958a
                                • Instruction ID: ac28afac479f051f264a0276a816e34b64ec33999e8e880b60aad02f679dd221
                                • Opcode Fuzzy Hash: 4ee85fb58601ac7611963cd66a25d646a980d7074b0776cdd030191079d3958a
                                • Instruction Fuzzy Hash: A431B025E0DA565AF761EF15E4903B4E391AF41B92FC45038CE2D0B3D1DE2DA405E7A8